Tags

,

Co-creation of Value Practices in Government Agency
Imran A. Adeleke and Azizah AbdulRahman

This paper describes the co-creation of value practices employ by government agencies to interact, share service experience and understand the customer problem and requirement at any point in time. There is an increasing research on co-creation of value in marketing but few researchers discussed the concept in public sector. For government to provide quality service for citizens, to sustain continuous improvement and service innovation there is need for government to interact more with the citizen, sharing their knowledge and service experience for more improvement and mutual value. In this study, DART building block of value co-creation (Dialogue, Access, Risk management and Transparency) was used to identify the major practices of value co-creation of the government with citizen. The results provide extensive information on the value co-creation practices mechanism adopted by the agencies to interact with customer and share their service experience on one hand and also serves as a source of awareness to the community of service user for ease of communication and experience co-creation.

Keywords: Co-creation of value; experience sharing; stakeholder; DART model

Download Full-Text

 

Neural Approach for Determining Mental Health Problems
Jabar H.Yousif and Mabruk A. Fekihal

Mental illness is to become one of the main problems in our society. World Health Organization predicted that depression will be the main cause of the world’s leading disability by 2020. This paper aims to implement a soft computing technique to determine mental health problems. A multilayered perceptron designed and implemented to classify transcribed speech samples and determine a mental health problem. The NeuroSolution package is used to adopt the neural network phase. The Error backpropagation learning techniques is implemented to see how effective they would be at correctly predicting the classification of text. The proposed classification system is used to determine if a text or speech sample was generated by a person has a mental health problem such as schizophrenia or mania. Classifications such as schizophrenia are very broad; therefore, the approach introduced here arrives at practical and task-relevant diagnostic categories by use of clustering techniques. The results demonstrate high accuracy (99%).

Keywords: Mental Illness, Text clustering, Text Classification, Soft Computing, Neural Networks

Download Full-Text

 

Determinationof Optimized Data Fusion Algorithms for Radars Network by Ordered Weighted Averaging
Ali Naseri and Omid Azmoon

Decision making is a fundamental aim of radars network and it is depends on data fusion algorithm. Probability of detection is an important parameter, because of uncertainty, for data fusion algorithm and it is depends on radar gating and swerling of targets. In this paper data of 2-cell and 4-cell network are fused by custom algorithms in radars network, Averaging, Bayesian and Dempster-Shafer. Results of simulations are compared by convergence, precision, influence of fluctuations, time of running and complexity of implementation and are evaluated by fuzzy logic operator, OWA. Simulations are declare Dempster-Shafer algorithm is optimized for 2-cell network, and if radars outputs are mass function, centralized topology by Dempster-Shafer algorithm will be optimized in 4-cell network, else if radars outputs are probability, because of inverse Pignistic transform in input and Pignistic transform in output of every cells, centralized topology by Bayesian algorithm will be optimized.

Keywords: Averaging, Bayesian, Data Fusion,Dempster-Shafer, OWA, RadarsNetwork

Download Full-Text

 

A Game Theoretic Approach for Analyzing the LEACH Protocol with Multi Layer Clustering and Energy Efficient Methods
Mehdi EffatParvar, Hamidreza Navidi and MohammadReza EffatParvar

Game theory has been used for decades in fields of science such as economics and biology, but recently it was used to model routing and packet forwarding in wireless ad-hoc and sensor networks. Game Theory provides a mathematical tool for the analysis of interactions between the agents with conflicting interests, hence it is well suitable tool to model some problems in communication systems, especially, to wireless sensor networks (WSNs) where the prime goal is to minimize energy consumption than high throughput and low delay. Clustering algorithm provides network scalability and energy efficient communications by reducing transmission overhead and enhancing transmission reliability. It can localize the route set up within the cluster and thus reduce the size of the routing table stored at the individual sensor node. In this paper we use the Multi layer clustering and energy aware approaches base on LEACH protocol, and then we analyze the LEACH protocol behavior.  The analysis is based on a non-cooperative game approach where each cluster heads behave selfishly in order to conserve its energy and thus maximize its lifespan. We prove that the Nash equilibrium of the game is the best strategy for each cluster heads, and it causes to increase the expected payoffs the nodes. We show these analysis and its results by our simulations, and we use this analysis to formulate a clustering mechanism that can be applied to sensor networks in practice.

