Most of the clinical indices of blood flow are estimated from the spectrograms of Doppler ultrasound (DUS) signals. Any noise may degrade the readability of the spectrogram and the precision of the clinical indices, so the spectral augmentation plays an important role in the calculation of DUS spectrum. The proposed design employed Complex Fast Fourier Transform (CFFT), in a Digital Signal Processor (DSP) (TMS320C6711 DSK) based biomedical signal processing system, which results in reduction of computational time as well as processing time, since conventional methods involve FFT and Hilbert Transform techniques. Also, this system has been designed as open research platform, which can be programmable with a variety of novel algorithms like Gabor and Wavelet techniques for studying improved and resolved spectrograms to obtain accurate diagnostic details in the future.
{"title":"Doppler Spectrogram Calculation Using CFFT Algorithm in a Digital Signal Processor Based System","authors":"D. Balasubramaniam, D. Nedumaran","doi":"10.1109/AMS.2009.60","DOIUrl":"https://doi.org/10.1109/AMS.2009.60","url":null,"abstract":"Most of the clinical indices of blood flow are estimated from the spectrograms of Doppler ultrasound (DUS) signals. Any noise may degrade the readability of the spectrogram and the precision of the clinical indices, so the spectral augmentation plays an important role in the calculation of DUS spectrum. The proposed design employed Complex Fast Fourier Transform (CFFT), in a Digital Signal Processor (DSP) (TMS320C6711 DSK) based biomedical signal processing system, which results in reduction of computational time as well as processing time, since conventional methods involve FFT and Hilbert Transform techniques. Also, this system has been designed as open research platform, which can be programmable with a variety of novel algorithms like Gabor and Wavelet techniques for studying improved and resolved spectrograms to obtain accurate diagnostic details in the future.","PeriodicalId":6461,"journal":{"name":"2009 Third Asia International Conference on Modelling & Simulation","volume":"51 1","pages":"341-344"},"PeriodicalIF":0.0,"publicationDate":"2009-05-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76404404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper is focused on the development of supermarket models for managing store resources; the proposed approach is based on combining simulation, time series analysis and data fusion for creating forecasts able to support personnel organization. The model operates receiving data provided by the supermarket network; the time series data related to sales, working hour, customers and material flows are processed and then the forecasts are subjected to data fusion and combined with simulation expectation of workloads. The model provides forecasts of the total operative workload for planning activities in supermarkets; in addition the proposed approach allows to estimate future values for target functions such as sales and productivity and to compare historical data in order to adopt predictive resource and policy management. The proposed model is based on a special architecture developed ad hoc by the authors for managing retail networks.This architecture has been implemented using Web technologies providing an easy access for final users to all the predictive models and algorithms. An important added value of this research is related to the identification and definition of new KPI (Key Performance Index) devoted to validate and tune up the model as well as to support management in supermarket. This system was applied to a real case study involving one of the biggest retail company in Italy.
