Abstract: The problem of incompressible steady flow simulation around an airfoil is discussed. For some simplest airfoils (circular, elliptical, Zhukovsky airfoils) the exact solution is known from complex analysis. It allows to compute the intensity of vortex layer which simulates the airfoil. Some modifications of the vortex element method are proposed and test computations are carried out. It-s shown that the these approaches are much more effective in comparison with the classical numerical scheme.
Abstract: In the present analysis an unsteady laminar
forced convection water boundary layer flow is considered.
The fluid properties such as viscosity and Prandtl number are
taken as variables such that those are inversely proportional to
temperature. By using quasi-linearization technique the nonlinear
coupled partial differential equations are linearized and
the numerical solutions are obtained by using implicit finite
difference scheme with the appropriate selection of step sizes.
Non-similar solutions have been obtained from the starting
point of the stream-wise coordinate to the point where skin
friction value vanishes. The effect non-uniform mass transfer
along the surface of the cylinder through slot is studied on the
skin friction and heat transfer coefficients.
Abstract: The purpose of this paper is to analyze determinants of
information security affecting adoption of the Web-based integrated
information systems (IIS). We introduced Web-based information
systems which are designed to formulate strategic plans for Peruvian
government. Theoretical model is proposed to test impact of
organizational factors (deterrent efforts and severity; preventive
efforts) and individual factors (information security threat; security
awareness) on intentions to proactively use the Web-based IIS .Our
empirical study results highlight that deterrent efforts and deterrent
severity have no significant influence on the proactive use intentions
of IIS, whereas, preventive efforts play an important role in proactive
use intentions of IIS. Thus, we suggest that organizations need to do
preventive efforts by introducing various information security
solutions, and try to improve information security awareness while
reducing the perceived information security threats.
Abstract: One of the most attractive and important field of chaos theory is control of chaos. In this paper, we try to present a simple framework for chaotic motion control using the feedback linearization method. Using this approach, we derive a strategy, which can be easily applied to the other chaotic systems. This task presents two novel results: the desired periodic orbit need not be a solution of the original dynamics and the other is the robustness of response against parameter variations. The illustrated simulations show the ability of these. In addition, by a comparison between a conventional state feedback and our proposed method it is demonstrated that the introduced technique is more efficient.
Abstract: In this paper, we establish existence and uniqueness of
solutions for a class of inverse problems of degenerate differential
equations. The main tool is the perturbation theory for linear operators.
Abstract: Aggression is a behavior that cannot be approved by
the society. Vandalism which is aggression towards objects is an
action that tends to damage public or personal property. The
behaviors that are described as vandalism can often be observed in
the schools as well. According to Zwier and Vaughan (1)
previous research about the reasons of and precautionary measures
for vandalism in schools can be grouped in three tendency categories:
conservative, liberal and radical. In this context, the main aim of this
study is to discover which ideological tendency of the reasons of
school vandalism is adopted by the teachers and what are their
physical, environmental, school system and societal solutions for
vandalism. A total of 200 teachers participated in this study, and the
mean age was 34.20 years (SD = 6.54). The sample was made up of
109 females and 91 males. For the analysis of the data, SPSS 15.00,
frequency, percentage, and t-test were used. The research showed
that the teachers have tendencies in the order of conservative, liberal
and radical for the reasons of vandalism. The research also showed
that the teachers do not have any tendency for eliminating vandalism
physically and general solutions on the level of society; on the other
hand they mostly adopt a conservative tendency in terms of
precautions against vandalism in the school system. Second most,
they adopt the liberal tendency in terms of precautions against
vandalism in the school system. . It is observed that the findings of
this study are comparable to the existing literature on the subject.
Future studies should be conducted with multiple variants and
bigger sampling.
Abstract: Smoke discharging is a main reason of air pollution
problem from industrial plants. The obstacle of a building has an
affect with the air pollutant discharge. In this research, a mathematical
model of the smoke dispersion from two sources and one source with
a structural obstacle is considered. The governing equation of the
model is an isothermal mass transfer model in a viscous fluid. The
finite element method is used to approximate the solutions of the
model. The triangular linear elements have been used for discretising
the domain, and time integration has been carried out by semi-implicit
finite difference method. The simulations of smoke dispersion in
cases of one chimney and two chimneys are presented. The maximum
calculated smoke concentration of both cases are compared. It is then
used to make the decision for smoke discharging and air pollutant
control problems on industrial area.
Abstract: In this paper, a solution is presented for a robotic
manipulation problem in industrial settings. The problem is sensing
objects on a conveyor belt, identifying the target, planning and
tracking an interception trajectory between end effector and the
target. Such a problem could be formulated as combining object
recognition, tracking and interception. For this purpose, we integrated
a vision system to the manipulation system and employed tracking
algorithms. The control approach is implemented on a real industrial
manipulation setting, which consists of a conveyor belt, objects
moving on it, a robotic manipulator, and a visual sensor above the
conveyor. The trjectory for robotic interception at a rendezvous point
on the conveyor belt is analytically calculated. Test results show that
tracking the raget along this trajectory results in interception and
grabbing of the target object.
