|Title: Modified Ant Colony Optimization for Solving Traveling Salesman Problem|
|Author(s): Kanar Shukr Mohammed|
|Pages: 1-5||Paper ID: 131105-9494-IJECS-IJENS||Published: October, 2013|
Abstract: This paper presents a new algorithm for solving the Traveling Salesman Problem (NP- hard problem) using pheromone of ant colony depends on the pheromone and path between cites. TSP is a problem in theoretical computer science which is very hard to solve a number of real-world problems can be formalized as TSP problems, and ants of the colony are able to generate successively shorter feasible tours by using information accumulated in the form of a pheromone trail deposited on the edges of the TSP and improves ACO by taking under consideration the overall path of cities in candidate list. Sometimes choosing minimum distance isn't a guaranty that’s a best path. The experimental results on large set of samples indicate that the new approach is better than the original one for finding optimal solutions of the (TSP) in less time as compared to results achieved by applying basic idea of ACO algorithm.
|Keywords: Modified Ant Colony System, Traveling Sales man Problem|
|Full Text (.pdf) | 525 KB|
|Title: EMI Prevention of CAN-Bus-Based Communication in Battery Management Systems|
|Author(s): Chin-Long Wey, Chung-Hsien Hsu, Kun-Chun Chang, Ping-Chang Jui, Muh-Tian Shiue|
|Pages: 6-12||Paper ID: 131805-7070-IJECS-IJENS||Published: October, 2013|
Abstract: Controller Area Network (CAN) bus has been popularly employed in most of vehicles and it will be heavily involved to the electric vehicle (EV) applications. A vehicle is a noisy system, with electromagnetic interference (EMI) over a wide range of frequencies. EMI generated by the inductive loads is the major cause of performance degradation of CAN bus communications. In order to enhance and protect the reliability and robustness of the CAN bus communication and to maintain safe operation of the battery stack, galvanic isolator is required for the data transmission. This study compares two different galvanic isolators, Optocoupler and Digital Isolator, and three different isolation schemes are evaluated by their protection capability for various EMI affected signals. The best isolation scheme has been recommended for EMI prevention of the CAN-bus-based BMS.
|Keywords: Controller Area Network (CAN), Battery Management System (BMS), Electromagnetic Interference (EMI), Galvanic Isolators, Electrical Vehicle.|
|Full Text (.pdf) | 1,245 KB|
|Title: Membership Function Modification in Fuzzy SVM using Combination of Distance Feature, Correlation, and Depth of Data|
|Author(s): M. Rahmat Widyanto, Rini Wijayanti|
|Pages: 13-19||Paper ID: 132205-7474-IJECS-IJENS||Published: October, 2013|
Abstract: In this paper, we proposed the membership function modification in Fuzzy Support Vector Machine (Fuzzy SVM) based on exponential distribution function. This function is expressed as the level of training data contribution to its class model building. It is formed prior to training phase and started with checking and handling the missing values. Afterwards is the formation of fuzzy variables based on the distance feature, correlation, and the depth of data to be formalized into the exponential distribution function. The experiments results show that the proposed method has a higher accuracy about 2% compared to conventional SVM and Fuzzy SVM. This method is expected more contributed in the development of various pattern recognition applications, which more demand on higher accuracy.
|Keywords: Fuzzy, svm, feature combination.|
|Full Text (.pdf) | 669 KB|
|Title: Online Impersonation A Case Study in the Hashemite Kingdom of Jordan|
|Author(s): Hiyam S. Ensour|
|Pages: 20-25||Paper ID: 132805-4949-IJECS-IJENS||Published: October, 2013|
Abstract: Impersonation is a type of electronic crimes, whereby it is easy to steal, quote or amend with the availability of free relevant software makes it tempting to the criminal who obtains access to steal information and reuse it again . Therefore, the criminal steals personal information, for example, easily without effort or even planning in some cases, and later impersonates and owns such information and poses online on behalf of the owner without the latter's knowledge or approval, and all this can be done using relevant and smart software that facilitate stealing and impersonation. Impersonation is classified among modern crimes whose prevalence has increased significantly due to the expansions and developments in the use of the Internet technology. Further, this crime cannot be blocked by any type of legal, geographic or ethical borders. This paper addresses a number of questions including: how do we identify an impersonator? Where is the location of impersonation? What are the harms of impersonation? What is the effect of this crime on others? Does it represent a real crime online? What are the far-reaching problems caused by impersonation and what is the solution? And how can we protect ourselves from impersonators?
|Keywords: Internet, Ethics, Crime, Online, and Impersonators.|
|Full Text (.pdf) | 371 KB|
|Title: A Programming Approach for the Digital Quran Applications|
|Author(s): Zameer Ahmed Adhoni, Abdul Ahad Siddiqi|
|Pages: 26-35||Paper ID: 1310105-9494-IJECS-IJENS||Published: October, 2013|
Abstract: The advent of online digital Quran and an increase of online Quran learners worldwide, have resulted the invention of number of IT (Information Technology) applications that ease the retrieval of knowledge from the Quran, being the major source of authentic and un-altered Islamic knowledge. In this paper, we describe a cloud-based programming approach, which aims at providing a unifying framework for building Quran related applications. The proposed approach includes design and development of APIs for all necessary components for searching, reading, annotation, building mobile applications and social networks around the central theme of Quran. A salient feature of the proposed API is the ability to retrieve Quranic verses in Arabic using search phrases in languages other than Arabic.. In this paper, we describe the core components and design patterns of the proposed API with emphasis on key design criteria. These criteria aim at providing the necessary scalability and performance on the one hand, and quality assurance of the Quranic text on the other. In addition, a prototype application that leverages the API along with test results is also presented.
|Keywords: Digital Quran, Cloud computing, API, Portal.|
|Full Text (.pdf) | 1,316 KB|
|Title: Universal Mobility-Field Curves For Electrons In Polysilicon Inversion Layer|
|Author(s): M. I. Idris, Faiz Arith, S. A. M. Chachuli, H. H. M. Yusof, M. M. Ismail|
|Pages: 36-40||Paper ID: 1312703-1305-9494-IJECS-IJENS||Published: October, 2013|
Abstract: This paper reports the studies on the inversion-layer mobility in n-channel Poly-Si TFT’s with 1016cm-3 substrate impurity concentration. The validity and limitations of the universal relationship between the inversion layer mobility and the effective normal field (Eeff) was examined.
|Keywords: TFT, Grain boundaries, carrier mobility, polysilicon.|
|Full Text (.pdf) | 698 KB|