Abstract: Off-grid Photovoltaic (PV) systems are empowering
technology in underdeveloped countries like Ethiopia where many
people live far away from the modern world. Where there is
relatively low energy consumption, providing energy from grid
systems is not commercially cost-effective. As a result, significant
people groups worldwide stay without access to electricity. One
remote village in northern Ethiopia was selected by the United
Nations for a pilot project to improve its living conditions. As part of
this comprehensive project, an intelligent charge controller circuit for
Off-grid PV systems was designed for the clinic in that village. In
this paper, design aspects of an intelligent charge controller unit and
its load driver circuits are discussed for an efficient utilization of PVbased
supply systems.
Abstract: In this paper, an improved ant colony optimization
(ACO) algorithm is proposed to enhance the performance of global
optimum search. The strategy of the proposed algorithm has the
capability of fuzzy pheromone updating, adaptive parameter tuning,
and mechanism resetting. The proposed method is utilized to tune the
parameters of the fuzzy controller for a real beam and ball system.
Simulation and experimental results indicate that better performance
can be achieved compared to the conventional ACO algorithms in the
aspect of convergence speed and accuracy.
Abstract: Information is a critical asset and an important source for gaining competitive advantage in firms. The effective maintenance of IT becomes an important task. In order to better understand the determinants of IT effectiveness, this study employs the Industrial Organization (I/O) and Resource Based View (RBV) theories and investigates the industry effect and several major firmspecific factors in relation to their impact on firms- IT effectiveness. The data consist of a panel data of ten-year observations of firms whose IT excellence had been recognized by the CIO Magazine. The non-profit organizations were deliberately excluded, as explained later. The results showed that the effectiveness of IT management varied significantly across industries. Industry also moderated the effects of firm demographic factors such as size and age on IT effectiveness. Surprisingly, R & D investment intensity had negative correlation to IT effectiveness. For managers and practitioners, this study offers some insights for evaluation criteria and expectation for IT project success. Finally, the empirical results indicate that the sustainability of IT effectiveness appears to be short in duration.
Abstract: This paper presents the simulation results of electric field and potential distributions along surface of silicone rubber polymer insulators under clean and various contamination conditions with/without water droplets. Straight sheds insulator having leakage distance 290 mm was used in this study. Two type of contaminants, playwood dust and cement dust, have been studied the effect of contamination on the insulator surface. The objective of this work is to comparison the effect of contamination on potential and electric field distributions along the insulator surface when water droplets exist on the insulator surface. Finite element method (FEM) is adopted for this work. The simulation results show that contaminations have no effect on potential distribution along the insulator surface while electric field distributions are obviously depended on contamination conditions.
Abstract: The present study aims to explore the role of parents'
ethnic socialization practices contributes to the ethnic identity
development, self-esteem and psychological adjustment of multi
ethnic children in Sabah, Malaysia. A total of 342 multi ethnic
children (age range = 10 years old to 14 years old; mean age = 12.65
years, SD = 0.88) and their parents participated in the present study.
The modified version of Multi group Ethnic Identity Measure
(MEIM), The Familial Ethnic Socialization Measure (FESM). The
Rosenberg Self-Esteem Scale (RSE) and Behavioral and Emotional
Rating Scale Edition 2 (BERS-2) were used in this study. The results
showed that: i) parents' ethnic socialization practice was a strong
predictor of ethnic identity development of multi ethnic children; ii)
parents' ethnic socialization practice also was a significant predictor
of self-esteem of multi ethnic children; iii) parents' ethnic
socialization practice was not a significant predictor of psychological
adjustment of multi ethnic children. The results of this study showed
the implications parents' ethnic socialization practices and ethnic
identity development in successful multi ethnic families.
Abstract: This paper presents a computer simulation model based on system dynamics methodology for analyzing the dynamic characteristics of input energy structure in agriculture and Bangladesh is used here as a case study for model validation. The model provides an input energy structure linking the major energy flows with human energy and draft energy from cattle as well as tractors and/or power tillers, irrigation, chemical fertilizer and pesticide. The evaluation is made in terms of different energy dependent indicators. During the simulation period, the energy input to agriculture increased from 6.1 to 19.15 GJ/ha i.e. 2.14 fold corresponding to energy output in terms of food, fodder and fuel increase from 71.55 to 163.58 GJ/ha i.e. 1.28 fold from the base year. This result indicates that the energy input in Bangladeshi agricultural production is increasing faster than the energy output. Problems such as global warming, nutrient loading and pesticide pollution can associate with this increasing input. For an assessment, a comparative statement of input energy use in agriculture of developed countries (DCs) and least developed countries (LDCs) including Bangladesh has been made. The performance of the model is found satisfactory to analyze the agricultural energy system for LDCs
Abstract: The present study focuses on the discussion over the
parameter of Artificial Neural Network (ANN). Sensitivity analysis is
applied to assess the effect of the parameters of ANN on the prediction
of turbidity of raw water in the water treatment plant. The result shows
that transfer function of hidden layer is a critical parameter of ANN.
