2006 8th International Conference Advanced Communication Technology, 2006
... Sensing and Control in Vehicular Ad-Hoc Networks Evtim Peytchev, Taha Osman, DavidAl-Dabass, ... more ... Sensing and Control in Vehicular Ad-Hoc Networks Evtim Peytchev, Taha Osman, DavidAl-Dabass, Michael Thomas, Shi Zhi School of Computing and Informatics, Nottingham Trent University, Burton Street, Nottingham NG1 4BU. UK david.al-dabassgdntu.ac.uk ...
2012 Third International Conference on Intelligent Systems Modelling and Simulation, 2012
ABSTRACT In the context of water networks, in order to supply water to consumers without any disr... more ABSTRACT In the context of water networks, in order to supply water to consumers without any disruption in service, the state of the system has to be monitored. One way to achieve this is by using simulators algorithms that provide means of combining the water consumptions called also pseudo-measurements by relating them to the mathematical model of the system. Therefore a comprehensive description of the water distribution system should be used to attain a true picture of the state of the system. This implies that all hydraulics elements including non-linear controlling elements such as pumps and valves should be included in the description of the water distribution system. This paper addresses the problem of simulation of water networks containing controlling hydraulics elements by using simulator algorithms constructed with the loop corrective flows equations. It is well known that these controlling hydraulics elements may cause numerical difficulties in the simulations due to their discontinuous properties. It is shown that using the loop equations can provide an adequate mean for handling the discontinuous nature of the controlling hydraulics elements. This is in spite of having to deal with the loop structure of the water network in the simulator algorithm which implies the use of graph theory. The case of non-linear elements check valves, pumps and pressure reducing valves is presented. The main contribution of the paper is that it proposes a partial rebuilding of the spanning tree obtained with the Depth First (DF) search, which partial rebuilding results from the changing of the status of the non-linear controlling hydraulics elements during the convergence of the Newton-Raphson numerical optimization method used by the simulator algorithm. The numerical results are verified with the EPANET software which is an established computer program used in the simulation of water networks.
First Asia International Conference on Modelling & Simulation (AMS'07), 2007
This paper attempts to determine conditions for 'recogniseability' with applica... more This paper attempts to determine conditions for 'recogniseability' with application to games language processing. In its broadest sense, a biological reader of a string of characters has a 'trial' internal model of the semantics of the lexical sequence being read. This internal model generates ...
Proceedings - 2009 3rd Asia International Conference on Modelling and Simulation, AMS 2009, 2009
A novel cell formation algorithm has been introduced in this paper. The motivation of the researc... more A novel cell formation algorithm has been introduced in this paper. The motivation of the research is the lack of attention in important information, e.g., production demand (or part-volume), in the most of the cell formation techniques. For example, one of the crucial steps in the design of a cellular manufacturing system is the cell formation problem, which involves grouping the parts into part families and machines into machine groups. It has been found that 80% of the cell formation problems consider only 0-1 (binary) machine-part incidence matrix that ignores the sequence of operations in manufacturing parts. Further, literature reveals that only a few studies consider alternative routing. In order to cope with this situation a new cell formation algorithm, considering the factors sequence of operation, alternative routing and part-volume, is introduced.
2008 Second Asia International Conference on Modelling & Simulation (AMS), 2008
Recent work into knowledge-mining algorithms has found that second order models can be used to ap... more Recent work into knowledge-mining algorithms has found that second order models can be used to approximate the inputs to systems by first calculating their time trajectories, and then obtaining the causal parameters of these trajectories. In this paper a new method of text analysis is ...
Proceedings of 8th International Parallel Processing Symposium
... Rik(z) = Sik(l+ Aik(z)), (1) where Rik(@) is the mean response time of a class i task at serv... more ... Rik(z) = Sik(l+ Aik(z)), (1) where Rik(@) is the mean response time of a class i task at server k with workload ~. ... IEEE Transactions on Parallel and Distributed Systems, 1:257-270, July 1990. [5] Randolph. Nelson, Don Towsley, and AN Tantawi. ...
