Search results for: global food security index
1833 Relaxing Convergence Constraints in Local Priority Hysteresis Switching Logic
Authors: Mubarak Alhajri
Abstract:
This paper addresses certain inherent limitations of local priority hysteresis switching logic. Our main result establishes that under persistent excitation assumption, it is possible to relax constraints requiring strict positivity of local priority and hysteresis switching constants. Relaxing these constraints allows the adaptive system to reach optimality which implies the performance improvement. The unconstrained local priority hysteresis switching logic is examined and conditions for global convergence are derived.Keywords: Adaptive control, convergence, hysteresis constant, hysteresis switching.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 8911832 Distributed Denial of Service Attacks in Mobile Adhoc Networks
Authors: Gurjinder Kaur, Yogesh Chaba, V. K. Jain
Abstract:
The aim of this paper is to explore the security issues that significantly affect the performance of Mobile Adhoc Networks (MANET)and limit the services provided to their intended users. The MANETs are more vulnerable to Distributed Denial of Service attacks (DDoS) because of their properties like shared medium, dynamic topologies etc. A DDoS attack is a coordinated attempt made by malicious users to flood the victim network with the large amount of data such that the resources of the victim network are exhausted resulting in the deterioration of the network performance. This paper highlights the effects of different types of DDoS attacks in MANETs and categorizes them according to their behavior.Keywords: Distributed Denial, Mobile Adhoc Networks
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 24351831 Permanence and Exponential Stability of a Predator-prey Model with HV-Holling Functional Response
Authors: Kai Wang, Yanling Zu
Abstract:
In this paper, a delayed predator-prey system with Hassell-Varley-Holling type functional response is studied. A sufficient criterion for the permanence of the system is presented, and further some sufficient conditions for the global attractivity and exponential stability of the system are established. And an example is to show the feasibility of the results by simulation.
Keywords: Predator-prey system, Hassell-Varley-Holling, delay, permanence, exponential stability.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 15831830 A New Approach to Polynomial Neural Networks based on Genetic Algorithm
Authors: S. Farzi
Abstract:
Recently, a lot of attention has been devoted to advanced techniques of system modeling. PNN(polynomial neural network) is a GMDH-type algorithm (Group Method of Data Handling) which is one of the useful method for modeling nonlinear systems but PNN performance depends strongly on the number of input variables and the order of polynomial which are determined by trial and error. In this paper, we introduce GPNN (genetic polynomial neural network) to improve the performance of PNN. GPNN determines the number of input variables and the order of all neurons with GA (genetic algorithm). We use GA to search between all possible values for the number of input variables and the order of polynomial. GPNN performance is obtained by two nonlinear systems. the quadratic equation and the time series Dow Jones stock index are two case studies for obtaining the GPNN performance.Keywords: GMDH, GPNN, GA, PNN.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 20941829 A Combined Cipher Text Policy Attribute-Based Encryption and Timed-Release Encryption Method for Securing Medical Data in Cloud
Authors: G. Shruthi, Purohit Shrinivasacharya
Abstract:
The biggest problem in cloud is securing an outsourcing data. A cloud environment cannot be considered to be trusted. It becomes more challenging when outsourced data sources are managed by multiple outsourcers with different access rights. Several methods have been proposed to protect data confidentiality against the cloud service provider to support fine-grained data access control. We propose a method with combined Cipher Text Policy Attribute-based Encryption (CP-ABE) and Timed-release encryption (TRE) secure method to control medical data storage in public cloud.Keywords: Attribute, encryption, security, trapdoor.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 7591828 Green Building and Energy Saving
Authors: Nahed Ayedh Al-Hajeri
Abstract:
In a world of climate change and limited fossil fuel resources, renewable energy sources are playing an increasingly important role. Due to industrializations and population growth our economy and technologies today largely depend upon natural resources, which are not replaceable. Approximately 90% of our energy consumption comes from fossil fuels (viz. coal, oil and natural gas). The irony is that these resources are depleting. Also, the huge consumption of fossil fuels has caused visible damage to the environment in various forms viz. global warming, acid rains etc.
