{"title":"A two-phased gradient technique for budget allocation: An application to data collection budget allocation in efficiency measurement of DEA","authors":"W. Wong, L. Lee, W. Jaruphongsa","doi":"10.1109/ICECTECH.2010.5479979","DOIUrl":"https://doi.org/10.1109/ICECTECH.2010.5479979","url":null,"abstract":"This paper presents a gradient based algorithm to solve the data collection budget allocation problem in efficiency measurement of DEA. A hard limit is put on how many total readings can be collected and we aim to determine how these should be allocated among the different attributes. A two-phased gradient technique is developed to solve this problem. The numerical results showed that the proposed gradient based algorithm performs well in solving the problem. The insight from the results reveal that, it is important to allocate the budget intelligently and the proposed algorithm serves as a potential method in this area.","PeriodicalId":178300,"journal":{"name":"2010 2nd International Conference on Electronic Computer Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129646973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Norouzi, Alireza Hatamizadeh, M. Dabbaghian, B. Ustundag, Fatemeh Amiri
{"title":"An improved ELGossiping data distribution technique with emphasis on reliability and resource constraints in wireless sensor network","authors":"A. Norouzi, Alireza Hatamizadeh, M. Dabbaghian, B. Ustundag, Fatemeh Amiri","doi":"10.1109/ICECTECH.2010.5479964","DOIUrl":"https://doi.org/10.1109/ICECTECH.2010.5479964","url":null,"abstract":"Sensor networks are composed of many sensors usually far from the region is available. Routing in wireless sensor networks for the transfer of information from sensor nodes to base station is especially important. Optimum consumption of energy is important requirements in wireless sensor networks because sensor systems typically use battery power. In this paper with a routing algorithm to determine the optimal path of energy consumption viewpoint for information transfer from sensor nodes to base station with the data transmission we have presented multi-skip. In this algorithm when a sensor felt event, the node that was in transmission radius of sensor and it had minimum distance to the main station as next step is selected and send to only one node is selected. Finally, the proposed algorithm compare with Gossiping and LGossiping algorithms as simulation results show the proposed algorithm has better performance.","PeriodicalId":178300,"journal":{"name":"2010 2nd International Conference on Electronic Computer Technology","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130608863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Rashtian, G. Shahgholian, Pegah Shafaghi, M. Farahmand
{"title":"A supervisory loop to remedy actuator saturation: Immune approach","authors":"M. Rashtian, G. Shahgholian, Pegah Shafaghi, M. Farahmand","doi":"10.1109/ICECTECH.2010.5480000","DOIUrl":"https://doi.org/10.1109/ICECTECH.2010.5480000","url":null,"abstract":"This paper describes the actuator saturation problem and its solution. Actuator saturation is one the practical problem in control of various systems. Even it might cause instability. In this article we describe different problems that are caused by saturation. After that a method is proposed to remedy the effect of it. In the proposed method this problem is solved by decreasing the band width of the controller. In order to accomplish this, a supervisory control is employed which uses artificial immune algorithm to adjust the proper forward path gain and then we compare the result with fuzzy supervisor. As you will see immune supervisor has better result in compare with fuzzy model. Recently, the biological immune system arouses researchers' interest since it has several useful mechanisms which can be used for information processing. In this paper, an improved artificial immune algorithm is presented which is used in the design approach of a supervisory loop.","PeriodicalId":178300,"journal":{"name":"2010 2nd International Conference on Electronic Computer Technology","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130113498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Synthesis of pencil beam pattern with a multiple concentric circular ring array antenna with minimum side lobe level and fixed first null beamwidth","authors":"A. Chatterjee, G. K. Mahanti, A. Chakraborty","doi":"10.1109/ICECTECH.2010.5479985","DOIUrl":"https://doi.org/10.1109/ICECTECH.2010.5479985","url":null,"abstract":"In this paper, the authors present a method based on modified particle swarm optimization for generating pencil beam in the vertical plane with minimum side lobe level and fixed first null beamwidth. The first null beamwidth is made equal to that of a uniformly excited and uniformly spaced multiple concentric circular ring array of same number of elements and same number of rings. The excitation amplitude is radially varied and optimized to achieve the goal. Example illustrates the potential of the method.","PeriodicalId":178300,"journal":{"name":"2010 2nd International Conference on Electronic Computer Technology","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134258973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Z. Othaman, D. Aryanto, A. Ismail, M. Yahya, H. Soetedjo