Transactions of the Institute of Measurement and Control, 1979
The computational requirement of adaptive state estimation is examined, and a previously proposed... more The computational requirement of adaptive state estimation is examined, and a previously proposed chain parallel processor is extended to satisfy these requirements. An example is programmed in detail to illustrate the flexibility of the structure. During each integration cycle, the processing elements operate in a single-instruction stream mode by accessing a common program, they then re-configure and operate in a multi-instruction stream mode to execute the second part of the algorithm.
2010 International Symposium on Electronic System Design, 2010
Current era of Web 2.0 is enabling new business models for using the semantic web. One such busin... more Current era of Web 2.0 is enabling new business models for using the semantic web. One such business model is leasing out computing platform of hardware and software over the internet to the tenants and is dubbed as Cloud Computing. The anticipated future trend of computing is believed to be this cloud computing as it promises a lot of benefits like no capital expenditure, speed of application deployment, shorter time to market, lower cost of operation and easier maintenance for the tenants. This paper analyses how cloud computing on the background of Web 2.0 is going to impact the software engineering process to develop quality software. As the cloud provider is an external entity or third party, how difficult will be the interaction with them? How to separate the roles of SW engineers and cloud providers? SW engineering should include framework activities to leverage all the benefits of cloud computing systematically and strategically. This paper extends the traditional agile process model named Extreme Programming (XP) and integrates interaction with the cloud provider to facilitate acceptance of cloud computing.
2011 UKSim 5th European Symposium on Computer Modeling and Simulation, 2011
This paper presents a novel algorithm for uncertainty quantification in water distribution system... more This paper presents a novel algorithm for uncertainty quantification in water distribution systems, which is termed also Confidence Limit Analysis (CLA), in the context of a Least Squares (LS) state estimator based on the loop corrective flows and the variation of nodal demands as state variables. The confidence limits predicted with the novel algorithm called Error Maximization (EM) method are evaluated with respect to two other more established CLA algorithms based on an Experimental Sensitivity Matrix (ESM) and on a sensitivity matrix obtained with the LS nodal heads equations state estimator. The predicted confidence limits show that the novel EM algorithm is comparable to the other CLA algorithms shown in the paper and due to its computational efficiency renders it suitable for online decision support systems for water distribution systems.
The scope of this paper is to explore the input parameters of a Finite Element (FE) model of an a... more The scope of this paper is to explore the input parameters of a Finite Element (FE) model of an active lower limb that are most influential in determining the size and the shape of the performance envelope of the kinematics and peak contact pressure of the knee tibial insert introduced during a Total Knee Replacement (TKR) surgery. The active lower limb FE model simulates the stair ascent and it provides a more complicated setup than the isolated TKR model which includes the femoral component and the tibial insert. It includes bones, TKR implant, soft tissues and applied forces. Two probabilistic methods are used together with the FE model to generate the performance envelopes and to explore the key parameters: the Monte Carlo Simulation Technique (MCST) and the Response Surface Method (RSM). It is investigated how the uncertainties in a reduced set of 22 input variables of the FE model affect the kinematics and peak contact pressure of the knee tibial insert. The kinematics is repo...
Telecommunication software is expected to have a long lifespan during which many developers will ... more Telecommunication software is expected to have a long lifespan during which many developers will add new features, modify existing features, or correct bugs. The software must be understandable, reliable, and maintainable otherwise the additions and modifications will take longer to develop and introduce further errors. Siemens has a software development process, which includes Fagan inspections, module testing, integration testing, internal,
2006 8th International Conference Advanced Communication Technology, 2006
Dhavalkumar Thakker, Taha Osman, David Al-Dabass School of Computing & Informatics Nottin... more Dhavalkumar Thakker, Taha Osman, David Al-Dabass School of Computing & Informatics Nottingham Trent University Nottingham NG 11 8NS, UK. [email protected] ... Abstract - Web Services are used in distributed computing ... Web Services are an active research area. ...
