Abstract: The measured data obtained from sensors in
continuous monitoring of civil structures are mainly used for modal
identification and damage detection. Therefore, when modal
identification analysis is carried out the quality in the identification of
the modes will highly influence the damage detection results. It is
also widely recognized that the usefulness of the measured data used
for modal identification and damage detection is significantly
influenced by the number and locations of sensors. The objective of
this study is the numerical implementation of two widely known
optimum sensor placement methods in beam-like structures.
Abstract: A total of 150 meat type chickens comprising 50 each
of Arbor Acre, Marshall and Ross were used for this study which
lasted for 10 weeks at the Federal University of Agriculture,
Abeokuta, Nigeria. Growth performance data were collected from the
third week through week 10 and data obtained were analysed using
the Generalized Linear Model Procedure. Heritability estimates (h2)
for body dimensions carried out on the chicken strains ranged from
low to high. Marshall broiler chicken strain had the highest h2 for
body weight 0.46±0.04, followed by Arbor Acre and Ross with h2
being 0.38±0.12 and 0.26±0.06, respectively. The repeatability
estimates for body weight in the three broiler strains were high, and it
ranged from 0.70 at week 4 to 0.88 at week 10. Relationships
between the body weight and linear body measurements in the broiler
chicken strains were positive and highly significant (p > 0.05).
Abstract: This paper aims at introducing finite automata theory,
the different ways to describe regular languages and create a program
to implement the subset construction algorithms to convert
nondeterministic finite automata (NFA) to deterministic finite
automata (DFA). This program is written in c++ programming
language. The program reads FA 5tuples from text file and then
classifies it into either DFA or NFA. For DFA, the program will read
the string w and decide whether it is acceptable or not. If accepted, the
program will save the tracking path and point it out. On the other hand,
when the automation is NFA, the program will change the Automation
to DFA so that it is easy to track and it can decide whether the w exists
in the regular language or not.
Abstract: Voltage sags are the most common power quality
disturbance in the distribution system. It occurs due to the fault in the
electrical network or by the starting of a large induction motor and
this can be solved by using the custom power devices such as
Dynamic Voltage Restorer (DVR). In this paper DVR is proposed to
compensate voltage sags on critical loads dynamically. The DVR
consists of VSC, injection transformers, passive filters and energy
storage (lead acid battery). By injecting an appropriate voltage, the
DVR restores a voltage waveform and ensures constant load voltage.
The simulation and experimental results of a DVR using MATLAB
software shows clearly the performance of the DVR in mitigating
voltage sags.
Abstract: This paper deals with the problem of passivity
analysis for stochastic neural networks with leakage, discrete and
distributed delays. By using delay partitioning technique, free
weighting matrix method and stochastic analysis technique, several
sufficient conditions for the passivity of the addressed neural
networks are established in terms of linear matrix inequalities
(LMIs), in which both the time-delay and its time derivative can be
fully considered. A numerical example is given to show the
usefulness and effectiveness of the obtained results.
Abstract: The European Union Survey on Income and Living
Conditions (EU-SILC) is a popular survey which provides
information on income, poverty, social exclusion and living
conditions of households and individuals in the European Union.
The EU-SILC contains variables which may contain outliers. The
presence of outliers can have an impact on the measures and
indicators used by the EU-SILC. In this paper, we used data sets
from various countries to analyze the presence of outliers. In addition,
we obtain some indicators after removing these outliers, and a
comparison between both situations can be observed. Finally, some
conclusions are obtained.
Abstract: This research paper aims to identify, analyze and rank
factors affecting labor productivity in Spain with respect to their
relative importance. Using a selected set of 35 factors, a structured
questionnaire survey was utilized as the method to collect data from
companies. Target population is comprised by a random
representative sample of practitioners related with the Spanish
construction industry. Findings reveal the top five ranked factors are
as follows: (1) shortage or late supply of materials; (2) clarity of the
drawings and project documents; (3) clear and daily task assignment;
(4) tools or equipment shortages; (5) level of skill and experience of
laborers. Additionally, this research also pretends to provide simple
and comprehensive recommendations so that they could be
implemented by construction managers for an effective management
of construction labor forces.
Abstract: Currently, biological control programs in greenhouse
crops involve the use, at the same time, several natural enemies
during the crop cycle. Also, large number of plant species grown in
greenhouses, among them, the used cultivars are also wide. However,
the cultivar effects on entomophagous species efficacy (predators and
parasitoids) have been scarcely studied. A new method had been
developed, using the factitious prey or host Ephestia kuehniella. It
allow us to evaluate, under greenhouse or controlled conditions
(semi-field), the cultivar effects on the entomophagous species
effectiveness. The work was carried out in greenhouse tomato crop. It
has been found the biological and ecological activities of predatory
species (Nesidiocoris tenuis) and egg-parasitoid (Trichogramma
achaeae) can be well represented with the use of the factitious prey
or host; being better in the former than the latter. The data found in
the trial are shown and discussed. The developed method could be
applied to evaluate new plant materials before making available to
farmers as commercial varieties, at low costs and easy use.
