{"title":"Using action research for complex research initiatives","authors":"M. Greeff, Louis Coetzee","doi":"10.1109/ICASTECH.2009.5409703","DOIUrl":"https://doi.org/10.1109/ICASTECH.2009.5409703","url":null,"abstract":"Training methods and the transfer of knowledge and information has essentially remained unchanged for many years. With the pervasiveness of information and communication technology (ICT), an opportunity has been created to fundamentally change the status quo of training. This paper presents one approach of using ICT through the innovative combination of factors such as a person's abilities, styles and preferences with a multimodal interface to facilitate enhanced training. However, many ways exist to guide the research process of such a complex research initiative. Action research is one research method that lends itself to these complex projects. The paper uses the ability based technology interventions (AbTi) research project as a case study to analyse the effectiveness of the action research methodology. The paper describes the accumulated learning as obtained from the AbTi research project, as well as the action research methodology used, in order to ultimately be in a position to effect a fundamental change in training. It is found that action research can be an effective methodology for research initiatives of a complex nature.","PeriodicalId":163141,"journal":{"name":"2009 2nd International Conference on Adaptive Science & Technology (ICAST)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131729280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Residue-to-binary converters for the moduli set {22n+1-1,22n,2n-1}","authors":"K. Gbolagade, R. Chaves, L. Sousa, S. Cotofana","doi":"10.1109/ICASTECH.2009.5409752","DOIUrl":"https://doi.org/10.1109/ICASTECH.2009.5409752","url":null,"abstract":"In this paper, we propose two memoryless converters for the moduli set {22n+1 -1,22n,2n -1}. First, we propose a novel reverse converter, which is purely adder based, using the traditional Chinese Remainder Theorem (CRT). Second, due to the fact that the proposed CRT based structure does not cover the entire dynamic range, a second converter, which covers the entire dynamic range based on Mixed Radix Conversion (MRC), is proposed. The CRT based converter outperforms the MRC based converter both in terms of area and delay. In comparison with related best known state of the art converters, they are all outperformed by the proposed CRT based scheme in terms of both area cost and conversion delay. The theoretical evaluation is supported by the experimental results, which are estimated on a Standard Cell 0.13-µm CMOS technology. These experimental results indicate that, on average, for the same dynamic range, the proposed CRT based converter achieves about 23% delay reduction with more than 3% area reduction, when compared to the existing state of the art MRC based converter. Additionally, the proposed CRT based converter is about 6% faster with about 4% area reduction when compared with the existing CRT based converter.","PeriodicalId":163141,"journal":{"name":"2009 2nd International Conference on Adaptive Science & Technology (ICAST)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130556675","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Telecommunications & information technology network management; challenges in acquisition, design and systems development","authors":"D. Padi","doi":"10.1109/ICASTECH.2009.5409748","DOIUrl":"https://doi.org/10.1109/ICASTECH.2009.5409748","url":null,"abstract":"Recent phenomenal growth in broadband technology, coupled with the need for organizations to stay competitive, requires a corresponding comprehensive understanding of new and advanced technologies. In this regard, new challenges have arisen with respect to mastering the intricacies related to acquisition, design, systems development and methodologies needed to manage these complex technologies. More than ever before network administrators are required to integrate and manage heterogeneous systems and a variety of applications effectively and efficiently. This paper proposes a systematic approach to tackling these challenges. It outlines an effective strategy and methodology for designing a mature industrial-based commercially available product that will provide satisfactory solutions.","PeriodicalId":163141,"journal":{"name":"2009 2nd International Conference on Adaptive Science & Technology (ICAST)","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127482825","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Exchanging situational information in embedded networks","authors":"J. Preden, R. Pahtma","doi":"10.1109/ICASTECH.2009.5409713","DOIUrl":"https://doi.org/10.1109/ICASTECH.2009.5409713","url":null,"abstract":"Wireless sensor networks have received a lot of attention in the past decade partially because WSNs can be viewed as the forerunners of ubiquitous computing solutions that are sure to emerge in the following decades. However the development of WSNs has not been as fast as expected, which is to a large extent due to the rigid architecture of the current WSN solutions. We are lacking solutions for creating distributed applications based on WSN technology. The current paper proposes that situation awareness of computing agents starting from the lowest level is one possible solution for creating distributed applications based on the limited computing nodes of WSN systems. The paper gives some suggestions how situation awareness can be achieved in case of resource constrained computing nodes. The paper also proposes a mechanism in the form of an appropriate structuring and encoding of data suitable for use by the WSN nodes. The proposed mechanism can be used for exchanging the situational data collected