{"title":"Renovating Intelligent Operations in Supermarket Chains","authors":"A. Bruzzone, E. Bocca, Simonluca Poggi","doi":"10.1109/AMS.2009.98","DOIUrl":"https://doi.org/10.1109/AMS.2009.98","url":null,"abstract":"This paper is focused on the development of supermarket models for managing store resources; the proposed approach is based on combining simulation, time series analysis and data fusion for creating forecasts able to support personnel organization. The model operates receiving data provided by the supermarket network; the time series data related to sales, working hour, customers and material flows are processed and then the forecasts are subjected to data fusion and combined with simulation expectation of workloads. The model provides forecasts of the total operative workload for planning activities in supermarkets; in addition the proposed approach allows to estimate future values for target functions such as sales and productivity and to compare historical data in order to adopt predictive resource and policy management. The proposed model is based on a special architecture developed ad hoc by the authors for managing retail networks.This architecture has been implemented using Web technologies providing an easy access for final users to all the predictive models and algorithms. An important added value of this research is related to the identification and definition of new KPI (Key Performance Index) devoted to validate and tune up the model as well as to support management in supermarket. This system was applied to a real case study involving one of the biggest retail company in Italy.","PeriodicalId":6461,"journal":{"name":"2009 Third Asia International Conference on Modelling & Simulation","volume":"58 1","pages":"425-430"},"PeriodicalIF":0.0,"publicationDate":"2009-05-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73823708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A criticism of Evolutionary Algorithms might be the lack of efficient and robust generic methods to handle constraints. The most widespread approach for constrained search problems is to use penalty methods, because of their simplicity and ease of implementation. Nonetheless, the most difficult aspect of the penalty function approach is to find an appropriate penalty parameters. In this paper, a method combining the new Non-dominated Ranked Genetic Algorithm (NRGA), with a parameterless penalty approach are exploited to devise the search to find Pareto optimal set of solutions. The new Parameterless Penalty and the Nondominated Ranked Genetic Algorithm (PP-NRGA) continuously find better Pareto optimal set of solutions. This new algorithm have been evaluated by solving four test problems, reported in the multi-objective evolutionary algorithm (MOEA) literature. Performance comparisons based on quantitative metrics for accuracy, coverage, and spread are presented.
{"title":"Solving Constrained Multi-objective Optimization Problems Using Non-dominated Ranked Genetic Algorithm","authors":"O. Jadaan, C. R. Rao, L. Rajamani","doi":"10.1109/AMS.2009.38","DOIUrl":"https://doi.org/10.1109/AMS.2009.38","url":null,"abstract":"A criticism of Evolutionary Algorithms might be the lack of efficient and robust generic methods to handle constraints. The most widespread approach for constrained search problems is to use penalty methods, because of their simplicity and ease of implementation. Nonetheless, the most difficult aspect of the penalty function approach is to find an appropriate penalty parameters. In this paper, a method combining the new Non-dominated Ranked Genetic Algorithm (NRGA), with a parameterless penalty approach are exploited to devise the search to find Pareto optimal set of solutions. The new Parameterless Penalty and the Nondominated Ranked Genetic Algorithm (PP-NRGA) continuously find better Pareto optimal set of solutions. This new algorithm have been evaluated by solving four test problems, reported in the multi-objective evolutionary algorithm (MOEA) literature. Performance comparisons based on quantitative metrics for accuracy, coverage, and spread are presented.","PeriodicalId":6461,"journal":{"name":"2009 Third Asia International Conference on Modelling & Simulation","volume":"10 1","pages":"113-118"},"PeriodicalIF":0.0,"publicationDate":"2009-05-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81085299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Internet modelling research has worked out its own problem domain. It unites the results and methods of fundamental sciences as physics, chemistry, and quantum mechanics, so exotic mathematically poor described neurophysiology together with rapidly developing knowledge engineering. Global scientists’ cooperation leads to creation of multimedia systems, representing Internet cognitive interface, and new theoretical methods for knowledge discovery. Hidden Markov chains with complex topology are important theoretical base stone of knowledge discovery technology. Research meta-model with hidden Markov chain for Internet multimedia interface is suggested. On the base of Internet modelling the approach for quantum mechanics and information theory logic monotony knowledge fusion was suggested. It was demonstrated for uncertainty relation of quantum mechanics and Shannon information measure by applying lifting lemma to Internet modelling domain, that logic monotony of Internet knowledge base had been preserved.