Abstract: This research proposes a novel reconstruction protocol
for restoring missing surfaces and low-quality edges and shapes in
photos of artifacts at historical sites. The protocol starts with the
extraction of a cloud of points. This extraction process is based on
four subordinate algorithms, which differ in the robustness and
amount of resultant. Moreover, they use different -but
complementary- accuracy to some related features and to the way
they build a quality mesh. The performance of our proposed protocol
is compared with other state-of-the-art algorithms and toolkits. The
statistical analysis shows that our algorithm significantly outperforms
its rivals in the resultant quality of its object files used to reconstruct
the desired model.
Abstract: In this paper we make a temperature investigations in
two type of superposed crimped connections using experimental
determinations. All the samples use 8 copper wire 7.1 x 3 mm2
crimped by two methods: the first method uses one crimp indents and
the second is a proposed method with two crimp indents. The ferrule
is a parallel one. We study the influence of number and position of
crimp indents. The samples are heated in A.C. current at different
current values until steady state heating regime. After obtaining of
temperature values, we compare them and present the conclusion.
Abstract: Frequent pattern mining is the process of finding a
pattern (a set of items, subsequences, substructures, etc.) that occurs
frequently in a data set. It was proposed in the context of frequent
itemsets and association rule mining. Frequent pattern mining is used
to find inherent regularities in data. What products were often
purchased together? Its applications include basket data analysis,
cross-marketing, catalog design, sale campaign analysis, Web log
(click stream) analysis, and DNA sequence analysis. However, one of
the bottlenecks of frequent itemset mining is that as the data increase
the amount of time and resources required to mining the data
increases at an exponential rate. In this investigation a new algorithm
is proposed which can be uses as a pre-processor for frequent itemset
mining. FASTER (FeAture SelecTion using Entropy and Rough sets)
is a hybrid pre-processor algorithm which utilizes entropy and roughsets
to carry out record reduction and feature (attribute) selection
respectively. FASTER for frequent itemset mining can produce a
speed up of 3.1 times when compared to original algorithm while
maintaining an accuracy of 71%.
Abstract: Two types of commercial cylindrical lithium ion
batteries (Panasonic 3.4 Ah NCR-18650B and Samsung 2.9 Ah
INR-18650), were investigated experimentally. The capacities of these
samples were individually measured using constant current-constant
voltage (CC-CV) method at different ambient temperatures (-10°C,
0°C, 25°C). Their internal resistance was determined by
electrochemical impedance spectroscopy (EIS) and pulse discharge
methods. The cells with different configurations of parallel connection
NCR-NCR, INR-INR and NCR-INR were charged/discharged at the
aforementioned ambient temperatures. The results showed that the
difference of internal resistance between cells much more evident at
low temperatures. Furthermore, the parallel connection of NCR-NCR
exhibits the most uniform temperature distribution in cells at -10°C,
this feature is quite favorable for the safety of the battery pack.
Abstract: During welding, the amount of heat present in weld
zones determines the quality of weldment produced. Thus, the heat
distribution characteristics and its magnitude in weld zones with
respect to process variables such as tool pin-shoulder rotational and
traveling speed during welding is analyzed using thermal finite
element analyses method. For this purpose, transient thermal finite
element analyses are performed to model the temperatures
distribution and its quantities in weld-zones with respect to process
variables such as rotational speed and traveling speed during welding.
Commercially available software Altair HyperWork is used to model
three-dimensional tool pin-shoulder vs. workpieces and to simulate
the friction stir process. The results show that increasing tool
rotational speed, at a constant traveling speed, will increase the
amount of heat generated in weld-zones. In contrary, increasing
traveling speed, at constant tool pin-shoulder rotational speeds, will
reduce the amount of heat generated in weld zones.
Abstract: Researches and concerns in power quality gained
significant momentum in the field of power electronics systems over
the last two decades globally. This sudden increase in the number of
concerns over power quality problems is a result of the huge increase
in the use of non-linear loads. In this paper, power quality evaluation
of some distribution networks at Misurata - Libya has been done
using a power quality and energy analyzer (Fluke 437 Series II). The
results of this evaluation are used to minimize the problems of power
quality. The analysis shows the main power quality problems that
exist and the level of awareness of power quality issues with the aim
of generating a start point which can be used as guidelines for
researchers and end users in the field of power systems.
