Abstract: Abrasive waterjet cutting (AWJ) is a highly efficient
method for cutting almost any type of material. When holes shall be
cut the waterjet first needs to pierce the material.This paper presents a
vast experimental analysis of piercing parameters effect on piercing
time. Results from experimentation on feed rates, work piece
thicknesses, abrasive flow rates, standoff distances and water
pressure are also presented as well as studies on three methods for
dynamic piercing. It is shown that a large amount of time and
resources can be saved by choosing the piercing parameters in a
correct way. The large number of experiments puts demands on the
experimental setup. An automated experimental setup including
piercing detection is presented to enable large series of experiments
to be carried out efficiently.
Abstract: This study suggests a model of a new set of evaluation criteria that will be used to measure the efficiency of real-world E-commerce websites. Evaluation criteria include design, usability and performance for websites, the Data Envelopment Analysis (DEA) technique has been used to measure the websites efficiency. An efficient Web site is defined as a site that generates the most outputs, using the smallest amount of inputs. Inputs refer to measurements representing the amount of effort required to build, maintain and perform the site. Output is amount of traffic the site generates. These outputs are measured as the average number of daily hits and the average number of daily unique visitors.
Abstract: This paper describes a novel monitoring scheme to
minimize total active power in digital circuits depend on the demand
frequency, by adjusting automatically both supply voltage and
threshold voltages based on circuit operating conditions such as
temperature, process variations, and desirable frequency. The delay
monitoring results, will be control and apply so as to be maintained at
the minimum value at which the chip is able to operate for a given
clock frequency. Design details of power monitor are examined using
simulation framework in 32nm BTPM model CMOS process.
Experimental results show the overhead of proposed circuit in terms
of its power consumption is about 40 μW for 32nm technology;
moreover the results show that our proposed circuit design is not far
sensitive to the temperature variations and also process variations.
Besides, uses the simple blocks which offer good sensitivity, high
speed, the continuously feedback loop. This design provides up to
40% reduction in power consumption in active mode.
Abstract: The scientific perspective, the practice area of physical education and sports activities improve power capacity in all its forms of expression, being a generator of the research topics. Today theories that strength training athletes and slow down development progress will affect the strength and flexibility are discredited. On the other hand there are sectors and / or samples whose results are sports of the way higher manifestation of power as a result of the composition of the force and velocity, being based in this respect on the systematic and continuous development of both bio-motric capacities said. Training of force for children was and is controversial. Teama de accidentări sau a stopării premature a procesului de creştere a făcut ca în trecut copiii să fie ţinuţi departe de lucrul cu diferite greutăţi.Fear of injury or premature stop the growth process in the past made the children to be kept away from working with different weights. Recent studies have shown that the risk of accidents is relatively small and the strength training can help prevent them. For example, most accidents occur at the level of athletics ligaments and tendons. From this point of view, it can be said that a progressive intervention of force training, optimal design, will help enhancing their process, such as athlete much better prepared to meet training requests and competitions. Preparation of force provides a solid basis for further phases in the highest performance.
Abstract: Carbon fibers are fabricated from different materials,
such as special polyacrylonitrile (PAN) fibers, rayon fibers and pitch.
Among these three groups of materials, PAN fibers are the most
widely used precursor for the manufacture of carbon fibers. The
process of fabrication carbon fibers from special PAN fibers includes
two steps; oxidative stabilization at low temperature and
carbonization at high temperatures in an inert atmosphere. Due to the
high price of raw materials (special PAN fibers), carbon fibers are
still expensive.
In the present work the main goal is making carbon fibers from
low price commercial PAN fibers with modified chemical
compositions. The results show that in case of conducting completes
stabilization process, it is possible to produce carbon fibers with
desirable tensile strength from this type of PAN fibers. To this
matter, thermal characteristics of commercial PAN fibers were
investigated and based upon the obtained results, with some changes
in conventional procedure of stabilization in terms of temperature
and time variables; the desirable conditions of complete stabilization
is achieved.