Keywords: Clustering, Game Theory, Nash Equilibrium, Wireless Sensor Networks

Download Full-Text

 

Intelligence in Cathodic Protection of Gas Supply Networks of Golestan Province Using Algorithm of Voltage Difference of Injection Point and Measurement Value
Mohammad Okhli, Ahmad Faraahi, Seyed Ali Razavi Ebrahimi, Mehdi Ziari and Rahmat Mohammadshafie

One of the most important parts of maintenance and repairs to preserve steel gas protection networks is cathodic protection part. It was observed Working on data bank of this part in three main areas of Golestan Province in 100 stations having 3600 measurement points that 80% of this data are in 0.5 to 0.9 scopes. In this paper, in addition to offering an applicable algorithm, the graphs of recorded measurements history along with voltage difference of injection have been drawn. Through comparison of reading a sample station having 70 points in two different dates and in one date, vulnerable areas and points of gas protection networks have been introduced and using intelligence and intellect in future analyses has been dealt with.

Keywords: algorithm, cathodic protection, voltage difference, intelligence

Download Full-Text

 

ASR Context-Sensitive Error Correction Based on Microsoft N-Gram Dataset
Youssef Bassil and Paul Semaan

At the present time, computers are employed to solve complex tasks and problems ranging from simple calculations to intensive digital image processing and intricate algorithmic optimization problems to computationally-demanding weather forecasting problems. ASR short for Automatic Speech Recognition is yet another type of computational problem whose purpose is to recognize human spoken speech and convert it into text that can be processed by a computer. Despite that ASR has many versatile and pervasive real-world applications,it is still relatively erroneous and not perfectly solved as it is prone to produce spelling errors in the recognized text, especially if the ASR system is operating in a noisy environment, its vocabulary size is limited, and its input speech is of bad or low quality. This paper proposes a post-editing ASR error correction method based on MicrosoftN-Gram dataset for detecting and correcting spelling errors generated by ASR systems. The proposed method comprises an error detection algorithm for detecting word errors; a candidate corrections generation algorithm for generating correction suggestions for the detected word errors; and a context-sensitive error correction algorithm for selecting the best candidate for correction. The virtue of using the Microsoft N-Gram dataset is that it contains real-world data and word sequences extracted from the web which canmimica comprehensive dictionary of words having a large and all-inclusive vocabulary. Experiments conducted on numerous speeches, performed by different speakers, showed a remarkable reduction in ASR errors. Future research can improve upon the proposed algorithm so much so that it can be parallelized to take advantage of multiprocessor and distributed systems.

Keywords: Artificial Intelligence, Natural Language Processing, Speech Recognition and Synthesis, Error Correction

Download Full-Text

 

Impact of Relay Positions on MAC Performance of Multihop Cellular Networks
Varsha Sharma and R.C. Jain

When relaying functionality is included in cellular networks, the resulting system is called Multihop Cellular Network (MCN). MCNs were proposed to combine the advantages of conventional cellular networks (CCNs) and multihop ad-hoc networks. Medium access control (MAC) in MCNs is different from that in CCNs and Ad-hoc networks. In this paper we present an overview of relaying in MCNs, and propose a reservation based MAC procedure for MCNs with fixed relays. We have analyzed the performance of MCNs using the proposed MAC by varying the position and number of relay nodes in the cell.