Keywords: Kilo watt, kilo watt hour, carbon di-oxide, photovoltaic, environmental protection agency, Kwaiti dinar.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 41681827 Information/Knowledge Society and Europe
Authors: A. Ziya Aktaş
Abstract:
During the last decade some long lasting changes and developments are shaping the global society. The world is entering a new society which is already named as information or knowledge society. In the paper, information/knowledge society is elaborated first. Starting in the year 2000, European Union has initiated some special projects such as eEurope and eEurope+ and activities such as Bologna Process and Socrates/Erasmus Program . The paper will review these activites in relation with information or knowledge society . Before paper ends with a conclusion, some views relevant to the topic are also presented.Keywords: Bologna Process, Erasmus/Socrates Program, information/knowledge society , Lisbon objectives.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 15011826 Fuzzy Fingerprint Vault using Multiple Polynomials
Authors: Daesung Moon, Woo-Yong Choi, Kiyoung Moon
Abstract:
Fuzzy fingerprint vault is a recently developed cryptographic construct based on the polynomial reconstruction problem to secure critical data with the fingerprint data. However, the previous researches are not applicable to the fingerprint having a few minutiae since they use a fixed degree of the polynomial without considering the number of fingerprint minutiae. To solve this problem, we use an adaptive degree of the polynomial considering the number of minutiae extracted from each user. Also, we apply multiple polynomials to avoid the possible degradation of the security of a simple solution(i.e., using a low-degree polynomial). Based on the experimental results, our method can make the possible attack difficult 2192 times more than using a low-degree polynomial as well as verify the users having a few minutiae.
Keywords: Fuzzy vault, fingerprint recognition multiple polynomials.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 15471825 Thermal Buckling of Rectangular FGM Plate with Variation Thickness
Authors: Mostafa Raki, Mahdi Hamzehei
Abstract:
Equilibrium and stability equations of a thin rectangular plate with length a, width b, and thickness h(x)=C1x+C2, made of functionally graded materials under thermal loads are derived based on the first order shear deformation theory. It is assumed that the material properties vary as a power form of thickness coordinate variable z. The derived equilibrium and buckling equations are then solved analytically for a plate with simply supported boundary conditions. One type of thermal loading, uniform temperature rise and gradient through the thickness are considered, and the buckling temperatures are derived. The influences of the plate aspect ratio, the relative thickness, the gradient index and the transverse shear on buckling temperature difference are all discussed.
Keywords: Stability of plate, thermal buckling, rectangularplate, functionally graded material, first order shear deformationtheory.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 20971824 Resources-Based Ontology Matching to Access Learning Resources
Authors: A. Elbyed
Abstract:
Nowadays, ontologies are used for achieving a common understanding within a user community and for sharing domain knowledge. However, the de-centralized nature of the web makes indeed inevitable that small communities will use their own ontologies to describe their data and to index their own resources. Certainly, accessing to resources from various ontologies created independently is an important challenge for answering end user queries. Ontology mapping is thus required for combining ontologies. However, mapping complete ontologies at run time is a computationally expensive task. This paper proposes a system in which mappings between concepts may be generated dynamically as the concepts are encountered during user queries. In this way, the interaction itself defines the context in which small and relevant portions of ontologies are mapped. We illustrate application of the proposed system in the context of Technology Enhanced Learning (TEL) where learners need to access to learning resources covering specific concepts.Keywords: Resources query, ontologies, ontology mapping, similarity measures, semantic web, e-learning.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 14871823 Technological Value of Selected Spring Wheat Cultivars Depending on the Sowing Date
Authors: Marta Wyzińska, Jerzy Grabiński, Alicja Sułek
Abstract:
The grain quality is a decisive factor in its use. In Poland, spring wheat is characterized by more favorable quality parameters in relation to the winter form of this species. In the present study, the effects of three different sowing dates (autumn, delayed autumn, and spring) and cultivar (Tybalt, Cytra, Bombona, Monsun, and Parabola) on the selected technological value parameters of spring wheat over three years were studied. The field trials were carried out in two locations (Bezek, Czesławice) in the Lubelskie Vivodeship, Poland. It was found that the falling number of spring wheat grains from autumn sowing dates was at a similar level to wheat sown in spring. The amount of wet gluten in the grain was variable in years, and its quality was better in wheat sown in spring. Sedimentation index was dependent upon on the cultivar.