Proceedings of the 2002 International Joint Conference on Neural Networks. IJCNN'02 (Cat. No.02CH37290)
We describe a hybrid Artificial Intelligence (AI) approach combining soft AI techniques (neural n... more We describe a hybrid Artificial Intelligence (AI) approach combining soft AI techniques (neural networks) and hard AI methods (alpha-beta game tree search), in an attempt to approximate human play more accurately, in particular with reference to the game of Go. The program is tested and analysed by play against another Go playing program and it is shown that the use of hard AI enhances the performance of the soft AI system and vice-versa.
Fifth International Conference on Hybrid Intelligent Systems (HIS'05), 2005
ABSTRACT Reading a sequence of lexical items in a sentence is equivalent to providing progressive... more ABSTRACT Reading a sequence of lexical items in a sentence is equivalent to providing progressively more data at the input to a Kalman observer. The observer architecture includes a model of the lexical/syntactical sequence generator, with state and output variables, driven by the error between the observed sequence and its evolving 'mirror' within the observer. The theoretical foundations for this observer are put forward and the conditions for observability and controllability of hybrid recurrent nets are explained. Knowledge mining architectures are proposed which consist of an extensible recurrent hybrid net hierarchy of multi-agents where the composite behaviour of agents at any one level is determined by those of the level immediately below.
Fourth International Conference on Hybrid Intelligent Systems (HIS'04)
A new methodology is proposed to combine fuzzy possibilistic reasoning with knowledge mining of s... more A new methodology is proposed to combine fuzzy possibilistic reasoning with knowledge mining of syntax dynamics using hybrid recurrent nets. The structure of Chinese characters consist of a 3-layer hierarchy of character, radical and stroke. Fuzzy possibilistic reasoning is an appropriate set of algorithmic tools to aid automatic recognition of these characters. Associative memory artificial neural network algorithms form a suitable technique for realising these concepts. Several issues are explored: vagueness of radicals, their situation, position invariance, extraction order and shape. Hybrid recurrent nets are proposed to deal with recognition at the syntax level. Each character is the 2-D output of a syntax generating system which is subjected to a knowledge mining process to determine its behaviour parameters. The knowledge mining architecture consists of an extensible recurrent hybrid net hierarchy of multi-agents where the composite behaviour of agents at any one level is determined by those of the level immediately below.
The Central Integration Unit (CIU) is a major component of a system being developed to provide vo... more The Central Integration Unit (CIU) is a major component of a system being developed to provide voice and data communications between mobile radio users and fixed terminal users. The CIU has several different TCP/IP interfaces, both external and internal to the CIU, with varying characteristics. Some use permanent connections whilst others use transaction-based connections; some are clients or servers, others incorporate both client and server operation. This paper looks at the issues behind the design of the connection management aspects of the CIU and then describes the implementation of the connection management software within the CIU.
Tenth International Conference on Computer Modeling and Simulation (uksim 2008), 2008
ABSTRACT The paper develops a model for the biologically inspired process of identifying faces fr... more ABSTRACT The paper develops a model for the biologically inspired process of identifying faces from relative distances between blemishes using pre-stored knowledge in a database. A facial picture is loaded into the program and the operator selects facial blemishes by clicking on them and uses an extra list to select the size and color of the facial blemish. The 2-D location, size and colour are recorded to uniquely identify the individual. For scars and other facial blemishes that are not of standard size and shape, such as skin dots or freckles, the operator marks the area as other points are marked. Results show the success of the method.
UKSim2010 - UKSim 12th International Conference on Computer Modelling and Simulation, 2010
Sani Susanto Department of Industrial Engineering, Faculty of Industrial Technology Parahyangan C... more Sani Susanto Department of Industrial Engineering, Faculty of Industrial Technology Parahyangan Catholic University Jl. Ciumbuleuit 94, Bandung-40141, Indonesia. e-mail: [email protected] .id ... Arijit Bhattacharya Enterprise Process Research Centre (EPRC), School of ...