Keywords: Conventional Cellular Network, Multihop Cellular Network, MAC, Relaying

Download Full-Text

 

Analysis of AODV, DSR and DYMO Protocols for Wireless Sensor Network
M. M. Chandane, S. G. Bhirud and S.V. Bonde

Wireless Sensor Networks (WSN) are large collection of resource constrained, battery operated tiny sensor nodes. These nodes are densely deployed over a distributed environment and are specifically designed to gather and disseminate the sensed phenomena either through single hop or multi-hop communication. Energy consumption is a major challenge in wireless sensor networks therefore this work provides the feasibility study of AODV, DSR and DYMO routing protocols for WSN using IEEE 802.15.4 star topology. Qualnet 4.5 is used for detailed simulation based performance analysis with reference to throughput, total energy consumption, average end-to-end delay, jitter and duty cycle. Performance of all three routing protocol is analyzed for 802.15.4. Result shows that AODV performs better than DSR and DYMO for scalability, varying traffic loads in star topology with beacon enabled mode.

Keywords: Wireless Sensor Networks, IEEE 802.15.4, ZigBee, QualNet4.5, Ad-Hoc network, Routing Protocol, Quality of Service

Download Full-Text

 

Performance Analysis of AODV+ Over Mac Layer Based on Throughput
Rahul Malhotra, Sangeeta Monga and Kamaljeet Kaur

The AODV is an adhoc on demand distance vector routing protocol; this protocol is a reactive protocol means the source node sends the data to the destination node. It maintains routes of each node and reduces overhead. The scenario that designed in this paper, the source node sends the data to the destination node with communicating with host. When the destination node had not on its network, then a gateway communicated with other gateway that is technique by nodes communicating over nodes in the Internet. The scenario designed in this dissertation has wired cum wireless network by using network simulator (NS2) in 802.11 and using various scripts to calculate the performance on the MAC Layer.

Keywords: AODV; NS2; MANET

Download Full-Text

 

Increase of Privacy Coefficient in Classification based on Wavelet Transformation
M. Aamoot, S. Karbasi and A. Faraahi

In data mining, maintaining individual’s privacy is one of the complicated issues, which must be noticed in data distribution to conduct analysis. Thus, the main subject is the method of data values preservation while preserving existing data patterns in data sets. In other words, data owners must be able to guarantee the reliability of results obtained from data mining in addition to preserving individual’s privacy. In this research, data transformation method was proposed by implementing the haar wavelet transformation, which preserves the features required for the K-Nearest Neighbor classification algorithm in addition to hiding private data. The results obtained from conduction of the above method indicated that the proposed method not only enhanced the privacy coefficient but also maintained classification patterns at an appropriate level.

Keywords: Classification, Data Mining, Privacy Preserving, Wavelet Transform

Download Full-Text

 

Collaborative Web Surfing
Akhtar Ali Jalbani, Aneela Yasmin, Gordhan Das Menghwar and Mukhtiar Memon

Recent advances in the area of group communication, based on the computer mediated communication increased, due to the adoption of results in the paradigm shift of previous research towards group communication. This research uses social software into existing design patterns for group communication. The adoption of group communication towards social groups  leads to more user oriented and human centric designs and combination leads to the new potential emerging from incoperating new functionalities into collaborative environment. Tools originated from social softwares are still standalone but their influence on collaborative environment can not be avoided. However these social software and existing collaborative software does not provide collaborative way to search on the Internet. In this research we focused on the collaborative enviornement used for web surfing. A conceptual quality model is also proposed to evelaute the quality impact of collaborative web surfing.

Keywords: collaborative surfing, searching together, model for collaborative web surfing, Collaborative concepts

Download Full-Text

 

Simulation Symmetric N-dimensional Cube Network-on-Chip Architecture by Using Ns-2
Reza Kourdy and Mohammad Reza Nouri Rad

The symmetric recursive structure of the network-on-chip architecture has played an important role in developing parallel processing and is still popular and influential. The symmetric recursive structure of the hypercube support various elegant and efficient parallel algorithms that often serve as starting points for developing, or benchmarks for evaluating, algorithms on other architectures. This paper describes the design and simulation N-dimensional network-on-chip by recursive structure. We use network simulator NS-2 modeling and simulating NoC at high-level chip design and the different dimensions 2 to 6 (2D to 6D) has simulated.

