{"title":"A Weighted Residual Quadratic Acceleration Time Integration Method in Nonlinear Structural Dynamics","authors":"A. Gholampour, M. Ghassemieh","doi":"10.1109/ICCRD.2010.123","DOIUrl":"https://doi.org/10.1109/ICCRD.2010.123","url":null,"abstract":"A new method is proposed for the direct time integration method for nonlinear structural dynamics problems. In the proposed method which includes an extensive family of direct time integration, the order of the time integration scheme is higher than the classical methods. This method assumes quadratic variation of the acceleration at each time step. The result obtained from this new higher order method is compared with two classical explicit methods; namely the central difference method and the Newmark's method (linear acceleration method). Due to increase in order of variations of acceleration, this method has higher accuracy than classical methods. Proposed method includes a family of conditionally stable methods. The numerical dispersion of the proposed method is far less than of those classical methods.","PeriodicalId":158568,"journal":{"name":"2010 Second International Conference on Computer Research and Development","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128327151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Least Attained Service Queue Management for ns-2 Network Simulator","authors":"Naeem Khademi, M. Othman","doi":"10.1109/ICCRD.2010.91","DOIUrl":"https://doi.org/10.1109/ICCRD.2010.91","url":null,"abstract":"Network simulator (ns-2) has been accepted as a de facto standard tool for networking research among academicians. Currently, multiple popular queuing and scheduling policies are implemented in ns-2 such as DropTail, Random Early Detection (RED), priority and fair queuing to provide the facility to simulate the network operation. Least Attained Service (LAS) is a preemptive scheduling policy that favors short jobs without prior knowledge of the job sizes. The employment of LAS and its variants has received attention in recent years due to their ability to provide interactivity and fairness in wired as well as wireless networks. In this paper we present a novel implementation of LAS and one of its variants, Threshold-based LAS (TLAS) in ns-2 and we validate them by different simulation scenarios.","PeriodicalId":158568,"journal":{"name":"2010 Second International Conference on Computer Research and Development","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128708456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reducing Message Overhead of AODV Routing Protocol in Urban Area by Using Link Availability Prediction","authors":"R. Ghanbarzadeh, M. Meybodi","doi":"10.1109/ICCRD.2010.21","DOIUrl":"https://doi.org/10.1109/ICCRD.2010.21","url":null,"abstract":"Mobile ad hoc networks are special kind of wireless networks, there is no fixed structure in these networks but they have nodes movement ability that add their complexity. These networks are established without defined structure and mostly used in military services, rescue operation in damaged areas, conferences and etc. According to these networks characteristics, different routing protocols have been proposed, it can be addressed to AODV protocol. In this paper we have optimized AODV routing protocol performance by using link availability prediction in urban area by Hello message mechanism. In order to modeling urban area we employed Manhattan mobility model for node's movement. The results of simulations show that new method reduces message overhead and average of broken links metrics relative to classic AODV algorithm.","PeriodicalId":158568,"journal":{"name":"2010 Second International Conference on Computer Research and Development","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129243388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. R. Jamaluddin, M. Hanafiah, S. Radzi, Muhammad Izzat Zulkifly, A. M. Noor
{"title":"Promoting E-commerce through E-learning","authors":"M. R. Jamaluddin, M. Hanafiah, S. Radzi, Muhammad Izzat Zulkifly, A. M. Noor","doi":"10.1109/ICCRD.2010.75","DOIUrl":"https://doi.org/10.1109/ICCRD.2010.75","url":null,"abstract":"e-Learning has become a major tool to facilitate education. The education process becomes easier with the functions provided by e-Learning. UiTM has promoted e-Learning for educational purpose since 2005 to complement face-to-face classrooms teaching and learning. This survey exposed the students to the interactive learning by adopting course forum for student's participation. The aim is to familiarize and encourage participation in i-learn. Students need to participate in e-Commerce forum where they need to advertise and sell products in the e-Commerce forum. The survey conducted for four months and found that student's participation in the five parameters set by the instructor is quite satisfactory however most of the students still prefer face-to-face interactions for buying goods. Other than that, this survey recommend that the use of interactive learning must be promoted aggressively because students will use technology wisely if the right platform is provided to them.","PeriodicalId":158568,"journal":{"name":"2010 Second International Conference on Computer Research and Development","volume":"231 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130596157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"MWUs Extraction Based on Continuous Measurement of Inter-word Association with Frequency Adjustment","authors":"Zhifei Wang, Yue Chen, Xiaoyu Jiang","doi":"10.1109/ICCRD.2010.140","DOIUrl":"https://doi.org/10.1109/ICCRD.2010.140","url":null,"abstract":"Extracting Multi-Word Units (MWUs) from raw text is a significant problem in natural language processing due to MWUs describe concept more accurate than single word. The statistical methods such as Mutual Information, Log- Likelihood Ratio and Chi-Squared test etc., rely on frequency of words extremely because the component words of MWUs tend to co-occur more often, and that the main components of multi-word phrase are the core terms in the text document. These core terms have a very high frequency generally and their word-building powers are very strong, so the frequency of these core terms is far higher than other component words of MWUs, and thus reduce the accuracy of the method. We proposed a method to adjust the frequency of the core words. Experimental results show that the method significantly improved the recall of the multi-word combinations and preserving the