When the transfer function changes, the reliability of prediction of
water turbidity is greatly different. Moreover, the estimated water
turbidity is less sensitive to training times and learning velocity than
the number of neurons in the hidden layer. Therefore, it is important to
select an appropriate transfer function and suitable number of neurons
in the hidden layer in the process of parameter training and validation.
Abstract: While import-substituting industrialization policy
constitute the basis for the industrialization strategies of the 1960s
and 1970s in Turkey, this policy was no longer sustainable by the
1980s. For this reason, export-oriented industrialization policy was
adopted with the decisions taken on January 24, 1980. In other words,
the post-1980 period, Turkey's economy has adopted outwardoriented
industrialization strategy.
In this study, it is aimed to analyze the effect of the change in
economic structure on foreign trade with the transformation of
foreign trade and industrialization policies in the post-1980 period. In
this respect, in order to analyze the relationship between import,
export and economic growth by using variables of the 1960-2011
period, Chow test was applied. In the analysis the reason for using
Chow test is whether there is any difference in economic terms
between import-substituting industrialization policy applied in the
1960-1980 period and the 1981-2011 period during which exportoriented
industrialization policy was applied as a result of the
structural transformation.
Abstract: In this article we explore the application of a formal
proof system to verification problems in cryptography. Cryptographic
properties concerning correctness or security of some cryptographic
algorithms are of great interest. Beside some basic lemmata, we
explore an implementation of a complex function that is used in
cryptography. More precisely, we describe formal properties of this
implementation that we computer prove. We describe formalized
probability distributions (σ-algebras, probability spaces and conditional
probabilities). These are given in the formal language of the
formal proof system Isabelle/HOL. Moreover, we computer prove
Bayes- Formula. Besides, we describe an application of the presented
formalized probability distributions to cryptography. Furthermore,
this article shows that computer proofs of complex cryptographic
functions are possible by presenting an implementation of the Miller-
Rabin primality test that admits formal verification. Our achievements
are a step towards computer verification of cryptographic primitives.
They describe a basis for computer verification in cryptography.
Computer verification can be applied to further problems in cryptographic
research, if the corresponding basic mathematical knowledge
is available in a database.
Abstract: In this paper, we propose a robust scheme to work face alignment and recognition under various influences. For face representation, illumination influence and variable expressions are the important factors, especially the accuracy of facial localization and face recognition. In order to solve those of factors, we propose a robust approach to overcome these problems. This approach consists of two phases. One phase is preprocessed for face images by means of the proposed illumination normalization method. The location of facial features can fit more efficient and fast based on the proposed image blending. On the other hand, based on template matching, we further improve the active shape models (called as IASM) to locate the face shape more precise which can gain the recognized rate in the next phase. The other phase is to process feature extraction by using principal component analysis and face recognition by using support vector machine classifiers. The results show that this proposed method can obtain good facial localization and face recognition with varied illumination and local distortion.
Abstract: This paper study the segmented split capacitor
Digital-to-Analog Converter (DAC) implemented in a differentialtype
12-bit Successive Approximation Analog-to-Digital Converter
(SA-ADC). The series capacitance split array method employed as it
reduced the total area of the capacitors required for high resolution
DACs. A 12-bit regular binary array structure requires 2049 unit
capacitors (Cs) while the split array needs 127 unit Cs. These results
in the reduction of the total capacitance and power consumption of
the series split array architectures as to regular binary-weighted
structures. The paper will show the 12-bit DAC series split capacitor
with 4-bit thermometer coded DAC architectures as well as the
simulation and measured results.
Abstract: While OCD is one of the most commonly occurring
psychiatric conditions experienced by older adults, there is a paucity
of research conducted into the treatment of older adults with OCD.
This case study represents the first published investigation of a
cognitive treatment for geriatric OCD. It describes the successful
treatment of an 86-year old man with a 63-year history of OCD using
Danger Ideation Reduction Therapy (DIRT). The client received 14
individual, 50-minute treatment sessions of DIRT over 13 weeks.
Clinician-based Y-BOCS scores reduced 84% from 25 (severe) at
pre-treatment, to 4 (subclinical) at 6-month post-treatment follow-up
interview, demonstrating the efficacy of DIRT for this client. DIRT
may have particular advantages over ERP and pharmacological
approaches, however further research is required in older adults with
OCD.
Abstract: The statistical process control (SPC) is one of the most powerful tools developed to assist ineffective control of quality, involves collecting, organizing and interpreting data during production. This article aims to show how the use of CEP industries can control and continuously improve product quality through monitoring of production that can detect deviations of parameters representing the process by reducing the amount of off-specification products and thus the costs of production. This study aimed to conduct a technological forecasting in order to characterize the research being done related to the CEP. The survey was conducted in the databases Spacenet, WIPO and the National Institute of Industrial Property (INPI). Among the largest are the United States depositors and deposits via PCT, the classification section that was presented in greater abundance to F.