2006 8th International Conference Advanced Communication Technology, 2006
... Sensing and Control in Vehicular Ad-Hoc Networks Evtim Peytchev, Taha Osman, DavidAl-Dabass, ... more ... Sensing and Control in Vehicular Ad-Hoc Networks Evtim Peytchev, Taha Osman, DavidAl-Dabass, Michael Thomas, Shi Zhi School of Computing and Informatics, Nottingham Trent University, Burton Street, Nottingham NG1 4BU. UK david.al-dabassgdntu.ac.uk ...
2012 Third International Conference on Intelligent Systems Modelling and Simulation, 2012
ABSTRACT In the context of water networks, in order to supply water to consumers without any disr... more ABSTRACT In the context of water networks, in order to supply water to consumers without any disruption in service, the state of the system has to be monitored. One way to achieve this is by using simulators algorithms that provide means of combining the water consumptions called also pseudo-measurements by relating them to the mathematical model of the system. Therefore a comprehensive description of the water distribution system should be used to attain a true picture of the state of the system. This implies that all hydraulics elements including non-linear controlling elements such as pumps and valves should be included in the description of the water distribution system. This paper addresses the problem of simulation of water networks containing controlling hydraulics elements by using simulator algorithms constructed with the loop corrective flows equations. It is well known that these controlling hydraulics elements may cause numerical difficulties in the simulations due to their discontinuous properties. It is shown that using the loop equations can provide an adequate mean for handling the discontinuous nature of the controlling hydraulics elements. This is in spite of having to deal with the loop structure of the water network in the simulator algorithm which implies the use of graph theory. The case of non-linear elements check valves, pumps and pressure reducing valves is presented. The main contribution of the paper is that it proposes a partial rebuilding of the spanning tree obtained with the Depth First (DF) search, which partial rebuilding results from the changing of the status of the non-linear controlling hydraulics elements during the convergence of the Newton-Raphson numerical optimization method used by the simulator algorithm. The numerical results are verified with the EPANET software which is an established computer program used in the simulation of water networks.
First Asia International Conference on Modelling & Simulation (AMS'07), 2007
This paper attempts to determine conditions for 'recogniseability' with applica... more This paper attempts to determine conditions for 'recogniseability' with application to games language processing. In its broadest sense, a biological reader of a string of characters has a 'trial' internal model of the semantics of the lexical sequence being read. This internal model generates ...
Proceedings - 2009 3rd Asia International Conference on Modelling and Simulation, AMS 2009, 2009
A novel cell formation algorithm has been introduced in this paper. The motivation of the researc... more A novel cell formation algorithm has been introduced in this paper. The motivation of the research is the lack of attention in important information, e.g., production demand (or part-volume), in the most of the cell formation techniques. For example, one of the crucial steps in the design of a cellular manufacturing system is the cell formation problem, which involves grouping the parts into part families and machines into machine groups. It has been found that 80% of the cell formation problems consider only 0-1 (binary) machine-part incidence matrix that ignores the sequence of operations in manufacturing parts. Further, literature reveals that only a few studies consider alternative routing. In order to cope with this situation a new cell formation algorithm, considering the factors sequence of operation, alternative routing and part-volume, is introduced.
2008 Second Asia International Conference on Modelling & Simulation (AMS), 2008
Recent work into knowledge-mining algorithms has found that second order models can be used to ap... more Recent work into knowledge-mining algorithms has found that second order models can be used to approximate the inputs to systems by first calculating their time trajectories, and then obtaining the causal parameters of these trajectories. In this paper a new method of text analysis is ...
Proceedings of 8th International Parallel Processing Symposium
... Rik(z) = Sik(l+ Aik(z)), (1) where Rik(@) is the mean response time of a class i task at serv... more ... Rik(z) = Sik(l+ Aik(z)), (1) where Rik(@) is the mean response time of a class i task at server k with workload ~. ... IEEE Transactions on Parallel and Distributed Systems, 1:257-270, July 1990. [5] Randolph. Nelson, Don Towsley, and AN Tantawi. ...