Keywords: Sowing term, spring wheat, technological value, quality.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 11741822 What is the Key Element for the Territory's State of Development?
Authors: J. Lonska, V. Boronenko
Abstract:
The result of process of territory-s development is the territory-s state of development (TSoD), which is pointed towards the provision and improvement of people-s life conditions. The authors offer to measure the TSoD according to their own developed model. Using the available statistical data regarding the values of model-s elements, the authors empirically show which element mainly determines the TSoD. The findings of the research showed that the key elements of the TSoD are the “Material welfare of people" and “People-s health". Performing a deeper statistical analysis of correlation between these elements, it turned out that it is not so necessary for a country to be bent on trying to increase the material growth of a territory, because a relatively high index of life expectancy at birth could be ensured also by much more modest material resources. On the other hand, the economical feedback of longer lifespan within countries with lower material performance is also relatively low.
Keywords: Development indices, health, territory's state of development, wealth.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 11931821 Corporate Governance and Share Prices: Firm Level Review in Turkey
Authors: Raif Parlakkaya, Ahmet Diken, Erkan Kara
Abstract:
This paper examines the relationship between corporate governance rating and stock prices of 26 Turkish firms listed in Turkish stock exchange (Borsa Istanbul) by using panel data analysis over five-year period. The paper also investigates the stock performance of firms with governance rating with regards to the market portfolio (i.e. BIST 100 Index) both prior and after governance scoring began. The empirical results show that there is no relation between corporate governance rating and stock prices when using panel data for annual variation in both rating score and stock prices. Further analysis indicates surprising results that while the selected firms outperform the market significantly prior to rating, the same performance does not continue afterwards.Keywords: Corporate governance, stock price, performance, panel data analysis.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 25261820 Image Authenticity and Perceptual Optimization via Genetic Algorithm and a Dependence Neighborhood
Authors: Imran Usman, Asifullah Khan, Rafiullah Chamlawi, Abdul Majid
Abstract:
Information hiding for authenticating and verifying the content integrity of the multimedia has been exploited extensively in the last decade. We propose the idea of using genetic algorithm and non-deterministic dependence by involving the un-watermarkable coefficients for digital image authentication. Genetic algorithm is used to intelligently select coefficients for watermarking in a DCT based image authentication scheme, which implicitly watermark all the un-watermarkable coefficients also, in order to thwart different attacks. Experimental results show that such intelligent selection results in improvement of imperceptibility of the watermarked image, and implicit watermarking of all the coefficients improves security against attacks such as cover-up, vector quantization and transplantation.
Keywords: Digital watermarking, fragile watermarking, geneticalgorithm, Image authentication.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 15191819 Improved MARS Ciphering Using a Metamorphic-Enhanced Function
Authors: Moataz M. Naguib, Hatem Khater, A. Baith Mohamed
Abstract:
MARS is a shared-key (symmetric) block cipher algorithm supporting 128-bit block size and a variable key size of between 128 and 448 bits. MARS has a several rounds of cryptographic core that is designed to take advantage of the powerful results for improving security/performance tradeoff over existing ciphers. In this work, a new function added to improve the ciphering process it is called, Meta-Morphic function. This function use XOR, Rotating, Inverting and No-Operation logical operations before and after encryption process. The aim of these operations is to improve MARS cipher process and makes a high confusion criterion for the Ciphertext.