Keywords: Network-on-Chip (NoC), network simulator NS-2, cube-connected cycles (CCC), recursive structure, hypercube

Download Full-Text

 

Performance Comparison of 3D-Mesh and 3D-Torus Network-on-Chip
Mohammad Reza Nouri Rad and Reza Kourdy

The widely used NoC topologies are Mesh and Torus architecture. We analyses performance of three-dimensional Mesh and Torus based NoC with 64 resources and switches in presence of permanent faults With IP routing. We also carry out the high-level simulation of on chip network using NS-2 to verify the analytical analysis.

Keywords: NoC (Network on chip), performance, 3D-mesh, 3D-torus

Download Full-Text

 

Compare Performance of 2D and 3D Mesh Architectures in Network-On-Chip
Reza Kourdy and Mohammad Reza Nouri Rad

The 3Dimensional Network on chip (NoCs) architectures is capable of achieving higher throughput, lower latency, and lower energy dissipation at the cost of small silicon area overhead. In this paper, we survey the 2d-mesh and 3d-mesh of NOCs to showing their intrinsic advantages related to each other. These topologies compared with average of propagation delay, average of hop count and impact of fault in bandwidth utilization.

Keywords: 3D-NoC (Three-dimensional Network on chip), 3D-IC (Three-dimensional integrated- circuit), MPSoC (Multiprocessor Systems-on-Chip), IP (intellectual property)

Download Full-Text

 

A Novel Approach for Increasing Robustness and Security of LSB-Based Digital Audio Watermarking
Zahra Movahhedinia and Kamal Jamshidi

The authenticity or ownership verification may be provisioned by digital watermarking which can be performed by proper methods of steganography. In this paper we develop a robust Least Significant Bit (LSB) based audio watermarking algorithm that uses a chained hash table (CHT) to attain the time complexity O(n), where n is the number of samples in the cover data. To promote the robustness of our approach, the covert bits are embedded in the tenth LSB layer of thestego signal using the regions where the energyof the audio signal is high. To lessen the computational complexity, an optimized jumping window technique is employed. The robustness and imperceptibility of the proposed method is investigated and shown that while simple and fast, it is more robust and secure than the standard LSB method.

Keywords: Data Hiding, Audio Steganography, Digital Watermarking, LSB method

Download Full-Text

 

Analysis of Gene Microarray Data using Association Rule Mining
Jitendra Agrawal and Ramesh C. Jain

With the developing of new technologies and revolutionary changes in biomedicine and biotechnologies, there was an explosive growth of biological data during the last few years. Due to the huge amount of data, most of recent studies are focused on the analysis and the extraction of useful and interesting information from microarray data. Microarray technology is a powerful tool to analyze thousands of gene expression values in the field of biomedical research, providing researchers with a means of looking at how genes are expressed under certain conditions such as drug treatment or disease. The association rule could be one of data mining technique to extract biological information and lead us to discover interactions that exist between different genes. This paper describes a work done in the bioinformatics sector to understand association based on the correlations in Gene Probes according to the expression levels which has actually been executed successfully.

Keywords: Association Rule Mining, Gene expression, Micro array data

Download Full-Text

 

Tools for Creating TCL Script in Network Simulator 2 (NS-2)
Mohammad Reza Nouri Rad and Reza Kourdy

Network researchers have used the Ns-2 network simulator for a long-time for implementing and analysing novel ideas and new approaches emerging in computer networks. Simulations in NS-2 through TCL scripts performed. Through these scripts, all aspects of the simulation have defined. One of the problems in Ns-2 is creating TCL script to simulate desired specification of the network. Before TCL script generator built, the only way to use ns-2 was to write TCL code to describe nodes, links and other network objects. This paper presents an application programs for simulate networks like network on chip and scenarios to supporting Quality of Service, create TCL script comfortable and extracting desired result from output files.