Abstract: The application of the synchronous dynamic random
access memory (SDRAM) has gone beyond the scope of personal
computers for quite a long time. It comes into hand whenever a big
amount of low price and still high speed memory is needed. Most of
the newly developed stand alone embedded devices in the field of
image, video and sound processing take more and more use of it. The
big amount of low price memory has its trade off – the speed. In
order to take use of the full potential of the memory, an efficient
controller is needed. Efficient stands for maximum random accesses
to the memory both for reading and writing and less area after
implementation. This paper proposes a target device independent
DDR SDRAM pipelined controller and provides performance
comparison with available solutions.
Abstract: Clustering techniques have received attention in many areas including engineering, medicine, biology and data mining. The purpose of clustering is to group together data points, which are close to one another. The K-means algorithm is one of the most widely used techniques for clustering. However, K-means has two shortcomings: dependency on the initial state and convergence to local optima and global solutions of large problems cannot found with reasonable amount of computation effort. In order to overcome local optima problem lots of studies done in clustering. This paper is presented an efficient hybrid evolutionary optimization algorithm based on combining Particle Swarm Optimization (PSO) and Ant Colony Optimization (ACO), called PSO-ACO, for optimally clustering N object into K clusters. The new PSO-ACO algorithm is tested on several data sets, and its performance is compared with those of ACO, PSO and K-means clustering. The simulation results show that the proposed evolutionary optimization algorithm is robust and suitable for handing data clustering.
Abstract: A numerical solution of the initial boundary value
problem of the suspended string vibrating equation with the
particular nonlinear damping term based on the finite difference
scheme is presented in this paper. The investigation of how the
second and third power terms of the nonlinear term affect the
vibration characteristic. We compare the vibration amplitude as a
result of the third power nonlinear damping with the second power
obtained from previous report provided that the same initial shape
and initial velocities are assumed. The comparison results show that
the vibration amplitude is inversely proportional to the coefficient of
the damping term for the third power nonlinear damping case, while
the vibration amplitude is proportional to the coefficient of the
damping term in the second power nonlinear damping case.
Abstract: An HPLC-UV analytical method was developed to
determine ethylenediaminetetraacetic acid (EDTA) in dairy
wastewater and surface water. The optimizing separation was achieved
by reversed–phase ion-pair liquid chromatography on a C18 column
using methanol as mobile phase solvent, tetrabutylammonium bromide
as the ion-pair reagent in pH 3.3 formate buffer solution at a flow rate
of 0.9 mL min-1 with a UV detector at 265 nm. No interference of Ca,
Mg or NO3
- was detected. Method performance was evaluated in terms
of linearity, repeatability and reproducibility. The method detection
limit was 5 μg L-1. The contents of EDTA in dairy effluents were 72 ~
261 μg L-1 at a large dairy site. A change of EDTA concentration was
observed downstream of the dairy effluent discharge, but this was well
under the predicted no effect concentration for aquatic ecosystem.
Abstract: Network on a chip (NoC) has been proposed as a viable solution to counter the inefficiency of buses in the current VLSI on-chip interconnects. However, as the silicon chip accommodates more transistors, the probability of transient faults is increasing, making fault tolerance a key concern in scaling chips. In packet based communication on a chip, transient failures can corrupt the data packet and hence, undermine the accuracy of data communication. In this paper, we present a comparative analysis of transient fault tolerant techniques including end-to-end, node-by-node, and stochastic communication based on flooding principle.
Abstract: The 9/11 suicide attacks in New York, Washington, D.C., and Pennsylvania, triggered a number of security responses both in the United States of America and other Countries in the World. Kenya, which is an ally and a close partner to North America and Europe, was not left behind. While many states had been parties to numerous terrorism conventions, their response in implementing them had been slow and needed this catalyst. This special case offered a window of opportunity for many “security conscious" regimes in cementing their legal-criminological and political security apparatus. At the international level, the 9/11 case led to the hasty adoption of Security Council resolution 1373 in 2001, which called upon states to adopt wide-ranging and comprehensive steps and strategies to combat international terrorism and to become parties to the relevant international conventions and protocols relating to terrorism. Since then, Kenya has responded with speed in devising social-legal-criminological-political actions.
Abstract: A variational method is used to obtain the growth rate of a transverse long-wavelength perturbation applied to the soliton solution of a nonlinear Schr¨odinger equation with a three-half order potential. We demonstrate numerically that this unstable perturbed soliton will eventually transform into a cylindrical soliton.