precision.","PeriodicalId":158568,"journal":{"name":"2010 Second International Conference on Computer Research and Development","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128127978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Synthesis of Data-Parallel Algorithms for Programmable Logic Devices","authors":"I. Damaj","doi":"10.1109/ICCRD.2010.65","DOIUrl":"https://doi.org/10.1109/ICCRD.2010.65","url":null,"abstract":"Behavioral high-level hardware design tools are currently considered powerful and can largely facilitate the hardware development cycle as a whole. Modern hardware design tools can target high-density programmable logic devices, such as, Field Programmable Gate Arrays. Currently, hardware/software co-design is witnessing a growing focus on finding alternative methods that could further improve the design process. In this paper, we explore the effectiveness and extend a formal methodology for hardware design. The method adopts a a step-wise refinement approach that starts development from formal specifications. A functional programming notation is used for specifying algorithms and for reasoning about them. The method is aided by off-the-shelf refinements based on the operators of Communicating Sequential Processes that map easily to programs written in Handel-C. Handel-C descriptions are directly compiled into reconfigurable hardware. The practical realization of this methodology is evidenced by a case studying data-parallel implementations of a matrix multiplication algorithm. The developed designs are compiled and tested under Agility's RC-1000 reconfigurable computer with its 2 million gates Virtex-E FPGA. Performance analysis and evaluation of the presented implementations are included.","PeriodicalId":158568,"journal":{"name":"2010 Second International Conference on Computer Research and Development","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131356619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Extraction of Electronic Parameters of PEDOT:PSS-PVA/n-Si Heterojunction Diode","authors":"D. Khan, M. H. Sayyad","doi":"10.1109/ICCRD.2010.114","DOIUrl":"https://doi.org/10.1109/ICCRD.2010.114","url":null,"abstract":"Using spin coating, a PEDOT:PSS-PVA/n-Si device has been fabricated by depositing the composite of conducting polymer PEDOT:PSS and poly(vinyl alcohol) on n-Si substrate. The current-voltage measurements of the device have been evaluated at room temperature in dark. The PEDOT:PSSPVA/ n-Si structure demonstrated the rectifying behavior. The various electronic parameters such as rectification ratio, turn on voltage, ideality factor, reverse saturation current, barrier height, series and shunt resistances were extracted from the IV characteristics of this diode. The values of ideality factor and series resistance were also verified by using Cheung functions. In addition, the conduction mechanism in the device was also investigated by I-V curves.","PeriodicalId":158568,"journal":{"name":"2010 Second International Conference on Computer Research and Development","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130018367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Harmonic-Free and Fast-Locking Delay-Locked Loop Adopting a Resettable Delay Line","authors":"Kai Huang, Zhikuang Cai, Jun Yang","doi":"10.1109/ICCRD.2010.176","DOIUrl":"https://doi.org/10.1109/ICCRD.2010.176","url":null,"abstract":"An all digital delay-locked loop (ADDLL) with \"reset in every step\" (RES) delay line is developed in order to reduce the locking time. Due to the novel resettable mechanism of delay line, the DLL has the property of fast-locking and harmonic-free. The locking time can be reduced to N+1, where N is the bits' number of the control code for a delay line. According to the simulation result in SMIC 180nm CMOS technology, the proposed delay-locked loop (DLL) can cover the operating range from 50 to 250MHz.","PeriodicalId":158568,"journal":{"name":"2010 Second International Conference on Computer Research and Development","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131510425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Magnetic and Thermal Diffusion Effects on a Three-Dimensional Free Convective Flow Past a Uniformly Moving Porous Vertical Plate","authors":"N. Ahmed, D. Kalita, S. Talukdar","doi":"10.1109/ICCRD.2010.121","DOIUrl":"https://doi.org/10.1109/ICCRD.2010.121","url":null,"abstract":"The problem of a three dimensional free convection flow with mass transfer of an incompressible viscous electrically conducting fluid past a uniformly moving porous vertical plate with transverse sinusoidal suction velocity is considered. A magnetic field of uniform strength is assumed to be applied normal to the plate. The expressions for skin-friction at the plate in the direction of flow, rate of heat transfer in terms of Nusselt number, rate of mass transfer in terms of Sherwood number, velocity field, temperature field and species concentration field are obtained in non-dimensional forms. The effects of Hartmann number, Schmidt number, Soret number, Reynolds number on the skin friction, Nusselt number, Sherwood number, velocity field, temperature field and concentration field are discussed graphically and the results are physically interpreted.","PeriodicalId":158568,"journal":{"name":"2010 Second International Conference on Computer Research and Development","volume":"121 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133289739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Simulation for RFID-Based Red Light Violation Detection: Violation Detection and Flow Prediction","authors":"Iswanjono, B. Budiardjo, K. Ramli","doi":"10.1109/ICCRD.2010.168","DOIUrl":"https://doi.org/10.1109/ICCRD.2010.168","url":null,"abstract":"The Scilab is freeware as launched by INRIA and ENPC. This paper explains the experience result of the simulation by Scilab to simulate RFID-based for red light violation detection. This simulation gives evidence of violation and prediction of vehicle flow. The violation can detect if the vehicle's IDs have moved form one RFID Reader to the others. The flow prediction is executed by channel forward as distance form the RFID Reader. A randomization generates vehicle IDs, vehicle numbers and vehicle branch destination that can show the function of RFID reader to detect tags.","PeriodicalId":158568,"journal":{"name":"2010 Second International Conference on Computer Research and Development","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114570649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}