Transactions of the Institute of Measurement and Control, 1979
The computational requirement of adaptive state estimation is examined, and a previously proposed... more The computational requirement of adaptive state estimation is examined, and a previously proposed chain parallel processor is extended to satisfy these requirements. An example is programmed in detail to illustrate the flexibility of the structure. During each integration cycle, the processing elements operate in a single-instruction stream mode by accessing a common program, they then re-configure and operate in a multi-instruction stream mode to execute the second part of the algorithm.
2010 International Symposium on Electronic System Design, 2010
Current era of Web 2.0 is enabling new business models for using the semantic web. One such busin... more Current era of Web 2.0 is enabling new business models for using the semantic web. One such business model is leasing out computing platform of hardware and software over the internet to the tenants and is dubbed as Cloud Computing. The anticipated future trend of computing is believed to be this cloud computing as it promises a lot of benefits like no capital expenditure, speed of application deployment, shorter time to market, lower cost of operation and easier maintenance for the tenants. This paper analyses how cloud computing on the background of Web 2.0 is going to impact the software engineering process to develop quality software. As the cloud provider is an external entity or third party, how difficult will be the interaction with them? How to separate the roles of SW engineers and cloud providers? SW engineering should include framework activities to leverage all the benefits of cloud computing systematically and strategically. This paper extends the traditional agile process model named Extreme Programming (XP) and integrates interaction with the cloud provider to facilitate acceptance of cloud computing.
2011 UKSim 5th European Symposium on Computer Modeling and Simulation, 2011
This paper presents a novel algorithm for uncertainty quantification in water distribution system... more This paper presents a novel algorithm for uncertainty quantification in water distribution systems, which is termed also Confidence Limit Analysis (CLA), in the context of a Least Squares (LS) state estimator based on the loop corrective flows and the variation of nodal demands as state variables. The confidence limits predicted with the novel algorithm called Error Maximization (EM) method are evaluated with respect to two other more established CLA algorithms based on an Experimental Sensitivity Matrix (ESM) and on a sensitivity matrix obtained with the LS nodal heads equations state estimator. The predicted confidence limits show that the novel EM algorithm is comparable to the other CLA algorithms shown in the paper and due to its computational efficiency renders it suitable for online decision support systems for water distribution systems.
The scope of this paper is to explore the input parameters of a Finite Element (FE) model of an a... more The scope of this paper is to explore the input parameters of a Finite Element (FE) model of an active lower limb that are most influential in determining the size and the shape of the performance envelope of the kinematics and peak contact pressure of the knee tibial insert introduced during a Total Knee Replacement (TKR) surgery. The active lower limb FE model simulates the stair ascent and it provides a more complicated setup than the isolated TKR model which includes the femoral component and the tibial insert. It includes bones, TKR implant, soft tissues and applied forces. Two probabilistic methods are used together with the FE model to generate the performance envelopes and to explore the key parameters: the Monte Carlo Simulation Technique (MCST) and the Response Surface Method (RSM). It is investigated how the uncertainties in a reduced set of 22 input variables of the FE model affect the kinematics and peak contact pressure of the knee tibial insert. The kinematics is repo...
Telecommunication software is expected to have a long lifespan during which many developers will ... more Telecommunication software is expected to have a long lifespan during which many developers will add new features, modify existing features, or correct bugs. The software must be understandable, reliable, and maintainable otherwise the additions and modifications will take longer to develop and introduce further errors. Siemens has a software development process, which includes Fagan inspections, module testing, integration testing, internal,
2006 8th International Conference Advanced Communication Technology, 2006
Dhavalkumar Thakker, Taha Osman, David Al-Dabass School of Computing & Informatics Nottin... more Dhavalkumar Thakker, Taha Osman, David Al-Dabass School of Computing & Informatics Nottingham Trent University Nottingham NG 11 8NS, UK. [email protected] ... Abstract - Web Services are used in distributed computing ... Web Services are an active research area. ...