{"title":"Meta-model Design for Internet Multimedia Neurophysiology Interface","authors":"A. P. Kamyshanov","doi":"10.1109/AMS.2009.31","DOIUrl":"https://doi.org/10.1109/AMS.2009.31","url":null,"abstract":"Internet modelling research has worked out its own problem domain. It unites the results and methods of fundamental sciences as physics, chemistry, and quantum mechanics, so exotic mathematically poor described neurophysiology together with rapidly developing knowledge engineering. Global scientists’ cooperation leads to creation of multimedia systems, representing Internet cognitive interface, and new theoretical methods for knowledge discovery. Hidden Markov chains with complex topology are important theoretical base stone of knowledge discovery technology. Research meta-model with hidden Markov chain for Internet multimedia interface is suggested. On the base of Internet modelling the approach for quantum mechanics and information theory logic monotony knowledge fusion was suggested. It was demonstrated for uncertainty relation of quantum mechanics and Shannon information measure by applying lifting lemma to Internet modelling domain, that logic monotony of Internet knowledge base had been preserved.","PeriodicalId":6461,"journal":{"name":"2009 Third Asia International Conference on Modelling & Simulation","volume":"43 1","pages":"632-636"},"PeriodicalIF":0.0,"publicationDate":"2009-05-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82224586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Z. Oplatková, Jiri Holoska, I. Zelinka, R. Šenkeřík
The paper deals with detection of steganography content. Steganography is an additional method in cryptography which helps to hide coded messages inside pictures or videos. To hide a message is very important but also revealing such content is important to avoid of usage by jailbirds. The revealing of steganography is not easy. This paper shows how neural networks are able to detect steganography content coded by a program OutGuess and Steghide using neural networks like taxonomist. Training sets were created from clear and coded pictures with different length of inserted message. Neural networks are methods which are very flexible in learning to different and difficult problems. Results in this paper show that used models had almost 100 % success in steganography detection of messages inserted by OutGuess and Steghide.
{"title":"Detection of Steganography Inserted by OutGuess and Steghide by Means of Neural Networks","authors":"Z. Oplatková, Jiri Holoska, I. Zelinka, R. Šenkeřík","doi":"10.1109/AMS.2009.28","DOIUrl":"https://doi.org/10.1109/AMS.2009.28","url":null,"abstract":"The paper deals with detection of steganography content. Steganography is an additional method in cryptography which helps to hide coded messages inside pictures or videos. To hide a message is very important but also revealing such content is important to avoid of usage by jailbirds. The revealing of steganography is not easy. This paper shows how neural networks are able to detect steganography content coded by a program OutGuess and Steghide using neural networks like taxonomist. Training sets were created from clear and coded pictures with different length of inserted message. Neural networks are methods which are very flexible in learning to different and difficult problems. Results in this paper show that used models had almost 100 % success in steganography detection of messages inserted by OutGuess and Steghide.","PeriodicalId":6461,"journal":{"name":"2009 Third Asia International Conference on Modelling & Simulation","volume":"2 1","pages":"7-12"},"PeriodicalIF":0.0,"publicationDate":"2009-05-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87683250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Fault tolerance is an important aspect of real-time control systems, due to unavoidable timing constraints. In this paper, the timing problem of a set of concurrent periodic tasks is considered where each task has primary and alternate versions. In the literature, probability of fault in the alternate version of a task is assumed to be zero. Here, a fault probability with uniform distribution has been used. In addition, to cover the situations in which both versions are scheduled with some time overlapping, a criterion is defined for prioritizing primary version against the alternate version. A new scheduling algorithm is proposed based on the defined criterion. Simulation results show that an increase in the number of executed primary tasks which improves the efficiency of processor utilization, hence prove the efficiency of the proposed algorithm.
