Volume 2 Issue 12
Authors: Weigong Peng; Chunguang Li
Abstract: Cleaner production is the best mode of industrial pollution prevention, and is the important action to transform the pattern of economic growth and dominant idea to realize sustainable development of aviation industry. The Fuzzy-Soft comprehensive evaluation model is built for cleaner production evaluation in aviation industry to reflect the cleaner production condition of enterprise in a certain extent. This evaluation method is demonstrated by an example. It shows that Fuzzy-Soft comprehensive evaluation method can be applied in the field of cleaner production evaluation in aviation industry.
Keywords: Fuzzy-Soft Comprehensive Evaluation Mode; Weights Allocation; Evaluation Index; Production Management
Authors: Dongju Li; Han Qiao
Abstract: Since the international financial crisis in 2008, active fiscal policy has been taken to respond the impact on economy in China. Accordingly, as one of the measures of the active fiscal policy, the issuance of the national debt played an active role in the financial crisis. In 2011, some scholars in China believe that the active fiscal policy should be stopped gradually with the pressure of the higher CPI and inflation. In this paper, we choose the period from the time when China began its reform and opening up to nowadays as the studying time section, and take the national debt dependence degree Y as the dependent variable and the national debt dependence degree Y-1, the macroscopic tax rate X1, and the fiscal income centralization degree X2 as the independent variable. According to BOX-COX transformation and Cointegration theory, we found that the macroscopic tax rate had a positive effect on the national debt dependence degree, which was weaker than the negative effect of the fiscal income centralization degree.
Keywords: Fiscal Policy; National Debt Dependence Degree; Cointegration Theory
Authors: Dongxiao Wang; Aiyun Jin
Abstract: Synchronization phenomena in coupled chaotic systems have been extensively studied during the last decade due to their theoretical challenge and great potential applications in secure communication and modeling brain activity. Based on stability theory and Lyapunov method, we provide two schemes for synchronization of a hyperchaotic system. The first schemes synchronizing the hyperchaotic system with three controllers, the second schemes based on a back stepping procedure, the response system needs only one single controller to realize synchronization no matter how many dimensions the chaotic system contains. Numerical simulations have verified the effectiveness of the method.
Keywords: Synchronization; Hyperchaotic Systems; Controller
Authors: Zhe Wang
Abstract: Learning strategies play an important role in the process of foreign/second language learning, especially in learning vocabulary. Domestic researchers and those abroad have been studying vocabulary learning strategies, and made some achievements. Yet most of them have some restrictions more or less. Thus it is of necessity to research into more comprehensive learning strategies employed by postgraduates of non-English majors, including metacognitive learning strategies, cognitive learning strategies and social/affective level. This paper discusses the overall learning strategies at the above three levels in details, and the similarities and differences in English vocabulary learning strategies between postgraduates of the humanities and those of sciences and engineering. Meanwhile the author presents teaching administration implications.
Keywords: Learning; Strategies; Vocabulary; Teaching Administration
Authors: Xufeng Chen; Sen Qin; Yan Lan
Abstract: Consider an on-line dynamic machine covering problem, in which jobs arrive over time and might depart at some unknown later time. Upon the arrival of a job, its weight and reassignment cost are known, the objective is to maximize the minimum machine load. The on-line scheduler is allowed to migrate jobs between machines when a new job arrives or an old job leaves, however the total reassignment cost incurred by a specific job is bounded. In this paper, we focus two different reassignment cost models on the two machines. First, we study the uniform reassignment cost model, where the reassignment cost of each job is uniform. Then we develop an on-line algorithm whose competitive ratio is of 2 with migration factor 3. Next, the proportional reassignment cost model is dealt with, where the reassignment cost of a job is proportional to its weight. Based on the model, a 2-competitive on-line algorithm with migration factor 5 is proposed.
Keywords: Combinatorial Optimization; Online Scheduling; Machine Covering; Competitive Ratio; Migration
Authors: Dimin Wu; Zhengzhi Wang
Abstract: Geometric algebra (GA) is a concise representational and computational system for geometry. In this paper, a modified GA strapdown inertial navigation system (SDINS) model is developed. The attitude updating is combined with the velocity/position updating to enhance the precision of navigation. The Adams method is adopted to replace the Runge-Kutta method in the integration of the motor kinematic equations. A variety of simulations are carried out to testify the model and algorithm presented in this paper. The results show that the modified GA SDINS model is more precise than the original one, and the Adams-based GA SDINS algorithm can improve the efficiency remarkably. The Adams-based algorithm could be a better choice for SDINS with high-efficiency and low-maneuver requirements.