{"title":"Stacked structures In0.5Ga0.5As/GaAs quantum dots: Growth and characterization","authors":"Z. Othaman, D. Aryanto, A. Ismail, M. Yahya, H. Soetedjo","doi":"10.1109/ICECTECH.2010.5479936","DOIUrl":"https://doi.org/10.1109/ICECTECH.2010.5479936","url":null,"abstract":"Stacked structures of self-assembled In0.5Ga0.5As/GaAs quantum dots (QDs) have been grown using Metal-Organic Chemical Vapor Deposition (MOCVD) with different number of stacks. High Resolution X-Ray Diffraction (HR-XRD) and Transmission Electron Microscope (TEM) characterization revealed that the formation of stacked self-assembled In0.5Ga0.5As QDs on GaAs (100) substrates were misaligned vertically and no visible defect has been detected from the cross-sectional TEM characterization. In addition, photoluminescence (PL) peak position is blue-shifted and PL intensity dramatically increased with increasing number of stacks. The peak and intensity of the PL measurement strongly depend on the structural of stacked self-assembled QDs and also the number of QDs layers.","PeriodicalId":178300,"journal":{"name":"2010 2nd International Conference on Electronic Computer Technology","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122007707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zhang Da-qiao, Zhao Jiu-fen, Wang Ming-hai, Niu Guo-hua
{"title":"Grey evaluation and optimization of UAV's path planning method","authors":"Zhang Da-qiao, Zhao Jiu-fen, Wang Ming-hai, Niu Guo-hua","doi":"10.1109/ICECTECH.2010.5479981","DOIUrl":"https://doi.org/10.1109/ICECTECH.2010.5479981","url":null,"abstract":"It is important and significant to select a high efficiency path planning method for the operational employ of UAV. According to the characteristic of current path planning methods and the path planning of unmanned aerial vehicle, the paper established an index system which was used to evaluate path planning methods. Based on this, it had an evaluation of path planning method by using grey clustering evaluation method with improved index weigh coefficient, and then explained the application method by combing with a example. From the result of example, it can be seen that using path planning method's grey clustering evaluation with improved index weigh coefficient can effectively reduce the influence of subjective factor and get a more objective result, furthermore it also provides a effective way to comprehensively and systematically evaluate path planning methods. It can provide decision-making basis for selecting and optimizing path planning method too.","PeriodicalId":178300,"journal":{"name":"2010 2nd International Conference on Electronic Computer Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124349480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Measuring students' intention in using network simulation tools for problem-based learning using TAM","authors":"Nor Azimah Khalid, Mohd Faisal Ibrahim, R. Yunos","doi":"10.1109/ICECTECH.2010.5479967","DOIUrl":"https://doi.org/10.1109/ICECTECH.2010.5479967","url":null,"abstract":"The infusion of computer-based learning into teaching and learning has altered considerably the instructional strategy in our educational institutions and changed the teaching and learning approach. When learning a network design, one must follow it with practical methods. However, to do the practical and get involve with the real network devices result in a higher cost spending, which make practical method unsuitable. With the new era of computer technology, computer simulation has been considered as a potential method in achieving educational objectives. Thus, this study used the Technology Acceptance Method (TAM) to measure the readiness of students in using network simulation tools. This study applied the survey method where the questionnaire had been used to determined students' intention towards using the simulation tools. The key constructs in this questionnaire include perceived ease of use and perceived usefulness. The respond given indicates that they have agreed towards the use of computer simulation in learning network design. In conclusion, students had shown a high intention in using networking simulation tools provide a means that computer simulation is a potential method in teaching and learning network design today.","PeriodicalId":178300,"journal":{"name":"2010 2nd International Conference on Electronic Computer Technology","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116688632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Notice of RetractionVenn requirement language for user requirement","authors":"M. Roslina, A. Noraziah","doi":"10.1109/ICECTECH.2010.5479954","DOIUrl":"https://doi.org/10.1109/ICECTECH.2010.5479954","url":null,"abstract":"Formal Methods are very hard subject to student. It offered to second semester for third year Software Engineering student. Students normally feel very difficult to derive formal specification from informal requirement. In this paper, we propose an approach to derive formal specifications from informal requirement using Venn diagram for creating formal specification. We show how to convert the Venn diagram to formal specification which is important part during development of Z schema. Then we do analysis of student result of a group of student. With this approach student will easier to understand the operation of the system during Z schema development.","PeriodicalId":178300,"journal":{"name":"2010 2nd International Conference on Electronic Computer Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126864652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Electronic Purse: Future machine for a commoner","authors":"Srikar Gundabathula","doi":"10.1109/ICECTECH.2010.5479989","DOIUrl":"https://doi.org/10.1109/ICECTECH.2010.5479989","url":null,"abstract":"The concept of the Electronic Purse is designed to make a commoner get relieved from his tension of maintaining transactions of his daily utilities. The aim of this Purse is to maintain all the transactions that a commoner performs in his daily life automatically. It is done using the concept of pure embedded systems. An embedded system is induced into our normal purse which will likely record all the transactions by itself. Aim of the concept is to reproduce all the transactions whenever demanded by the user. Simple enough to say, technology is personified.","PeriodicalId":178300,"journal":{"name":"2010 2nd International Conference on Electronic Computer Technology","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133249830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}