Abstract: This paper is concerned with the study of mineralogy
and engineering characteristics of soil materials derived from the
eastern part of Nile Delta. The clay minerals of the studied soil by
using X- ray diffraction are mainly illite (average 72.6 %) and
kaolinite (average 2.6 %), expandable portion in illite-smectite mixed
layer (average 7 %). Smectite is more abundant in fluviatile clays,
whereas kaolinite is more abundant in lagoonal clays. On the other
hand, illite and illite-smectite are more abundant in marine clays. The
geotechnical results show that the soil under study consists mainly of
about 0.3 % gravel, 5 % sand, 51.5 % silt and 42.2 % clay in average.
The average shrinkage limit attains 11 % whereas the average value
of the plasticity index is 23.4 %. The free swelling ranges from 40 %
to 75 % and has a value of 55 % giving an indication about the
inadequacy of such soil under foundations.
From a construction point of view, the soil under investigation
poses many problems even under light foundations due to the
swelling and shrinkage. Such swelling and shrinkage is due to the
high content of soil materials in the expandable clay minerals of illite
and smectite. Based on the results of the present and earlier studies,
trial application of soil stabilisation is recommended.
Abstract: The mountain road slope failures triggered by
earthquake activities and torrential rain namely to create the disaster.
Province Road No. 24 is a main route to the Wutai Township. The area
of the study is located at the mileages between 46K and 47K along the
road. However, the road has been suffered frequent damages as a result
of landslide and slope failures during typhoon seasons. An
understanding of the sliding behaviors in the area appears to be
necessary. Slope failures triggered by earthquake activities and heavy
rainfalls occur frequently. The study is to understand the mechanism
of slope failures and to look for the way to deal with the situation. In
order to achieve these objectives, this paper is based on theoretical and
structural geology data interpretation program to assess the potential
slope sliding behavior. The study showed an intimate relationship
between the landslide behavior of the slopes and the stratum materials,
based on structural geology analysis method to analysis slope stability
and finds the slope safety coefficient to predict the sites of destroyed
layer. According to the case study and parameter analyses results, the
slope mainly slips direction compared to the site located in the
southeast area. Find rainfall to result in the rise of groundwater level is
main reason of the landslide mechanism. Future need to set up
effective horizontal drain at corrective location, that can effective
restrain mountain road slope failures and increase stability of slope.
Abstract: This paper shows that the economy of any country
can be presented as three different shells such as: economic shell of a
big, a medium and a small business. The new concepts were
introduced such as: volume of an economic shell, coefficient of
shell-s expansion (compression) etc. These shells can expansion or
compress under action by internal or external powers and when shell
expansions - it means the rising of a business activity and
compression shows us that economy goes on recession. This process
of an expansion or a compression can develop in the various ways
like linear, logarithm or any other mathematical laws.
Abstract: In this paper, mathematical modeling of detonation in the ground is studied. Estimation of flow parameters such as velocity, maximum velocity, acceleration, maximum acceleration, shock pressure as a result of an explosion in the ground have been computed in an appropriate dynamic model approach. The variation of these parameters with the diameter of detonation place (L), density of earth or stone (¤ü), time decay of detonation (T), peak pressure (Pm), and time (t) have been analyzed. The model has been developed from the concept of underwater explosions [Refs. [1]-[3]] with appropriate changes to the present model requirements.
Abstract: The requirements analysis, modeling, and simulation have consistently been one of the main challenges during the development of complex systems. The scenarios and the state machines are two successful models to describe the behavior of an interactive system. The scenarios represent examples of system execution in the form of sequences of messages exchanged between objects and are a partial view of the system. In contrast, state machines can represent the overall system behavior. The automation of processing scenarios in the state machines provide some answers to various problems such as system behavior validation and scenarios consistency checking. In this paper, we propose a method for translating scenarios in state machines represented by Discreet EVent Specification and procedure to detect implied scenarios. Each induced DEVS model represents the behavior of an object of the system. The global system behavior is described by coupling the atomic DEVS models and validated through simulation. We improve the validation process with integrating formal methods to eliminate logical inconsistencies in the global model. For that end, we use the Z notation.