Keywords: Geometric Algebra; Strapdown Navigation; Motor Kinematic Equation; Adams Method
Authors: Ryan Benton; Itthichok Jangjaimon; Gui-Liang Feng
Abstract: In this paper, we consider the content distribution problem over wireless mesh networks, which are characterized by the broadcast nature of the medium and significant data redundancy. One potential solution is network coding [6, 7], which has been recently been receiving interest [1-5] within the wireless community. This paper describes an efficient algebraic wireless network coding scheme, which utilizes special matrices to ensure linear independence of code vector. Unlike random coefficient network coding [1], our scheme is able to provide fast coding for small number of packets usually required by real-time application. In addition, the proposed scheme obtains great improvement in computational speed by avoiding the use of Gaussian elimination when generating linear independent code vectors.
Keywords: Galois Field; Gaussian Elimination; Linear Combination; Network Coding; Reed-Solomon Codes; Wireless Communication
Authors: Mohammed Yebari; Mohamed Essaaidi
Abstract: While wireless sensor networks (WSN) have limited bandwidth and low transmission rate, in-network processing requires handling sensors nodes which are battery powered, thus their constrained energy must be used judiciously so as to extend the effective network lifetime. In this paper, we propose a modified clustering algorithm based on Stochastic Clustering in WSN with Energy Distributed Heterogeneity (SCEDH) with a three-level node energy setting. Simulation results show that SCEDH outperforms other protocols like SDEEC by achieving longer lifetime considering the first and last dying nodes.
Keywords: Wireless Sensor Network; Network Lifetime; Random Topology; Clustering; Heterogeneity
Authors: Ahmed Ziani; Abdellatif Medouri
Abstract: Bit-error rate (BER) performance of the proposed Rake receiver for asynchronous direct sequence code-division multiple access (DS-CDMA) downlink system is investigated in this paper by computer simulations. The system performance is evaluated for both additive white Gaussian noise (AWGN) channel and multipath fading channel in the Presence of Multiuser Interference (MUI). Channel estimation using the dedicated pilot channel, called Common Pilot Channel (CPICH) is also presented.
Keywords: DS-CDMA; RAKE Receiver; Multi-User; BER, MRC; Zero- Padding
Authors: Ahmed Nait-Sidi-Moh; Jaafar Gaber; Maxime Wack
Abstract: This paper deals with the specification, modelling and implementation of a pedagogic information system. In this context, a pervasive e-learning application is developed and its behaviour is described using a formal-based model. The application is mainly based on the cooperative navigation into pervasive environments, and using Web information spaces. The proposed modelling approach, in this paper, is based on Petri nets. This graphical tool has been used as a powerful graphical modelling language during the three last decades. The analysis techniques and mathematical background they propose allow graphical and analytical verification and validation of many relevant properties of systems’ behaviour. Their powerful modelling allows a graphical description including various phenomena such as synchronization, parallelism, concurrency and resource sharing. The models and associated results, we develop in this paper, point out a very clear trade-off between expressive power, analysability and model consistency. After the modelling and analysis phase, the application is implemented and deployed on a specific platform. This implementation is started with a conceptual analysis study. Then, Java technologies, XML language and Oracle data base are used to design the application.
Keywords: E-learning System; Cooperative Web-Navigation; Web Services; Petri Nets; Modelling and Evaluation; Implementation
Authors: Zahi Jarir; Rida Zoubairi; Mohammed Erradi
Abstract: Advances in mobile computing have encouraged the publication of a large number of mobile services by service providers. In such a competitive business environment, quality of service (QoS) is becoming a key feature to provide the most appropriate needed service to mobile clients according to their requirements. However, managing QoS represents a critical and significant challenge in the mobile computing because of the dynamic nature of mobile environment. In addition, service providers can use different and non-standard QoS parameters to describe QoS properties of a published service. At this end, and based on MAQAME Architecture suggested in our previous work, our current contribution is to implement QoS Management System which is responsible to propose the most appropriate service in term of QoS among the provided local mobile services. This implementation uses Devices Profile for Web Services (DPWS) specification, WS-Policy for QoS policy specification and Apache Neethi for policy processing.
Keywords: Dynamic Adaptation ; QoS Management ; Mobile Environment ; Mobile services
Authors: Saiful Azhar Norhanipah; Teddy Mantoro; Media A. Ayu; Ahmad Fakhrurrazi Bidin
Abstract: The major problem in DNS as originally specified in RFC 1035 is that it does not offer any form of security and it is vulnerable to spoofing, man-in-the-middle and cache poisoning attacks. This kind of attacks can compromise all communications to the host that initiate any connection that requires address translation. The threats from a certain attack on DNS are common and although several tools or devices have been introduced, it still needs to have a better solution in overcoming the issues. At the same time, there are several factors that preventing a widespread implementation of the DNSSEC, such as security testing, performance evaluation and used functionality testing. This paper proposed a framework and an implementation of DNSSEC on IPv6 environment based on the specifications for iDNSSEC on RFC 4033, 4044 and 4055. This implementation of the DNSSEC framework on IPv6 environment provides origin authentication of DNS data, data integrity, and authenticated denial of existence to protect the internet infrastructure further from malicious attacks. The prototype functionality and security testing and the performance evaluation are also presented in this paper.
Keywords: DNSSEC; DNSKEY; RRSIG; NSEC; Digital Signatures