Abstract: We successfully developed a new straw combustion
technology that efficiently reduces problems with unmanageable deposits inside straw fueled boilers in Zluticka Heating Plant. The
deposits are mainly created by glass-forming melts. We plotted straw compositions in K2O-CaO-SiO2 phase diagram and illustrated
they are in the area of low-melting eutectic poi
melting of ash and the formation of deposits
compositions by injecting additives into biomass fuel
ueled points. To prevent the
deposits, we modified ash
fuel.
Abstract: In recent times, the problem of Unsolicited Bulk
Email (UBE) or commonly known as Spam Email, has increased at a
tremendous growth rate. We present an analysis of survey based on
classifications of UBE in various research works. There are many
research instances for classification between spam and non-spam
emails but very few research instances are available for classification
of spam emails, per se. This paper does not intend to assert some
UBE classification to be better than the others nor does it propose
any new classification but it bemoans the lack of harmony on number
and definition of categories proposed by different researchers. The
paper also elaborates on factors like intent of spammer, content of
UBE and ambiguity in different categories as proposed in related
research works of classifications of UBE.
Abstract: The use of a Bayesian Hierarchical Model (BHM) to interpret breath measurements obtained during a 13C Octanoic Breath Test (13COBT) is demonstrated. The statistical analysis was implemented using WinBUGS, a commercially available computer package for Bayesian inference. A hierarchical setting was adopted where poorly defined parameters associated with a delayed Gastric Emptying (GE) were able to "borrow" strength from global distributions. This is proved to be a sufficient tool to correct model's failures and data inconsistencies apparent in conventional analyses employing a Non-linear least squares technique (NLS). Direct comparison of two parameters describing gastric emptying ng ( tlag -lag phase, t1/ 2 -half emptying time) revealed a strong correlation between the two methods. Despite our large dataset ( n = 164 ), Bayesian modeling was fast and provided a successful fitting for all subjects. On the contrary, NLS failed to return acceptable estimates in cases where GE was delayed.
Abstract: Prediction of benzene transport in soil and volatilization from soil to the atmosphere is important for the preservation of human health and management of contaminated soils. The adequacy of a simple numerical model, assuming two-phase diffusion and equilibrium of liquid/solid adsorption, was investigated by experimental data of benzene concentration in a flux chamber (with headspace) where Andosol and sand were filled. Adsorption experiment for liquid phase was performed to determine an adsorption coefficient. Furthermore, adequacy of vapor phase adsorption was also studied through two runs of experiment using sand with different water content. The results show that the model adequately predicted benzene transport and volatilization from Andosol and sand with water content of 14.0%. In addition, the experiment additionally revealed that vapor phase adsorption should be considered in diffusion model for sand with very low water content.
Abstract: In this paper a novel structure of metamaterial is
proposed in order to miniaturize a rectangular microstrip patch
antenna. The metamaterial is composed of two nested split octagons
which are located on a 10 mm
Abstract: Probabilistic characteristics of seismic responses of the
Partially Restrained connection rotation (PRCR) and panel zone
deformation (PZD) installed in older steel moment frames were
investigated in accordance with statistical inference in
decision-making process. The 4, 6 and 8 story older steel moment
frames with clip angle and T-stub connections were designed and
analyzed using 2%/50yrs ground motions in four cities of the
Mid-America earthquake region. The probability density function and
cumulative distribution function of PRCR and PZD were determined
by the goodness-of-fit tests based on probabilistic parameters
measured from the results of the nonlinear time-history analyses. The
obtained probabilistic parameters and distributions can be used to find
out what performance level mainly PR connections and panel zones
satisfy and how many PR connections and panel zones experience a
serious damage under the Mid-America ground motions.
Abstract: Resistance spot welding process comprises of electric,
thermal and mechanical phenomenon, which makes this process
complex and highly non-linear and thus, it becomes difficult to model
it. In order to obtain good weld nugget during spot welding, hit and
trial welds are usually done which is very costly. Therefore the
numerical simulation research has been conducted to understand the
whole process. In this paper three different cases were analyzed by
varying the tip contact area and it was observed that, with the
variation of tip contact area the nugget formation at the faying
surface is affected. The tip contact area of the welding electrode
becomes large with long welding cycles. Therefore in order to
maintain consistency of nugget formation during the welding process,
the current compensation in control feedback is required. If the
contact area of the welding electrode tip is reduced, a large amount of
current flows through the faying surface, as a result of which
sputtering occurs.