Proceedings of the 2002 International Joint Conference on Neural Networks. IJCNN'02 (Cat. No.02CH37290)
We describe a hybrid Artificial Intelligence (AI) approach combining soft AI techniques (neural n... more We describe a hybrid Artificial Intelligence (AI) approach combining soft AI techniques (neural networks) and hard AI methods (alpha-beta game tree search), in an attempt to approximate human play more accurately, in particular with reference to the game of Go. The program is tested and analysed by play against another Go playing program and it is shown that the use of hard AI enhances the performance of the soft AI system and vice-versa.
Fifth International Conference on Hybrid Intelligent Systems (HIS'05), 2005
ABSTRACT Reading a sequence of lexical items in a sentence is equivalent to providing progressive... more ABSTRACT Reading a sequence of lexical items in a sentence is equivalent to providing progressively more data at the input to a Kalman observer. The observer architecture includes a model of the lexical/syntactical sequence generator, with state and output variables, driven by the error between the observed sequence and its evolving 'mirror' within the observer. The theoretical foundations for this observer are put forward and the conditions for observability and controllability of hybrid recurrent nets are explained. Knowledge mining architectures are proposed which consist of an extensible recurrent hybrid net hierarchy of multi-agents where the composite behaviour of agents at any one level is determined by those of the level immediately below.
Fourth International Conference on Hybrid Intelligent Systems (HIS'04)
A new methodology is proposed to combine fuzzy possibilistic reasoning with knowledge mining of s... more A new methodology is proposed to combine fuzzy possibilistic reasoning with knowledge mining of syntax dynamics using hybrid recurrent nets. The structure of Chinese characters consist of a 3-layer hierarchy of character, radical and stroke. Fuzzy possibilistic reasoning is an appropriate set of algorithmic tools to aid automatic recognition of these characters. Associative memory artificial neural network algorithms form a suitable technique for realising these concepts. Several issues are explored: vagueness of radicals, their situation, position invariance, extraction order and shape. Hybrid recurrent nets are proposed to deal with recognition at the syntax level. Each character is the 2-D output of a syntax generating system which is subjected to a knowledge mining process to determine its behaviour parameters. The knowledge mining architecture consists of an extensible recurrent hybrid net hierarchy of multi-agents where the composite behaviour of agents at any one level is determined by those of the level immediately below.
The Central Integration Unit (CIU) is a major component of a system being developed to provide vo... more The Central Integration Unit (CIU) is a major component of a system being developed to provide voice and data communications between mobile radio users and fixed terminal users. The CIU has several different TCP/IP interfaces, both external and internal to the CIU, with varying characteristics. Some use permanent connections whilst others use transaction-based connections; some are clients or servers, others incorporate both client and server operation. This paper looks at the issues behind the design of the connection management aspects of the CIU and then describes the implementation of the connection management software within the CIU.
Tenth International Conference on Computer Modeling and Simulation (uksim 2008), 2008
ABSTRACT The paper develops a model for the biologically inspired process of identifying faces fr... more ABSTRACT The paper develops a model for the biologically inspired process of identifying faces from relative distances between blemishes using pre-stored knowledge in a database. A facial picture is loaded into the program and the operator selects facial blemishes by clicking on them and uses an extra list to select the size and color of the facial blemish. The 2-D location, size and colour are recorded to uniquely identify the individual. For scars and other facial blemishes that are not of standard size and shape, such as skin dots or freckles, the operator marks the area as other points are marked. Results show the success of the method.
UKSim2010 - UKSim 12th International Conference on Computer Modelling and Simulation, 2010
Sani Susanto Department of Industrial Engineering, Faculty of Industrial Technology Parahyangan C... more Sani Susanto Department of Industrial Engineering, Faculty of Industrial Technology Parahyangan Catholic University Jl. Ciumbuleuit 94, Bandung-40141, Indonesia. e-mail: [email protected] .id ... Arijit Bhattacharya Enterprise Process Research Centre (EPRC), School of ...
Uploads
Papers by David Aldabass