Abstract: Water contains oxygen which may make a human
breathe under water like a fish. Centrifugal separator can separate
dissolved gases from water. Carrier solution can increase the
separation of dissolved oxygen from water. But, to develop an
breathing device for a human under water, the enhancement of
separation of dissolved gases including oxygen and portable devices
which have dc battery based device and proper size are needed.
In this study, we set up experimental device for analyzing
separation characteristics of dissolved gases including oxygen from
water using a battery based portable vacuum pump. We characterized
vacuum state, flow rate of separation of dissolved gases and oxygen
concentration which were influenced by the manufactured vacuum
pump.
Abstract: Recent trends in building constructions in Libya are
more toward tall (high-rise) building projects. As a consequence, a
better estimation of the lateral loading in the design process is
becoming the focal of a safe and cost effective building industry. Byin-
large, Libya is not considered a potential earthquake prone zone,
making wind is the dominant design lateral loads. Current design
practice in the country estimates wind speeds on a mere random
bases by considering certain factor of safety to the chosen wind
speed. Therefore, a need for a more accurate estimation of wind
speeds in Libya was the motivation behind this study. Records of
wind speed data were collected from 22 metrological stations in
Libya, and were statistically analysed. The analysis of more than four
decades of wind speed records suggests that the country can be
divided into four zones of distinct wind speeds. A computer “survey"
program was manipulated to draw design wind speeds contour map
for the state of Libya.
The paper presents the statistical analysis of Libya-s recorded
wind speed data and proposes design wind speed values for a 50-year
return period that covers the entire country.
Abstract: Fermented cassava flours (lafun) sold in Ogun and Oyo
States of Nigeria were collected from 10 markets for a period of two
months and analysed to determine their safety status. The presence of
trace metals was due to high vehicular movement around the drying
sites and markets. Cyanide and moisture contents of samples were
also determined to assess the adequacy of fermentation and drying.
The result showed that sample OWO was found to have the highest
amount of 16.02±0.12mg/kg cyanide while the lowest was found in
sample OJO with 10.51±0.10mg/kg. The results also indicated that
sample TVE had the highest moisture content of 18.50±0.20% while
sample OWO had the lowest amount of 12.46±0.47%. Copper and
lead levels were found to be highest in TVE with values 28.10mg/kg
and 1.1mg/kg respectively, while sample BTS had the lowest values
of 20.6mg/kg and 0.05mg/kg respectively. High value of cyanide
indicated inadequate fermentation.
Abstract: A state of the art Speaker Identification (SI) system requires a robust feature extraction unit followed by a speaker modeling scheme for generalized representation of these features. Over the years, Mel-Frequency Cepstral Coefficients (MFCC) modeled on the human auditory system has been used as a standard acoustic feature set for SI applications. However, due to the structure of its filter bank, it captures vocal tract characteristics more effectively in the lower frequency regions. This paper proposes a new set of features using a complementary filter bank structure which improves distinguishability of speaker specific cues present in the higher frequency zone. Unlike high level features that are difficult to extract, the proposed feature set involves little computational burden during the extraction process. When combined with MFCC via a parallel implementation of speaker models, the proposed feature set outperforms baseline MFCC significantly. This proposition is validated by experiments conducted on two different kinds of public databases namely YOHO (microphone speech) and POLYCOST (telephone speech) with Gaussian Mixture Models (GMM) as a Classifier for various model orders.
Abstract: Considering a reservoir with periodic states and
different cost functions with penalty, its release rules can be
modeled as a periodic Markov decision process (PMDP). First,
we prove that policy- iteration algorithm also works for the
PMDP. Then, with policy- iteration algorithm, we obtain the
optimal policies for a special aperiodic reservoir model with
two cost functions under large penalty and give a discussion
when the penalty is small.
Abstract: Baltic competitiveness is quite controversial. In a
situation with the rapid structural changes, economy develops in
balance very rarely - in different fields will always be more rapid
changes in another more stagnation.
Analyzing different economic indices developed by international
organizations the situation in three Baltic countries are described
from a different competitiveness positions highlighting strengths and
weaknesses of each country.
Exploring the openness of the economy, it is possible to observe
certain risks included in the reports describing situation of
competitiveness where government policies competing in the tax
system, the rates of labour market policies, investment environment,
etc. This is a very important factor resulting in competitive
advantage.