Abstract: The tree structured approach of non-uniform filterbank
(NUFB) is normally used in perfect reconstruction (PR). The PR is
not always feasible due to certain limitations, i.e, constraints in
selecting design parameters, design complexity and some times
output is severely affected by aliasing error if necessary and
sufficient conditions of PR is not satisfied perfectly. Therefore, there
has been generalized interest of researchers to go for near perfect
reconstruction (NPR). In this proposed work, an optimized tree
structure technique is used for the design of NPR non-uniform
filterbank. Window functions of Blackman family are used to design
the prototype FIR filter. A single variable linear optimization is used
to minimize the amplitude distortion. The main feature of the
proposed design is its simplicity with linear phase property.
Abstract: Ringing effect is one of the most annoying visual
artifacts in digital video. It is a significant factor of subjective quality
deterioration. However, there is a widely-accepted misunderstanding
of its cause. In this paper, we propose a reasonable interpretation of the
cause of ringing effect. Based on the interpretation, we suggest further
two methods to reduce ringing effect in DCT-based video coding. The
methods adaptively adjust quantizers according to video features. Our
experiments proved that the methods could efficiently improve
subjective quality with acceptable additional computing costs.
Abstract: Authentication of multimedia contents has gained much attention in recent times. In this paper, we propose a secure semi-fragile watermarking, with a choice of two watermarks to be embedded. This technique operates in integer wavelet domain and makes use of semi fragile watermarks for achieving better robustness. A self-recovering algorithm is employed, that hides the image digest into some Wavelet subbands to detect possible malevolent object manipulation undergone by the image (object replacing and/or deletion). The Semi-fragility makes the scheme tolerant for JPEG lossy compression as low as quality of 70%, and locate the tempered area accurately. In addition, the system ensures more security because the embedded watermarks are protected with private keys. The computational complexity is reduced using parameterized integer wavelet transform. Experimental results show that the proposed scheme guarantees the safety of watermark, image recovery and location of the tempered area accurately.
Abstract: Reentry trajectory optimization is a multi-constraints
optimal control problem which is hard to solve. To tackle it, we
proposed a new algorithm named CDEN(Constrained Differential
Evolution Newton-Raphson Algorithm) based on Differential Evolution(
DE) and Newton-Raphson.We transform the infinite dimensional
optimal control problem to parameter optimization which is finite
dimensional by discretize control parameter. In order to simplify
the problem, we figure out the control parameter-s scope by process
constraints. To handle constraints, we proposed a parameterless constraints
handle process. Through comprehensive analyze the problem,
we use a new algorithm integrated by DE and Newton-Raphson to
solve it. It is validated by a reentry vehicle X-33, simulation results
indicated that the algorithm is effective and robust.
Abstract: The Expert Witness Testimony in the Battered
Woman Syndrome Expert witness testimony (EWT) is a kind of
information given by an expert specialized in the field (here in BWS)
to the jury in order to help the court better understand the case. EWT
does not always work in favor of the battered women. Two main
decision-making models are discussed in the paper: the Mathematical
model and the Explanation model. In the first model, the jurors
calculate ″the importance and strength of each piece of evidence″
whereas in the second model they try to integrate the EWT with the
evidence and create a coherent story that would describe the crime.
The jury often misunderstands and misjudges battered women for
their action (or in this case inaction). They assume that these women
are masochists and accept being mistreated for if a man abuses a
woman constantly, she should and could divorce him or simply leave
at any time. The research in the domain found that indeed, expert
witness testimony has a powerful influence on juror’s decisions thus
its quality needs to be further explored. One of the important factors
that need further studies is a bias called the dispositionist worldview
(a belief that what happens to people is of their own doing). This
kind of attributional bias represents a tendency to think that a
person’s behavior is due to his or her disposition, even when the
behavior is clearly attributed to the situation. Hypothesis The
hypothesis of this paper is that if a juror has a dispositionist
worldview then he or she will blame the rape victim for triggering the
assault. The juror would therefore commit the fundamental
attribution error and believe that the victim’s disposition caused the
rape and not the situation she was in. Methods The subjects in the
study were 500 randomly sampled undergraduate students from
McGill, Concordia, Université de Montréal and UQAM.
Dispositional Worldview was scored on the Dispositionist
Worldview Questionnaire. After reading the Rape Scenarios, each
student was asked to play the role of a juror and answer a
questionnaire consisting of 7 questions about the responsibility,
causality and fault of the victim. Results The results confirm the
hypothesis which states that if a juror has a dispositionist worldview
then he or she will blame the rape victim for triggering the assault.