Abstract: This paper clarifies the role of ICT capital in economic
growth. Albeit ICT remarkably contributes to economic growth, there
are few studies on ICT capital in ICT sector from theoretical point of
view. In this paper, production function of ICT which is used as input
of intermediate good in final good and ICT sectors is incorporated
into our model. In this setting, we analyze the role of ICT on balance
growth path and show the possibility of general equilibrium solutions
for this model. Through the simulation of the equilibrium solutions,
we find that when ICT impacts on economy and economic growth
increases, it is necessary that increases of efficiency at ICT sector and
of accumulation of non-ICT and ICT capitals occur simultaneously.
Abstract: The generalized wave equation models various
problems in sciences and engineering. In this paper, a new three-time
level implicit approach based on cubic trigonometric B-spline for the
approximate solution of wave equation is developed. The usual finite
difference approach is used to discretize the time derivative while
cubic trigonometric B-spline is applied as an interpolating function in
the space dimension. Von Neumann stability analysis is used to
analyze the proposed method. Two problems are discussed to exhibit
the feasibility and capability of the method. The absolute errors and
maximum error are computed to assess the performance of the
proposed method. The results were found to be in good agreement
with known solutions and with existing schemes in literature.
Abstract: As currently various portable devices were launched,
smart business conducted using them became common. Since smart
business can use company-internal resources in an exlternal remote
place, user authentication that can identify authentic users is an
important factor. Commonly used user authentication is a method of
using user ID and Password. In the user authentication using ID and
Password, the user should see and enter authentication information
him or her. In this user authentication system depending on the user’s
vision, there is the threat of password leaks through snooping in the
process which the user enters his or her authentication information.
This study designed and produced a user authentication module
using an actuator to respond to the snooping threat.
Abstract: Recently, to cope with the rapidly changing
construction trend with aging infrastructures, modular bridge
technology has been studied actively. Modular bridge is easily
constructed by assembling standardized precast structure members in
the field. It will be possible to construct rapidly and reduce
construction cost efficiently. However, the shape of the transverse
connection of T-type girder newly developed between the segmented
modules is not verified. Therefore, the verification of the connection
shape is needed. In this study, shape of the modular T-girder bridge
transverse connection was analyzed by finite element model that was
verified in study which was verified model of transverse connection
using Abaqus. Connection angle was chosen as the parameter. The
result of analyses showed that optimal value of angle is 130 degree.
Abstract: Consumer-to-Consumer (C2C) E-commerce has been
growing at a very high speed in recent years. Since identical or
nearly-same kinds of products compete one another by relying on
keyword search in C2C E-commerce, some sellers describe their
products with spam keywords that are popular but are not related to
their products. Though such products get more chances to be retrieved
and selected by consumers than those without spam keywords,
the spam keywords mislead the consumers and waste their time.
This problem has been reported in many commercial services like
ebay and taobao, but there have been little research to solve this
problem. As a solution to this problem, this paper proposes a method
to classify whether keywords of a product are spam or not. The
proposed method assumes that a keyword for a given product is
more reliable if the keyword is observed commonly in specifications
of products which are the same or the same kind as the given
product. This is because that a hierarchical category of a product
in general determined precisely by a seller of the product and so is
the specification of the product. Since higher layers of the hierarchical
category represent more general kinds of products, a reliable degree
is differently determined according to the layers. Hence, reliable
degrees from different layers of a hierarchical category become
features for keywords and they are used together with features only
from specifications for classification of the keywords. Support Vector
Machines are adopted as a basic classifier using the features, since
it is powerful, and widely used in many classification tasks. In
the experiments, the proposed method is evaluated with a golden
standard dataset from Yi-han-wang, a Chinese C2C E-commerce,
and is compared with a baseline method that does not consider
the hierarchical category. The experimental results show that the
proposed method outperforms the baseline in F1-measure, which
proves that spam keywords are effectively identified by a hierarchical
category in C2C E-commerce.
Abstract: In the present study, M2 high speed steels were
fabricated by using electro-slag rapid remelting process. Carbide
structure was analysed and the fracture toughness and hardness were
also measured after austenitization treatment at 1190 and 1210oC
followed by tempering treatment at 535oC for billets with various
diameters from 16 to 60 mm. Electro-slag rapid remelting (ESRR)
process is an advanced ESR process combined by continuous casting
and successfully employed in this study to fabricate a sound M2 high
speed ingot. Three other kinds of commercial M2 high speed steels,
produced by traditional method, were also analysed for comparison.
Distribution and structure of eutectic carbides of the ESRR billet were
found to be comparable to those of commercial alloy and so was the
fracture toughness.