Keywords: AES, MARS, Metamorphic, Cryptography, Block Cipher.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 20431818 Valuing Patents on Market Reaction to Patent Infringement Litigations
Authors: Yu J. Chiu, Chia H. Yeh
Abstract:
Innovation is more important in any companies. However, it is not easy to measure the innovation performance correctly. Patent is one of measuring index nowadays. This paper wants to purpose an approach for valuing patents based on market reaction to patent infringement litigations. The interesting phenomenon is found from collection of patent infringement litigation events. That is if any patent litigation event occurs the stock value will follow changing. The plaintiffs- stock value raises some percentage. According to this interesting phenomenon, the relationship between patent litigation and stock value is tested and verified. And then, the stock value variation is used to deduce the infringed patents- value. The purpose of this study is providing another concept model to evaluate the infringed patents. This study can provide a decision assist system to help drafting patent litigation strategy and determine the technology valueKeywords: Patent valuation, infringement litigations, stock value, artificial neural networks.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 21641817 Development of Road Maintenance Management System Based on WebGIS
Authors: Feng Xiao, Zhou Hongyu, YuCaixia
Abstract:
Based on an analysis of the current research and application of Road maintenance, geographic information system (WebGIS) and ArcGIS Server, the platform overhead construction for Road maintenance development is studied and the key issues are presented, including the organization and design of spatial data on the basis of the geodatabase technology, middleware technology, tiles cache index technology and dynamic segmentation of WebGIS. Road maintenance geographic information platform is put forward through the researching ideas of analysis of the system design. The design and application of WebGIS system are discussed on the basis of a case study of BaNan district of Chongqing highway maintenance management .The feasibility of the theories and methods are validated through the system.
Keywords: WebGIS, Tile, Road maintenance, dynamic segmentation
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 22451816 Fermentative Production of Dextran using Food Industry Wastes
Authors: Marzieh Moosavi-Nasab, Mohsen Gavahian, Ali R. Yousefi, Hamed Askari
Abstract:
Dextran is a D-glucose polymer which is produced by Leuconostoc mesenteroides grown in a sucrose-rich media. The organism was obtained from the Persian Type Culture Collection (PTCC) and was transferred in MRS broth medium at 30°C and pH 6.8 for 24 h. After preparation of inoculums, organisms were inoculated into five liquid fermentation media containing either molasses or cheese whey or different combinations of cheese whey and molasses. After certain fermentation period, the produced dextran was separated and dried. Dextran yield was calculated and significant differences in different media were observed. Furthermore, FT-IR analysis was performed and the results showed that there were no significant differences in the produced dextran structures.Keywords: Dextran, Leuconostoc mesenteroides, Molasses, Whey
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 36711815 The Role of Work Ethic in the Development of Singapore, South Korea, Malaysia, Japan and European Countries
Authors: Aidos Altynbekov, Gulmira Abdiraiymova, Gulnar Kenzhakimova, Mansya Sadyrova, Gulnapis Abdikerova
Abstract:
Work ethic and labour productivity issues are extremely important for any society. It has been long proven by the global practice and various scholars that the country promoting the labour has always been way forward from the other countries. This paper studies the thoughts suggested by M.Weber, Confucius, Lee Kuan Yew, Mahathir Mohammad and other prominent thinkers concerning the issues of work ethics and labour productivity. The article analyzes why developed nations are way more advanced in their development compared to other nations.Keywords: Work ethic, labour productivity, religion, philosophy.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 37011814 The Framework of Termination Mechanism in Modern Emergency Management
Authors: Yannan Wu, An Chen, Yan Zhao
Abstract:
Termination Mechanism is an indispensible part of the emergency management mechanism. Despite of its importance in both theory and practice, it is almost a brand new field for researching. The concept of termination mechanism is proposed firstly in this paper, and the design and implementation which are helpful to guarantee the effect and integrity of emergency management are discussed secondly. Starting with introduction of the problems caused by absent termination and incorrect termination, the essence of termination mechanism is analyzed, a model based on Optimal Stopping Theory is constructed and the termination index is given. The model could be applied to find the best termination time point.. Termination decision should not only be concerned in termination stage, but also in the whole emergency management process, which makes it a dynamic decision making process. Besides, the main subjects and the procedure of termination are illustrated after the termination time point is given. Some future works are discussed lastly.Keywords: Emergency management, Termination Mechanism, Optimal Termination Model, Decision Making, Optimal StoppingTheory.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 12671813 A Intelligent Inference Model about Complex Systems- Stability: Inspiration from Nature
Authors: Naiqin Feng, Yuhui Qiu, Yingshan Zhang, Fang Wang
Abstract:
A logic model for analyzing complex systems- stability is very useful to many areas of sciences. In the real world, we are enlightened from some natural phenomena such as “biosphere", “food chain", “ecological balance" etc. By research and practice, and taking advantage of the orthogonality and symmetry defined by the theory of multilateral matrices, we put forward a logic analysis model of stability of complex systems with three relations, and prove it by means of mathematics. This logic model is usually successful in analyzing stability of a complex system. The structure of the logic model is not only clear and simple, but also can be easily used to research and solve many stability problems of complex systems. As an application, some examples are given.Keywords: Complex system, logic model, relation, stability.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 13281812 Implementing Fault Tolerance with Proxy Signature on the Improvement of RSA System
Authors: H. El-Kamchouchi, Heba Gaber, Fatma Ahmed, Dalia H. El-Kamchouchi
Abstract:
Fault tolerance and data security are two important issues in modern communication systems. During the transmission of data between the sender and receiver, errors may occur frequently. Therefore, the sender must re-transmit the data to the receiver in order to correct these errors, which makes the system very feeble. To improve the scalability of the scheme, we present a proxy signature scheme with fault tolerance over an efficient and secure authenticated key agreement protocol based on the improved RSA system. Authenticated key agreement protocols have an important role in building a secure communications network between the two parties.