By doing so, the juror commits the fundamental attribution error
because he will believe that the victim’s disposition, and not the
constraints or opportunities of the situation, caused the rape scenario.
Abstract: The evolution in project management was triggered by
the changes in management philosophy and practices in order to
maintain competitive advantage and continuous success in the field.
The purpose of this paper is to highlight the practicality of cognitive
style and unlearning approach in influencing the achievement of
project success by project managers. It introduces the concept of
planning, knowing and creating style from cognitive style field in the
light of achieving time, cost, quality and stakeholders appreciation in
project success context. Further it takes up a discussion of the
unlearning approach as a moderator in enhancing the relationship
between cognitive style and project success. The paper bases itself on
literature review from established disciplines like psychology,
sociology and philosophy regarding cognitive style, unlearning and
project success in general. The analysis and synthesis of literature in
the subject area a conceptual paper is utilized as the basis of future
research to form a comprehensive framework for project managers in
enhancing the project management competency.
Abstract: Estimation of stormwater pollutants is a pre-requisite
for the protection and improvement of the aquatic environment and
for appropriate management options. The usual practice for the
stormwater quality prediction is performed through water quality
modeling. However, the accuracy of the prediction by the models
depends on the proper estimation of model parameters. This paper
presents the estimation of model parameters for a catchment water
quality model developed for the continuous simulation of stormwater
pollutants from a catchment to the catchment outlet. The model is
capable of simulating the accumulation and transportation of the
stormwater pollutants; suspended solids (SS), total nitrogen (TN) and
total phosphorus (TP) from a particular catchment. Rainfall and water
quality data were collected for the Hotham Creek Catchment (HTCC),
Gold Coast, Australia. Runoff calculations from the developed model
were compared with the calculated discharges from the widely used
hydrological models, WBNM and DRAINS. Based on the measured
water quality data, model water quality parameters were calibrated
for the above-mentioned catchment. The calibrated parameters are
expected to be helpful for the best management practices (BMPs)
of the region. Sensitivity analyses of the estimated parameters were
performed to assess the impacts of the model parameters on overall
model estimations of runoff water quality.
Abstract: This paper presents an application of power line
carrier (PLC) for electrical power telemetering. This system has a
special capability of transmitting the measured values to a centralized
computer via power lines. The PLC modem as a passive high-pass
filter is designed for transmitting and receiving information. Its
function is to send the information carrier together with transmitted
data by superimposing it on the 50 Hz power frequency signal. A
microcontroller is employed to function as the main processing of the
modem. It is programmed for PLC control and interfacing with other
devices. Each power meter, connected via a PLC modem, is assigned
with a unique identification number (address) for distinguishing each
device from one another.
Abstract: Social learning network analysis has drawn attention
for most researcher on e-learning research domain. This is due to the
fact that it has the capability to identify the behavior of student
during their social interaction inside e-learning. Normally, the social
network analysis (SNA) is treating the students' interaction merely as
node and edge with less meaning. This paper focuses on providing an
ontology structure of e-learning Moodle that can enrich the
relationships among students, as well as between the students and the
teacher. This ontology structure brings great benefit to the future
development of e-learning system.
Abstract: This paper proposes a novel architecture for At-
Home medical care which enables senior citizens, patients
with chronic ailments and patients requiring post- operative
care to be remotely monitored in the comfort of their homes.
This architecture is implemented using sensors and wireless
networking for transmitting patient data to the hospitals,
health- care centers for monitoring by medical professionals.
Patients are equipped with sensors to measure their
physiological parameters, like blood pressure, pulse rate etc.
and a Wearable Data Acquisition Unit is used to transmit the
patient sensor data. Medical professionals can be alerted to
any abnormal variations in these values for diagnosis and
suitable treatment. Security threats and challenges inherent to
wireless communication and sensor network have been
discussed and a security mechanism to ensure data
confidentiality and source authentication has been proposed.
Symmetric key algorithm AES has been used for encrypting
the data and a patent-free, two-pass block cipher mode CCFB
has been used for implementing semantic security.