Abstract: In this paper, the local grid refinement is focused by
using a nested grid technique. The Cartesian grid numerical method is
developed for simulating unsteady, viscous, incompressible flows
with complex immersed boundaries. A finite volume method is used in
conjunction with a two-step fractional-step procedure. The key aspects
that need to be considered in developing such a nested grid solver are
imposition of interface conditions on the inter-block and accurate
discretization of the governing equation in cells that are with the
inter-block as a control surface. A new interpolation procedure is
presented which allows systematic development of a spatial
discretization scheme that preserves the spatial accuracy of the
underlying solver. The present nested grid method has been tested by
two numerical examples to examine its performance in the two
dimensional problems. The numerical examples include flow past a
circular cylinder symmetrically installed in a Channel and flow past
two circular cylinders with different diameters. From the numerical
experiments, the ability of the solver to simulate flows with
complicated immersed boundaries is demonstrated and the nested grid
approach can efficiently speed up the numerical solutions.
Abstract: We demonstrate a 40Gbps downstream PON
transmission based on PM-QPSK modulation using commercial DFB
lasers without optical amplifier in the ODN, obtaining 40dB power
budget. We discuss this solution within NG-PON2 architectures.
Abstract: Following harvest, fresh produce needs to be cooled
immediately in a room where the air temperature and the relative air
humidity are controlled to maintain the produce quality. In this paper,
an experimental study for forced air cooling of fresh produce
(cauliflower) is performed using a pilot developed within our
laboratory. Furthermore, a numerical simulation of spherical
produces, taking into account the aerodynamic aspect and also the
heat transfer in the produce and in the air, was carried out using a
finite element method. At the end of this communication,
experimental results are presented and compared with the simulation.
Abstract: SQL injection on web applications is a very popular
kind of attack. There are mechanisms such as intrusion detection
systems in order to detect this attack. These strategies often rely on
techniques implemented at high layers of the application but do not
consider the low level of system calls. The problem of only
considering the high level perspective is that an attacker can
circumvent the detection tools using certain techniques such as URL
encoding. One technique currently used for detecting low-level
attacks on privileged processes is the tracing of system calls. System
calls act as a single gate to the Operating System (OS) kernel; they
allow catching the critical data at an appropriate level of detail. Our
basic assumption is that any type of application, be it a system
service, utility program or Web application, “speaks” the language of
system calls when having a conversation with the OS kernel. At this
level we can see the actual attack while it is happening. We conduct
an experiment in order to demonstrate the suitability of system call
analysis for detecting SQL injection. We are able to detect the attack.
Therefore we conclude that system calls are not only powerful in
detecting low-level attacks but that they also enable us to detect highlevel
attacks such as SQL injection.
Abstract: A genetic algorithm (GA) based feature subset
selection algorithm is proposed in which the correlation structure of
the features is exploited. The subset of features is validated according
to the classification performance. Features derived from the
continuous wavelet transform are potentially strongly correlated.
GA-s that do not take the correlation structure of features into
account are inefficient. The proposed algorithm forms clusters of
correlated features and searches for a good candidate set of clusters.
Secondly a search within the clusters is performed. Different
simulations of the algorithm on a real-case data set with strong
correlations between features show the increased classification
performance. Comparison is performed with a standard GA without
use of the correlation structure.
Abstract: A novel design of two-wheeled robotic vehicle with moving payload is presented in this paper. A mathematical model describing the vehicle dynamics is derived and simulated in Matlab Simulink environment. Two control strategies were developed to stabilise the vehicle in the upright position. A robust Proportional- Integral-Derivative (PID) control strategy has been implemented and initially tested to measure the system performance, while the second control strategy is to use a hybrid fuzzy logic controller (FLC). The results are given on a comparative basis for the system performance in terms of disturbance rejection, control algorithms robustness as well as the control effort in terms of input torque.