{"title":"A Modified BCE Algorithm for Fault-Tolerance Scheduling of Periodic Tasks in Hard Real-Time Systems","authors":"Meysam Asadi, M. Menhaj, Ehsan Yavari","doi":"10.1109/AMS.2009.63","DOIUrl":"https://doi.org/10.1109/AMS.2009.63","url":null,"abstract":"Fault tolerance is an important aspect of real-time control systems, due to unavoidable timing constraints. In this paper, the timing problem of a set of concurrent periodic tasks is considered where each task has primary and alternate versions. In the literature, probability of fault in the alternate version of a task is assumed to be zero. Here, a fault probability with uniform distribution has been used. In addition, to cover the situations in which both versions are scheduled with some time overlapping, a criterion is defined for prioritizing primary version against the alternate version. A new scheduling algorithm is proposed based on the defined criterion. Simulation results show that an increase in the number of executed primary tasks which improves the efficiency of processor utilization, hence prove the efficiency of the proposed algorithm.","PeriodicalId":6461,"journal":{"name":"2009 Third Asia International Conference on Modelling & Simulation","volume":"34 1","pages":"287-291"},"PeriodicalIF":0.0,"publicationDate":"2009-05-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85207349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Cognitive radio has the ability to sense the environment and adapt its behavior to optimize communication features, such as quality of service in the presence of interference and noise. In physical layer to achieve this goal, different phases of sensing, channel estimation, and configuration selection are necessary. The sensing part measures the interference level, recognize the spectrum holes, and send this information to Channel estimator. In the next step, channel state information (CSI) is used for data detection and also sent to the transmitter through a limited feedback. CSI feedback consists of achievable rate, SNR value, modulation or coding schemes (MCS). Feedback link improves the system performance in the cost of complexity and delay. In this paper, we present and compare different feedback schemes for cognitive radio and study the channel capacity when an imperfect feedback link is corrupted by noise and delay.
{"title":"CSI Feedback Model in the Context of Adaptive Cognitive Radio Systems","authors":"H. Hosseini, A. Zamani, S. Yusof, N. Fisal","doi":"10.1109/AMS.2009.30","DOIUrl":"https://doi.org/10.1109/AMS.2009.30","url":null,"abstract":"Cognitive radio has the ability to sense the environment and adapt its behavior to optimize communication features, such as quality of service in the presence of interference and noise. In physical layer to achieve this goal, different phases of sensing, channel estimation, and configuration selection are necessary. The sensing part measures the interference level, recognize the spectrum holes, and send this information to Channel estimator. In the next step, channel state information (CSI) is used for data detection and also sent to the transmitter through a limited feedback. CSI feedback consists of achievable rate, SNR value, modulation or coding schemes (MCS). Feedback link improves the system performance in the cost of complexity and delay. In this paper, we present and compare different feedback schemes for cognitive radio and study the channel capacity when an imperfect feedback link is corrupted by noise and delay.","PeriodicalId":6461,"journal":{"name":"2009 Third Asia International Conference on Modelling & Simulation","volume":"22 1","pages":"681-686"},"PeriodicalIF":0.0,"publicationDate":"2009-05-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90454279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Knowledge management is very important factor for organization success in present competitive world. Because implementation of knowledge management is always influenced by various factors, identification and taxonomy of these factors have positive effects on successful implementation of knowledge management. In this paper fuzzy analytical hierarchy process (FAHP) method is exploited as a means of key effective factors evaluation methodology to prioritize and organize factors faced in knowledge management processes. Key knowledge management factors are studied for 33 knowledge-based organizations in Iran that identifies 3 general dimensions affecting knowledge management (human, technology and organization). Then expert qualitative judgments about these factors are acquired. Translating these judgments to fuzzy numbers and using them as an input to FAHP, key effective factors are then ranked and prioritized by FAHP in order to focus on important factors that influence on knowledge management implementation successfully.