Keywords: Proxy signature, fault tolerance, improved RSA, key agreement.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 12581811 Fractal Analysis on Human Colonic Pressure Activities based on the Box-counting Method
Authors: Rongguo Yan, Guozheng Yan, Banghua Yang
Abstract:
The colonic tissue is a complicated dynamic system and the colonic activities it generates are composed of irregular segmental waves, which are referred to as erratic fluctuations or spikes. They are also highly irregular with subunit fractal structure. The traditional time-frequency domain statistics like the averaged amplitude, the motility index and the power spectrum, etc. are insufficient to describe such fluctuations. Thus the fractal box-counting dimension is proposed and the fractal scaling behaviors of the human colonic pressure activities under the physiological conditions are studied. It is shown that the dimension of the resting activity is smaller than that of the normal one, whereas the clipped version, which corresponds to the activity of the constipation patient, shows with higher fractal dimension. It may indicate a practical application to assess the colonic motility, which is often indicated by the colonic pressure activity.Keywords: Colonic pressure activity, erratic fluctuations, fractal dimension and spikes.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 15091810 Effect of Pond Ash and RBI Grade 81 on Properties of Subgrade Soil and Base Course of Flexible Pavement
Authors: B. M. Patil, K. A. Patil
Abstract:
This paper deals with use of pond ash and RBI Grade 81 for improvement in CBR values of clayey soil and grade-III materials used for base course of flexible pavement. The pond ash is a thermal power plant waste and RBI Grade 81 is chemical soil stabilizer. The geotechnical properties like Maximum Dry Density (MDD), Optimum Moisture Content (OMC), Unconfined Compressive Strength (UCS), CBR value and Differential Free Swell (DFS) index of soil are tested in the laboratory for different mixes of soil, pond ash and RBI Grade 81 for different proportions. The mixes of grade-III material, pond ash and RBI Grade 81 tested for CBR test. From the study it is found that the geotechnical properties of clayey soil are improved significantly, if pond ash added with RBI Grade 81. The optimum mix recommended for subgrade is soil: pond ash: RBI Grade 81 in proportions of 76:20:4. The CBR value of grade-III base course treated with 20% pond ash and 4% RBI Grade 81 is increased by 125.93% as compared to untreated grade-III base course.
Keywords: Clayey soil, Geotechnical properties, Pond ash, RBI Grade 81™.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 37501809 A Study on the Quality of Hexapod Machine Tool's Workspace
Authors: D. Karimi, M.J. Nategh
Abstract:
One of the main concerns about parallel mechanisms is the presence of singular points within their workspaces. In singular positions the mechanism gains or loses one or several degrees of freedom. It is impossible to control the mechanism in singular positions. Therefore, these positions have to be avoided. This is a vital need especially in computer controlled machine tools designed and manufactured on the basis of parallel mechanisms. This need has to be taken into consideration when selecting design parameters. A prerequisite to this is a thorough knowledge about the effect of design parameters and constraints on singularity. In this paper, quality condition index was introduced as a criterion for evaluating singularities of different configurations of a hexapod mechanism obtainable by different design parameters. It was illustrated that this method can effectively be employed to obtain the optimum configuration of hexapod mechanism with the aim of avoiding singularity within the workspace. This method was then employed to design the hexapod table of a CNC milling machine.Keywords: Hexapod, Machine Tool, Singularity, Workspace.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 19731808 A Design of the Infrastructure and Computer Network for Distance Education, Online Learning via New Media, E-Learning and Blended Learning
Authors: Sumitra Nuanmeesri
Abstract:
The research focus on study, analyze and design the model of the infrastructure and computer networks for distance education, online learning via new media, e-learning and blended learning. The collected information from study and analyze process that information was evaluated by the index of item objective congruence (IOC) by 9 specialists to design model. The results of evaluate the model with the mean and standard deviation by the sample of 9 specialists value is 3.85. The results showed that the infrastructure and computer networks are designed to be appropriate to a great extent appropriate to a great extent.