and created by the embedded nodes. The suggested approach is validated through experiments on a wireless sensor network.","PeriodicalId":163141,"journal":{"name":"2009 2nd International Conference on Adaptive Science & Technology (ICAST)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125406833","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Economic analysis of hybrid power system for rural electrification in Oman","authors":"A. Al-Badi, H. Bourdoucen","doi":"10.1109/ICASTECH.2009.5409712","DOIUrl":"https://doi.org/10.1109/ICASTECH.2009.5409712","url":null,"abstract":"Hybrid renewable energy systems are becoming attractive for remote areas power generation applications due to advances in renewable energy technologies and increase in the oil price. This paper presents a feasibility study of wind penetration into an existing diesel power plant of an isolated Duqum area in the Sultanate of Oman. Wind data from Al Duqm meteorology station and the actual load data from Duqum have been used in the simulation model. HOMER software has been used to perform the study for the hybrid system with no battery storage. For Wind speed less than 5m/s the existing diesel plant seems to be is the only feasible solution over the range of fuel prices used in the simulation. Moreover, the proposed hybrid system becomes feasible at wind speeds of more than 6 m/s and a diesel cost of 0.368 US $/L or more, which is the current diesel cost in Duqm.","PeriodicalId":163141,"journal":{"name":"2009 2nd International Conference on Adaptive Science & Technology (ICAST)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116646219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
O. Longe, .A. Abayomi-Alli, I. O. Shaib, F. A. Longe
{"title":"Enhanced content analysis of fraudulent Nigeria electronic mails using e-STAT","authors":"O. Longe, .A. Abayomi-Alli, I. O. Shaib, F. A. Longe","doi":"10.1109/ICASTECH.2009.5409717","DOIUrl":"https://doi.org/10.1109/ICASTECH.2009.5409717","url":null,"abstract":"A large percentage of fraudulent spam mails are believed to originate from Nigeria or from Nigerians in remote locations. These mails (popularly referred to as 419 spam) come in broad categories but all with the intent of defrauding the recipients'. Testing the validity of senders and receivers address is one method that has been used to filter spam mails. This approach will not filter out ordinary e-mails since typical e-mail users will always include their true e-mail addresses to facilitate replies. Checking the IP-addresses of 419 mails is a way of ascertaining their actual origin. This can be done with the intention to build a database of e-mail abuse or to blacklist addresses from which fraudulent mails are originating keeping in mind that blacklisted IP addresses could be used to stop the delivery of further mails from such addresses in the future. To this end, this research examines features selected specifically from the content analysis of Nigeria spam e-mail. A domain specific statistical content analysis tool (e-STAT) was developed and implemented using Bayesian statistical technique. The software was tested and trained with a sizeable balanced corpus of Nigerian 419 spam e-mails and normal (ham) e-mails. Analysis of classified mails using e-STAT showed that current concept drift patterns among Nigerian 419 spammers and provided a blacklist of about 2,173 e-mail sender's addresses, 563 URLs within spam mails and a total of 13,491 bag-of-words common to Nigerian spam e-mails. The research obtained results that will guide future research in the domain of 419 mails in designing effective spam filters and electronic mail classifiers.","PeriodicalId":163141,"journal":{"name":"2009 2nd International Conference on Adaptive Science & Technology (ICAST)","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116652749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Numerical Integration Based analysis of Pulse Width Modulated voltage source inverter","authors":"A. R. Zubair","doi":"10.1109/ICASTECH.2009.5409707","DOIUrl":"https://doi.org/10.1109/ICASTECH.2009.5409707","url":null,"abstract":"A power electronics circuit is a converter that converts energy from one level of voltage/current/frequency to another using semiconductor-based electronic switches. The process of switching the electronic devices in a power electronic converter from one state to another is called modulation. There are a number of modulation strategies. The less the degree to which undesirable harmonics are created the better the modulation strategy. The figure of merit or criterion of performance is the first-order weighted total harmonic distortion factor (WTHD0). The analysis of Pulse Width Modulation (PWM) Schemes is discussed. Numerical Integration Based Solution is proposed. The results obtained from Matlab sub-programs developed for the analysis are presented. The proposed solution improves both the speed and the accuracy of analysis.","PeriodicalId":163141,"journal":{"name":"2009 2nd International Conference on Adaptive Science & Technology (ICAST)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126571397","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Jeschke, A. Gramatke, Olivier Pfeiffer, C. Thomsen, T. Richter
{"title":"Networked virtual and remote laboratories for research collaboration in natural sciences and engineering","authors":"S. Jeschke, A. Gramatke, Olivier Pfeiffer, C. Thomsen, T. Richter","doi":"10.1007/978-3-642-16208-4_22","DOIUrl":"https://doi.org/10.1007/978-3-642-16208-4_22","url":null,"abstract":"","PeriodicalId":163141,"journal":{"name":"2009 2nd International Conference on Adaptive Science & Technology (ICAST)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127217120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}