Abstract: Faults in a network may take various forms such as hardware/software errors, vertex/edge faults, etc. Folded hypercube is a well-known variation of the hypercube structure and can be constructed from a hypercube by adding a link to every pair of nodes with complementary addresses. Let FFv (respectively, FFe) be the set of faulty nodes (respectively, faulty links) in an n-dimensional folded hypercube FQn. Hsieh et al. have shown that FQn - FFv - FFe for n ≥ 3 contains a fault-free cycle of length at least 2n -2|FFv|, under the constraints that (1) |FFv| + |FFe| ≤ 2n - 4 and (2) every node in FQn is incident to at least two fault-free links. In this paper, we further consider the constraints |FFv| + |FFe| ≤ 2n - 3. We prove that FQn - FFv - FFe for n ≥ 5 still has a fault-free cycle of length at least 2n - 2|FFv|, under the constraints : (1) |FFv| + |FFe| ≤ 2n - 3, (2) |FFe| ≥ n + 2, and (3) every vertex is still incident with at least two links.
Abstract: We address the balancing problem of transfer lines in
this paper to find the optimal line balancing that minimizes the nonproductive
time. We focus on the tool change time and face
orientation change time both of which influence the makespane. We
consider machine capacity limitations and technological constraints
associated with the manufacturing process of auto cylinder heads.
The problem is represented by a mixed integer programming model
that aims at distributing the design features to workstations and
sequencing the machining processes at a minimum non-productive
time. The proposed model is solved by an algorithm established using
linearization schemes and Benders- decomposition approach. The
experiments show the efficiency of the algorithm in reaching the
exact solution of small and medium problem instances at reasonable
time.
Abstract: Long terms variation of solar insolation had been
widely studied. However, its parallel observations in short time scale
is rather lacking. This paper aims to investigate the short time scale
evolution of solar radiation spectrum (UV, PAR, and NIR bands) due
to atmospheric aerosols and water vapors. A total of 25 days of
global and diffused solar spectrum ranges from air mass 2 to 6 were
collected using ground-based spectrometer with shadowband
technique. The result shows that variation of solar radiation is the
least in UV fraction, followed by PAR and the most in NIR. Broader
variations in PAR and NIR are associated with the short time scale
fluctuations of aerosol and water vapors. The corresponding daily
evolution of UV, PAR, and NIR fractions implies that aerosol and
water vapors variation could also be responsible for the deviation
pattern in the Langley-plot analysis.
Abstract: We report on a high-speed quantum cryptography
system that utilizes simultaneous entanglement in polarization and in
“time-bins". With multiple degrees of freedom contributing to the
secret key, we can achieve over ten bits of random entropy per detected coincidence. In addition, we collect from multiple spots o
the downconversion cone to further amplify the data rate, allowing usto achieve over 10 Mbits of secure key per second.
Abstract: Software reliability, defined as the probability of a
software system or application functioning without failure or errors
over a defined period of time, has been an important area of research
for over three decades. Several research efforts aimed at developing
models to improve reliability are currently underway. One of the
most popular approaches to software reliability adopted by some of
these research efforts involves the use of operational profiles to
predict how software applications will be used. Operational profiles
are a quantification of usage patterns for a software application. The
research presented in this paper investigates an innovative multiagent
framework for automatic creation and management of
operational profiles for generic distributed systems after their release
into the market. The architecture of the proposed Operational Profile
MAS (Multi-Agent System) is presented along with detailed
descriptions of the various models arrived at following the analysis
and design phases of the proposed system. The operational profile in
this paper is extended to comprise seven different profiles. Further,
the criticality of operations is defined using a new composed metrics
in order to organize the testing process as well as to decrease the time
and cost involved in this process. A prototype implementation of the
proposed MAS is included as proof-of-concept and the framework is
considered as a step towards making distributed systems intelligent
and self-managing.
Abstract: The data measurement of mean velocity has been
taken for the wake of single circular cylinder with three different diameters for two different velocities. The effects of change in
diameter and in velocity are studied in self-similar coordinate system.
The spatial variations of velocity defect and that of the half-width
have been investigated. The results are compared with those
published by H.Schlichting. In the normalized coordinates, it is also observed that all cases except for the first station are self-similar. By attention to self-similarity profiles of mean velocity, it is observed for all the cases at the each station curves tend to zero at a same point.
Abstract: Intrusion Detection Systems are increasingly a key
part of systems defense. Various approaches to Intrusion Detection
are currently being used, but they are relatively ineffective. Artificial
Intelligence plays a driving role in security services. This paper
proposes a dynamic model Intelligent Intrusion Detection System,
based on specific AI approach for intrusion detection. The
techniques that are being investigated includes neural networks and
fuzzy logic with network profiling, that uses simple data mining
techniques to process the network data. The proposed system is a
hybrid system that combines anomaly, misuse and host based
detection. Simple Fuzzy rules allow us to construct if-then rules that
reflect common ways of describing security attacks. For host based
intrusion detection we use neural-networks along with self
organizing maps. Suspicious intrusions can be traced back to its
original source path and any traffic from that particular source will
be redirected back to them in future. Both network traffic and system
audit data are used as inputs for both.