Baltic countries are still at a weak position from a technological
perspective, and need to borrow the knowledge and technology from
more developed countries.
Abstract: the aim of this study was to analyze ethnopsychological content of “Aitys" as a process of creative competition in Kazakh traditional folklore by means of Transaction analysis (three types of Ego states are Parent, Adult and Child). “Aitys" is as sources of Kazakh national self-consciousness and form of oral Kazakh national creativity. Comparative psychological analysis of classical and modern “aityses" is carried out. Empirical proved that the victory in “Aitys" is provided with a position of egostate “Adult".
Abstract: The advances in wireless communication have opened unlimited horizons but there are some challenges as well. The Nature derived air medium between MS (Mobile Station) and BS (Base Station) is beyond human control and produces channel impairment. The impact of the natural conditions at the air medium is the biggest issue in wireless communication. Natural conditions make reliability more cumbersome; here reliability refers to the efficient recovery of the lost or erroneous data. The SR-ARQ (Selective Repeat-Automatic Repeat Request) protocol is a de facto standard for any wireless technology at the air interface with its standard reliability features. Our focus in this research is on the reliability of the control or feedback signal of the SR-ARQ protocol. The proposed mechanism, RSR-ARQ (Reliable SR-ARQ) is an enhancement of the SR-ARQ protocol that has ensured the reliability of the control signals through channel impairment sensitive mechanism. We have modeled the system under two-state discrete time Markov Channel. The simulation results demonstrate the better recovery of the lost or erroneous data that will increase the overall system performance.
Abstract: In this article, we introduce a new approach for
analyzing UML designs to detect the inconsistencies between
multiple state diagrams and sequence diagrams. The Super State
Analysis (SSA) identifies the inconsistencies in super states, single
step transitions, and sequences. Because SSA considers multiple
UML state diagrams, it discovers inconsistencies that cannot be
discovered when considering only a single UML state diagram. We
have introduced a transition set that captures relationship information
that is not specifiable in UML diagrams. The SSA model uses the
transition set to link transitions of multiple state diagrams together.
The analysis generates three different sets automatically. These sets
are compared to the provided sets to detect the inconsistencies. SSA
identifies five types of inconsistencies: impossible super states,
unreachable super states, illegal transitions, missing transitions, and
illegal sequences.
Abstract: Problem Statement:Rapid technological developments of the 21st century have advanced our daily lives in various ways. Particularly in education, students frequently utilize technological resources to aid their homework and to access information. listen to radio or watch television (26.9 %) and e-mails (34.2 %) [26]. Not surprisingly, the increase in the use of technologies also resulted in an increase in the use of e-mail, instant messaging, chat rooms, mobile phones, mobile phone cameras and web sites by adolescents to bully peers. As cyber bullying occurs in the cyber space, lesser access to technologies would mean lesser cyber-harm. Therefore, the frequency of technology use is a significant predictor of cyber bullying and cyber victims. Cyber bullies try to harm the victim using various media. These tools include sending derogatory texts via mobile phones, sending threatening e-mails and forwarding confidential emails to everyone on the contacts list. Another way of cyber bullying is to set up a humiliating website and invite others to post comments. In other words, cyber bullies use e-mail, chat rooms, instant messaging, pagers, mobile texts and online voting tools to humiliate and frighten others and to create a sense of helplessness. No matter what type of bullying it is, it negatively affects its victims. Children who bully exhibit more emotional inhibition and attribute themselves more negative self-statements compared to non-bullies. Students whose families are not sympathetic and who receive lower emotional support are more prone to bully their peers. Bullies have authoritarian families and do not get along well with them. The family is the place where the children-s physical, social and psychological needs are satisfied and where their personalities develop. As the use of the internet became prevalent so did parents- restrictions on their children-s internet use. However, parents are unaware of the real harm. Studies that explain the relationship between parental attitudes and cyber bullying are scarce in literature. Thus, this study aims to investigate the relationship between cyber bullying and parental attitudes in the primary school. Purpose of Study: This study aimed to investigate the relationship between cyber bullying and parental attitudes. A second aim was to determine whether parental attitudes could predict cyber bullying and if so which variables could predict it significantly. Methods:The study had a cross-sectional and relational survey model. A demographics information form, questions about cyber bullying and a Parental Attitudes Inventory were conducted with a total of 346 students (189 females and 157 males) registered at various primary schools. Data was analysed by multiple regression analysis using the software package SPSS 16.