Keywords: Blended Learning, New Media, Infrastructure and Computer Network, Tele-Education, Online Learning.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 20251807 A Case Study of Key-Dependent Permutations in Feistel Ciphers
Authors: Hani Almimi, Ola Osabi, Azman Samsudin
Abstract:
Many attempts have been made to strengthen Feistel based block ciphers. Among the successful proposals is the key- dependent S-box which was implemented in some of the high-profile ciphers. In this paper a key-dependent permutation box is proposed and implemented on DES as a case study. The new modified DES, MDES, was tested against Diehard Tests, avalanche test, and performance test. The results showed that in general MDES is more resistible to attacks than DES with negligible overhead. Therefore, it is believed that the proposed key-dependent permutation should be considered as a valuable primitive that can help strengthen the security of Substitution-Permutation Network which is a core design in many Feistel based block ciphers.
Keywords: Block Cipher, Feistel Structure, DES, Diehard Tests, Avalanche Effect.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 20101806 A Novel Q-algorithm for EPC Global Class-1 Generation-2 Anti-collision Protocol
Authors: Wen-Tzu Chen, Wen-Bin Kao
Abstract:
This paper provides a scheme to improve the read efficiency of anti-collision algorithm in EPCglobal UHF Class-1 Generation-2 RFID standard. In this standard, dynamic frame slotted ALOHA is specified to solve the anti-collision problem. Also, the Q-algorithm with a key parameter C is adopted to dynamically adjust the frame sizes. In the paper, we split the C parameter into two parameters to increase the read speed and derive the optimal values of the two parameters through simulations. The results indicate our method outperforms the original Q-algorithm.
Keywords: RFID, anti-collision, Q algorithm, ALOHA
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 46621805 Development of the Academic Model to Predict Student Success at VUT-FSASEC Using Decision Trees
Authors: Langa Hendrick Musawenkosi, Twala Bhekisipho
Abstract:
The success or failure of students is a concern for every academic institution, college, university, governments and students themselves. Several approaches have been researched to address this concern. In this paper, a view is held that when a student enters a university or college or an academic institution, he or she enters an academic environment. The academic environment is unique concept used to develop the solution for making predictions effectively. This paper presents a model to determine the propensity of a student to succeed or fail in the French South African Schneider Electric Education Center (FSASEC) at the Vaal University of Technology (VUT). The Decision Tree algorithm is used to implement the model at FSASEC.
Keywords: Academic environment model, decision trees, FSASEC, K-nearest neighbor, machine learning, popularity index, support vector machine.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 11371804 M-ary Chaotic Sequence Based SLM-OFDM System for PAPR Reduction without Side-Information
Authors: A.Goel, M. Agrawal, P. Gupta Poddar
Abstract:
Selected Mapping (SLM) is a PAPR reduction technique, which converts the OFDM signal into several independent signals by multiplication with the phase sequence set and transmits one of the signals with lowest PAPR. But it requires the index of the selected signal i.e. side information (SI) to be transmitted with each OFDM symbol. The PAPR reduction capability of the SLM scheme depends on the selection of phase sequence set. In this paper, we have proposed a new phase sequence set generation scheme based on M-ary chaotic sequence and a mapping scheme to map quaternary data to concentric circle constellation (CCC) is used. It is shown that this method does not require SI and provides better SER performance with good PAPR reduction capability as compared to existing SLMOFDM methods.
Keywords: Orthogonal frequency division multiplexing (OFDM), Peak-to-average power ratio (PAPR), Selected mapping (SLM), Side information (SI)
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1960