{"title":"Evaluating Effective Factors of Implementing Knowledge Management Based on FAHP Method","authors":"K. Rezaie, M. Byat, S. N. Shirkouhi","doi":"10.1109/AMS.2009.70","DOIUrl":"https://doi.org/10.1109/AMS.2009.70","url":null,"abstract":"Knowledge management is very important factor for organization success in present competitive world. Because implementation of knowledge management is always influenced by various factors, identification and taxonomy of these factors have positive effects on successful implementation of knowledge management. In this paper fuzzy analytical hierarchy process (FAHP) method is exploited as a means of key effective factors evaluation methodology to prioritize and organize factors faced in knowledge management processes. Key knowledge management factors are studied for 33 knowledge-based organizations in Iran that identifies 3 general dimensions affecting knowledge management (human, technology and organization). Then expert qualitative judgments about these factors are acquired. Translating these judgments to fuzzy numbers and using them as an input to FAHP, key effective factors are then ranked and prioritized by FAHP in order to focus on important factors that influence on knowledge management implementation successfully.","PeriodicalId":6461,"journal":{"name":"2009 Third Asia International Conference on Modelling & Simulation","volume":"11 1","pages":"398-403"},"PeriodicalIF":0.0,"publicationDate":"2009-05-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88723822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The former, which is defined as modeling of machining processes, is essential to provide the basic mathematical models for formulation of the certain process objective functions. With conventional approaches such as Statistical Regression technique, explicit models are developed that required complex physical understanding of the modeling process. With non conventional approaches or Artificial Intelligence techniques such as Artificial Neural Network, Fuzzy Logic and Genetic Algorithm based modeling, implicit model are created within the weight matrices of the net, rules and genes that is easier to be implemented. With the focus on surface roughness performance measure, this paper outlines and discusses the concept, application, abilities and limitations of Artificial Neural Network in the machining process modeling. Subsequently the future trend of Artificial Neural Network in modeling machining process is reported.
{"title":"Review of ANN Technique for Modeling Surface Roughness Performance Measure in Machining Process","authors":"A. Zain, H. Haron, S. Sharif","doi":"10.1109/AMS.2009.78","DOIUrl":"https://doi.org/10.1109/AMS.2009.78","url":null,"abstract":"The former, which is defined as modeling of machining processes, is essential to provide the basic mathematical models for formulation of the certain process objective functions. With conventional approaches such as Statistical Regression technique, explicit models are developed that required complex physical understanding of the modeling process. With non conventional approaches or Artificial Intelligence techniques such as Artificial Neural Network, Fuzzy Logic and Genetic Algorithm based modeling, implicit model are created within the weight matrices of the net, rules and genes that is easier to be implemented. With the focus on surface roughness performance measure, this paper outlines and discusses the concept, application, abilities and limitations of Artificial Neural Network in the machining process modeling. Subsequently the future trend of Artificial Neural Network in modeling machining process is reported.","PeriodicalId":6461,"journal":{"name":"2009 Third Asia International Conference on Modelling & Simulation","volume":"44 1","pages":"35-39"},"PeriodicalIF":0.0,"publicationDate":"2009-05-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80972735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Handoff is the mechanism that transfers an ongoing call from one channel to another channel within a cell/sector or when user moves from one cell to another cell. Handoff is the key operation in cellular mobile communication system, which is accomplished by the system and is un-perceptible for the user. In this paper, handoff mechanism is analyzed on the basis of received signal strength from the two base stations with different transmitted powers and results are plotted with respect to distance using the Mat Lab code. It is also investigated, how call can lose the channel without transferring the call to the next channel. An algorithm and to avoid such condition is also proposed.
{"title":"New Handoff Initiation Algorithm for Cellular Mobile Communication","authors":"G. Tomar","doi":"10.1109/AMS.2009.11","DOIUrl":"https://doi.org/10.1109/AMS.2009.11","url":null,"abstract":"Handoff is the mechanism that transfers an ongoing call from one channel to another channel within a cell/sector or when user moves from one cell to another cell. Handoff is the key operation in cellular mobile communication system, which is accomplished by the system and is un-perceptible for the user. In this paper, handoff mechanism is analyzed on the basis of received signal strength from the two base stations with different transmitted powers and results are plotted with respect to distance using the Mat Lab code. It is also investigated, how call can lose the channel without transferring the call to the next channel. An algorithm and to avoid such condition is also proposed.","PeriodicalId":6461,"journal":{"name":"2009 Third Asia International Conference on Modelling & Simulation","volume":"19 1","pages":"716-719"},"PeriodicalIF":0.0,"publicationDate":"2009-05-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80981483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}