Abstract: This paper discusses two observers, which are used
for the estimation of parameters of PMSM. Former one, reduced
order observer, which is used to estimate the inaccessible parameters
of PMSM. Later one, full order observer, which is used to estimate
all the parameters of PMSM even though some of the parameters are
directly available for measurement, so as to meet with the
insensitivity to the parameter variation. However, the state space
model contains some nonlinear terms i.e. the product of different
state variables. The asymptotic state observer, which approximately
reconstructs the state vector for linear systems without uncertainties,
was presented by Luenberger. In this work, a modified form of such
an observer is used by including a non-linear term involving the
speed. So, both the observers are designed in the framework of
nonlinear control; their stability and rate of convergence is discussed.
Abstract: Explosive welding is a process which uses explosive
detonation to move the flyer plate material into the base material to
produce a solid state joint. Experimental tests have been carried out
by other researchers; have been considered to explosively welded
aluminium 7039 and steel 4340 tubes in one step. The tests have been
done using various stand-off distances and explosive ratios. Various
interface geometries have been obtained from these experiments. In
this paper, all the experiments carried out were simulated using the
finite element method. The flyer plate and collision velocities
obtained from the analysis were validated by the pin-measurement
experiments. The numerical results showed that very high localized
plastic deformation produced at the bond interface. The
Ls_dyna_971 FEM has been used for all simulation process.
Abstract: This study presents an exact general solution for
steady-state conductive heat transfer in cylindrical composite
laminates. Appropriate Fourier transformation has been obtained
using Sturm-Liouville theorem. Series coefficients are achieved by
solving a set of equations that related to thermal boundary conditions
at inner and outer of the cylinder, also related to temperature
continuity and heat flux continuity between each layer. The solution
of this set of equations are obtained using Thomas algorithm. In this
paper, the effect of fibers- angle on temperature distribution of
composite laminate is investigated under general boundary
conditions. Here, we show that the temperature distribution for any
composite laminates is between temperature distribution for
laminates with θ = 0° and θ = 90° .
Abstract: A numerical study is presented on buckling and post
buckling behaviour of laminated carbon fiber reinforced plastic
(CFRP) thin-walled cylindrical shells under axial compression using
asymmetric meshing technique (AMT). Asymmetric meshing
technique is a perturbation technique to introduce disturbance without
changing geometry, boundary conditions or loading conditions.
Asymmetric meshing affects predicted buckling load, buckling mode
shape and post-buckling behaviour. Linear (eigenvalue) and nonlinear
(Riks) analyses have been performed to study the effect of
asymmetric meshing in the form of a patch on buckling behaviour.
The reduction in the buckling load using Asymmetric meshing
technique was observed to be about 15%. An isolated dimple formed
near the bifurcation point and the size of which increased to reach a
stable state in the post-buckling region. The load-displacement curve
behaviour applying asymmetric meshing is quite similar to the curve
obtained using initial geometric imperfection in the shell model.
Abstract: Perhaps no single issue has been cited as either the root
cause and / or the greatest challenge to the restructured power system then the lack of adequate reliable transmission. Probabilistic transmission planning has become increasingly necessary and important in recent
years. The transmission planning analysis carried out by the authors,
spans a 10-year horizon, taking into consideration a value of 2 % load
increase / year at each consumer. Taking into consideration this increased
load, a probabilistic power flow was carried out, all the system components
being regarded from probabilistic point of view. Several contingencies
have been generated, for assessing the security of the power system. The results have been analyzed and several important conclusions were pointed. The objective is to achieve a network that works without limit violations for all (or most of) scenario realizations. The case study is represented by the IEEE 14 buses test power system.
Abstract: This paper present a new method for design of power
system stabilizer (PSS) based on sliding mode control (SMC)
technique. The control objective is to enhance stability and improve
the dynamic response of the multi-machine power system. In order to
test effectiveness of the proposed scheme, simulation will be carried
out to analyze the small signal stability characteristics of the system
about the steady state operating condition following the change in
reference mechanical torque and also parameters uncertainties. For
comparison, simulation of a conventional control PSS (lead-lag
compensation type) will be carried out. The main approach is
focusing on the control performance which later proven to have the
degree of shorter reaching time and lower spike.