Abstract: The work reported in this paper is motivated by the fact that there is a need to apply autonomic computing concepts to parallel computing systems. Advancing on prior work based on intelligent cores [36], a swarm-array computing approach, this paper focuses on 'Intelligent agents' another swarm-array computing approach in which the task to be executed on a parallel computing core is considered as a swarm of autonomous agents. A task is carried to a computing core by carrier agents and is seamlessly transferred between cores in the event of a predicted failure, thereby achieving self-ware objectives of autonomic computing. The feasibility of the proposed swarm-array computing approach is validated on a multi-agent simulator.
Abstract: An effort estimation model is needed for softwareintensive
projects that consist of hardware, embedded software or
some combination of the two, as well as high level software
solutions. This paper first focuses on functional decomposition
techniques to measure functional complexity of a computer system
and investigates its impact on system development effort. Later, it
examines effects of technical difficulty and design team capability
factors in order to construct the best effort estimation model. With
using traditional regression analysis technique, the study develops a
system development effort estimation model which takes functional
complexity, technical difficulty and design team capability factors as
input parameters. Finally, the assumptions of the model are tested.
Abstract: Reliable information about tool temperature
distribution is of central importance in metal cutting. In this study,
tool-chip interface temperature was determined in cutting of ST37
steel workpiece by applying HSS as the cutting tool in dry turning.
Two different approaches were implemented for temperature
measuring: an embedded thermocouple (RTD) in to the cutting tool
and infrared (IR) camera. Comparisons are made between
experimental data and results of MSC.SuperForm and FLUENT
software.
An investigation of heat generation in cutting tool was performed
by varying cutting parameters at the stable cutting tool geometry and
results were saved in a computer; then the diagrams of tool
temperature vs. various cutting parameters were obtained. The
experimental results reveal that the main factors of the increasing
cutting temperature are cutting speed (V ), feed rate ( S ) and depth
of cut ( h ), respectively. It was also determined that simultaneously
change in cutting speed and feed rate has the maximum effect on
increasing cutting temperature.
Abstract: The most reliable and accurate description of the actual behavior of a software system is its source code. However, not all questions about the system can be answered directly by resorting to this repository of information. What the reverse engineering methodology aims at is the extraction of abstract, goal-oriented “views" of the system, able to summarize relevant properties of the computation performed by the program. While concentrating on reverse engineering we had modeled the C++ files by designing the translator.
Abstract: The company-s ability to draw on a range of external
sources to meet their needs for innovation, has been termed 'open
innovation' (OI). Very few empirical analyses have been conducted
on Small and Medium Enterprises (SMEs) to the extent that they
describe and understand the characteristics and implications of this
new paradigm.
The study's objective is to identify and characterize different
modes of OI, (considering innovation process phases and the variety
and breadth of the collaboration), determinants, barriers and
motivations in SMEs. Therefore a survey was carried out among
Italian manufacturing firms and a database of 105 companies was
obtained. With regard to data elaboration, a factorial and cluster
analysis has been conducted and three different OI modes have
emerged: selective low open, unselective open upstream, and mid-
partners integrated open. The different behaviours of the three
clusters in terms of determinants factors, performance, firm-s
technology intensity, barriers and motivations have been analyzed
and discussed.
Abstract: The aim of this paper is to present a comparative
study on two different methods for the evaluation of the equilibrium
point of a ship, core issue for designing an On Board Stability System
(OBSS) module that, starting from geometry information of a ship
hull, described by a discrete model in a standard format, and the
distribution of all weights onboard calculates the ship floating
conditions (in draught, heel and trim).
Abstract: Let p be a prime number, Fpbe a finite field and let Qpdenote the set of quadratic residues in Fp. In the first section we givesome notations and preliminaries from elliptic curves. In the secondsection, we consider some properties of rational points on ellipticcurves Ep,b: y2= x3+ b2 over Fp, where b ∈ F*p. Recall that theorder of Ep,bover Fpis p + 1 if p ≡ 5(mod 6). We generalize thisresult to any field Fnp for an integer n≥ 2. Further we obtain someresults concerning the sum Σ[x]Ep,b(Fp) and Σ[y]Ep,b(Fp), thesum of x- and y- coordinates of all points (x, y) on Ep,b, and alsothe the sum Σ(x,0)Ep,b(Fp), the sum of points (x, 0) on Ep,b.