Abstract: IPN and IPE sections, which are commonly used European I shapes, are widely used in steel structures as cantilever beams to support overhangs. A considerable number of studies exist on calculating lateral torsional buckling load of I sections. However, most of them provide series solutions or complex closed-form equations. In this paper, a simple equation is presented to calculate lateral torsional buckling load of IPN and IPE section cantilever beams. First, differential equation of lateral torsional buckling is solved numerically for various loading cases. Then a parametric study is conducted on results to present an equation for lateral torsional buckling load of European IPN and IPE beams. Finally, results obtained by presented equation are compared to differential equation solutions and finite element model results. ABAQUS software is utilized to generate finite element models of beams. It is seen that the results obtained from presented equation coincide with differential equation solutions and ABAQUS software results. It can be suggested that presented formula can be safely used to calculate critical lateral torsional buckling load of European IPN and IPE section cantilevers.
Abstract: In this paper, the phase control antenna array synthesis
is presented. The problem is formulated as a constrained optimization
problem that imposes nulls with prescribed level while maintaining
the sidelobe at a prescribed level. For efficient use of the algorithm
memory, compared to the well known Particle Swarm Optimization
(PSO), the Accelerated Particle Swarm Optimization (APSO) is used
to estimate the phase parameters of the synthesized array. The
objective function is formed using a main objective and set of
constraints with penalty factors that measure the violation of each
feasible solution in the search space to each constraint. In this case
the obtained feasible solution is guaranteed to satisfy all the
constraints. Simulation results have shown significant performance
increases and a decreased randomness in the parameter search space
compared to a single objective conventional particle swarm
optimization.
Abstract: Quaternary InxAlyGa1-x-yN semiconductors have
attracted much research interest because the use of this quaternary
offer the great flexibility in tailoring their band gap profile while
maintaining their lattice-matching and structural integrity. The
structural and optical properties of InxAlyGa1-x-yN alloys grown by
molecular beam epitaxy (MBE) is presented. The structural quality of
InxAlyGa1-x-yN layers was characterized using high-resolution X-ray
diffraction (HRXRD). The results confirm that the InxAlyGa1-x-yN
films had wurtzite structure and without phase separation. As the In
composition increases, the Bragg angle of the (0002) InxAlyGa1-x-yN
peak gradually decreases, indicating the increase in the lattice constant
c of the alloys. FWHM of (0002) InxAlyGa1-x-yN decreases with
increasing In composition from 0 to 0.04, that could indicate the
decrease of quality of the samples due to point defects leading to
non-uniformity of the epilayers. UV-VIS spectroscopy have been used
to study the energy band gap of InxAlyGa1-x-yN. As the indium (In)
compositions increases, the energy band gap decreases. However, for
InxAlyGa1-x-yN with In composition of 0.1, the band gap shows a
sudden increase in energy. This is probably due to local alloy
compositional fluctuations in the epilayer. The bowing parameter
which appears also to be very sensitive on In content is investigated
and obtained b = 50.08 for quaternary InxAlyGa1-x-yN alloys. From
photoluminescence (PL) measurement, green luminescence (GL)
appears at PL spectrum of InxAlyGa1-x-yN, emitted for all x at ~530 nm
and it become more pronounced as the In composition (x) increased,
which is believed cause by gallium vacancies and related to isolated
native defects.
Abstract: Most standard software development methodologies
are often not applied to software projects in many developing
countries of the world. The approach generally practice is close to
what eXtreme Programming (XP) is likely promoting, just keep
coding and testing as the requirement evolves. XP is an agile
software process development methodology that has inherent
capability for improving efficiency of Business Software
Development (BSD). XP can facilitate Business-to-Development
(B2D) relationship due to its customer-oriented advocate. From
practitioner point of view, we applied XP to BSD and result shows
that customer involvement has positive impact on productivity, but
can as well frustrate the success of the project. In an effort to
promote software engineering practice in developing countries of
Africa, we present the experiment performed, lessons learned,
problems encountered and solution adopted in applying XP
methodology to BSD.
Abstract: This paper presents a conceptual model of agreement
options on negotiation support for civil engineering decision. The
negotiation support facilitates the solving of group choice decision
making problems in civil engineering decision to reduce the impact
of mud volcano disaster in Sidoarjo, Indonesia. The approach based
on application of analytical hierarchy process (AHP) method for
multi criteria decision on three level of decision hierarchy.
Decisions for reducing impact is very complicated since many
parties involved in a critical time. Where a number of stakeholders
are involved in choosing a single alternative from a set of solution
alternatives, there are different concern caused by differing
stakeholder preferences, experiences, and background. Therefore, a
group choice decision support is required to enable each stakeholder
to evaluate and rank the solution alternatives before engaging into
negotiation with the other stakeholders. Such civil engineering
solutions as alternatives are referred to as agreement options that are
determined by identifying the possible stakeholder choice, followed
by determining the optimal solution for each group of stakeholder.
Determination of the optimal solution is based on a game theory
model of n-person general sum game with complete information that
involves forming coalitions among stakeholders.