Keywords: TCL script generator, Network Simulator 2 (Ns-2), nostrum mesh topology, Trace

Download Full-Text

 

Impact of Educational Background on Information Communication Technology (ICT) Awareness of Students & Scholars in Kashmir (India)
Rafi Ahmad Khan and Showkat Hussain Gani

There is a lack of information on the actual use of Information and Communications Technology usually called ICT for academic and research purposes by the students and scholars in Kashmir (India). This study explored the level of usage, utilization of Information and Communication Technologies (ICT) and the impact of educational background on ICT awareness of students and scholars. The population of the study consisted of 500 scholars and students with differing educational levels. The study investigated such things as ownership of a computer, type of personal computer owned, knowhow of operating computers, ownership of email account and packages in personal computer and mobile handsets used. The study reveals that there is correlation between the educational status of the respondents and their awareness and use of ICT. This paper recommends that regular ICT education should be a made a compulsory part of curriculum in college and university education.

Keywords: Scholars, Students, Education, Information, Communication Technology, Skill

Download Full-Text

 

A Model Of Exponential Relationship To Estimate Leakage With Verilog Codes
M. Mohammadian , N. Mozayani and A. F. Nejad

Leakage current is becoming a very important factor today in determining the feasibility of designs. One of the problems that always exists in design is to find the leak using software tools. It is important to know the amount of leakage of your design components in advance, so that necessary changes can be made to the plan. Nevertheless the fundamental problem remains with implementation of the plan for the synthesis of the leak with simulation tools. In the method presented in this paper, using mathematical relationship and knowing the number of gates, we’ll calculate the amount of leakage of the circuit within a very short time with less than 10% error and without utilizing any specialized software. And at last we present a small algorithm that work by our purpose.

Keywords: potency of leakage, current of leakage, calculation error, exponential formula ,verilog codes

Download Full-Text

 

Optimization of Fabric Construction on the Language of a Network of Heterogeneous Information
Nasser Modiri and Hamdoollah Ghamgin

Nowadays, XML is one of the most important models for storing and communicating data. The flexibility of XML leads to be used commonly. The size of XML documents is increasing day to day. In order to manage these documents, an expressive system is needed because traditional file systems can’t manage such a huge volume of data. So, a lot of efforts have been done in this regard.On the one hand, by prevalent use of XML databases, it is needed to promote queries, and that is why most of the researchers concern to improve this aspect of XML. On the other hand, since XML structure is completely different from traditional relational databases, most methods are not efficient and have not been accepted as a standard for XML users, so the researchers have motivated more than the past.On the other aspect, hence XML has flexible structure, it could attract web designers to develop their web pages as XML format, and nowadays, too many XML web pages can be seen, so users expect to receive their query indexs as they could in the past, but there is less coherence among web page information than a unit database. As a index, in addition to accelerating queries, the coherence among indexs must be regarded in this case. Unfortunately, there are a lot of deficiencies among proposed methods. Each method just concerns few aspects of the problems, and it is used for specific queries, therefore; it’s not efficient for all kinds of queries, and no method has ever been proposed as a standard like SQL in relational database, and it could be said that XML has not reached to its own maturity, and it is hoped that the thesis could open a path even for the future. In this article we search the method that be profit for a big nods of queries the method compared with the other similar methods placed on achieving the numbers of fewer nods and in less time to reach the answer. The method had bin ability of modulate with similar methods index and be able to use it to accelerate the queries. Were looking for a method that can jump from node tobe useless and less than in similar fashion to produce an intermediate data. The method using a pattern matching method. Directly and blindly not processing nods in the documents.

Keywords: Pattern matching ,guide index table, Query optimization

Download Full-Text