Abstract: The requirements analysis, modeling, and simulation have consistently been one of the main challenges during the development of complex systems. The scenarios and the state machines are two successful models to describe the behavior of an interactive system. The scenarios represent examples of system execution in the form of sequences of messages exchanged between objects and are a partial view of the system. In contrast, state machines can represent the overall system behavior. The automation of processing scenarios in the state machines provide some answers to various problems such as system behavior validation and scenarios consistency checking. In this paper, we propose a method for translating scenarios in state machines represented by Discreet EVent Specification and procedure to detect implied scenarios. Each induced DEVS model represents the behavior of an object of the system. The global system behavior is described by coupling the atomic DEVS models and validated through simulation. We improve the validation process with integrating formal methods to eliminate logical inconsistencies in the global model. For that end, we use the Z notation.
Abstract: The Expert Witness Testimony in the Battered
Woman Syndrome Expert witness testimony (EWT) is a kind of
information given by an expert specialized in the field (here in BWS)
to the jury in order to help the court better understand the case. EWT
does not always work in favor of the battered women. Two main
decision-making models are discussed in the paper: the Mathematical
model and the Explanation model. In the first model, the jurors
calculate ″the importance and strength of each piece of evidence″
whereas in the second model they try to integrate the EWT with the
evidence and create a coherent story that would describe the crime.
The jury often misunderstands and misjudges battered women for
their action (or in this case inaction). They assume that these women
are masochists and accept being mistreated for if a man abuses a
woman constantly, she should and could divorce him or simply leave
at any time. The research in the domain found that indeed, expert
witness testimony has a powerful influence on juror’s decisions thus
its quality needs to be further explored. One of the important factors
that need further studies is a bias called the dispositionist worldview
(a belief that what happens to people is of their own doing). This
kind of attributional bias represents a tendency to think that a
person’s behavior is due to his or her disposition, even when the
behavior is clearly attributed to the situation. Hypothesis The
hypothesis of this paper is that if a juror has a dispositionist
worldview then he or she will blame the rape victim for triggering the
assault. The juror would therefore commit the fundamental
attribution error and believe that the victim’s disposition caused the
rape and not the situation she was in. Methods The subjects in the
study were 500 randomly sampled undergraduate students from
McGill, Concordia, Université de Montréal and UQAM.
Dispositional Worldview was scored on the Dispositionist
Worldview Questionnaire. After reading the Rape Scenarios, each
student was asked to play the role of a juror and answer a
questionnaire consisting of 7 questions about the responsibility,
causality and fault of the victim. Results The results confirm the
hypothesis which states that if a juror has a dispositionist worldview
then he or she will blame the rape victim for triggering the assault.
By doing so, the juror commits the fundamental attribution error
because he will believe that the victim’s disposition, and not the
constraints or opportunities of the situation, caused the rape scenario.
Abstract: Although achieving zero-defect software release is
practically impossible, software industries should take maximum
care to detect defects/bugs well ahead in time allowing only bare
minimums to creep into released version. This is a clear indicator of
time playing an important role in the bug detection. In addition to
this, software quality is the major factor in software engineering
process. Moreover, early detection can be achieved only through
static code analysis as opposed to conventional testing.
BugCatcher.Net is a static analysis tool, which detects bugs in .NET®
languages through MSIL (Microsoft Intermediate Language)
inspection. The tool utilizes a Parser based on Finite State Automata
to carry out bug detection. After being detected, bugs need to be
corrected immediately. BugCatcher.Net facilitates correction, by
proposing a corrective solution for reported warnings/bugs to end
users with minimum side effects. Moreover, the tool is also capable
of analyzing the bug trend of a program under inspection.
Abstract: Security is an interesting and significance issue for
popular virtual platforms, such as virtualization cluster and cloud
platforms. Virtualization is the powerful technology for cloud
computing services, there are a lot of benefits by using virtual machine
tools which be called hypervisors, such as it can quickly deploy all
kinds of virtual Operating Systems in single platform, able to control
all virtual system resources effectively, cost down for system platform
deployment, ability of customization, high elasticity and high
reliability. However, some important security problems need to take
care and resolved in virtual platforms that include terrible viruses, evil
programs, illegal operations and intrusion behavior. In this paper, we
present useful Intrusion Detection Mechanism (IDM) software that not
only can auto to analyze all system-s operations with the accounting
journal database, but also is able to monitor the system-s state for
virtual platforms.