Abstract: The paper deals with a mathematical model for fluid dynamic flows on road networks which is based on conservation laws. This nonlinear framework is based on the conservation of cars. We focus on traffic circle, which is a finite number of roads that meet at some junctions. The traffic circle with junctions having either one incoming and two outgoing or two incoming and one outgoing roads. We describe the numerical schemes with the particular boundary conditions used to produce approximated solutions of the problem.
Abstract: Paper is dealing with vulnerability concerning elements of hydrological structures and elements of technological equipments which are acceptable for groundwater resources. The vulnerability assessment stems from the application of the register of hazards and a potential threat to individual water source elements within each type of hazard. The proposed procedure is pattern for assessing the risks of disturbance, damage, or destruction of water source by the identified natural or technological hazards and consequently for classification of these risks in relation to emergency water supply. Using of this procedure was verified on selected groundwater resource in particular region, which seems to be as potentially useful for crisis planning system.
Abstract: In this study, an analysis has been performed for
free convection with radiation effect over a thermal forming
nonlinearly stretching sheet. Parameters n, k0, Pr, G represent
the dominance of the nonlinearly effect, radiation effect, heat
transfer and free convection effects which have been presented
in governing equations, respectively. The similarity
transformation and the finite-difference methods have been
used to analyze the present problem. From the results, we find
that the effects of parameters n, k0, Pr, Ec and G to the
nonlinearly stretching sheet. The increase of Prandtl number Pr,
free convection parameter G or radiation parameter k0 resulting
in the increase of heat transfer effects, but increase of the
viscous dissipation number Ec will decrease of heat transfer
effect.
Abstract: Ability of accurate and reliable location estimation in
indoor environment is the key issue in developing great number of
context aware applications and Location Based Services (LBS).
Today, the most viable solution for localization is the Received
Signal Strength (RSS) fingerprinting based approach using wireless
local area network (WLAN). This paper presents two RSS
fingerprinting based approaches – first we employ widely used
WLAN based positioning as a reference system and then investigate
the possibility of using GSM signals for positioning. To compare
them, we developed a positioning system in real world environment,
where realistic RSS measurements were collected. Multi-Layer
Perceptron (MLP) neural network was used as the approximation
function that maps RSS fingerprints and locations. Experimental
results indicate advantage of WLAN based approach in the sense of
lower localization error compared to GSM based approach, but GSM
signal coverage by far outreaches WLAN coverage and for some
LBS services requiring less precise accuracy our results indicate that
GSM positioning can also be a viable solution.
Abstract: Selecting the routes and the assignment of link flow in a computer communication networks are extremely complex combinatorial optimization problems. Metaheuristics, such as genetic or simulated annealing algorithms, are widely applicable heuristic optimization strategies that have shown encouraging results for a large number of difficult combinatorial optimization problems. This paper considers the route selection and hence the flow assignment problem. A genetic algorithm and simulated annealing algorithm are used to solve this problem. A new hybrid algorithm combining the genetic with the simulated annealing algorithm is introduced. A modification of the genetic algorithm is also introduced. Computational experiments with sample networks are reported. The results show that the proposed modified genetic algorithm is efficient in finding good solutions of the flow assignment problem compared with other techniques.
Abstract: We study different types of aggregation operators and
the decision making process with minimization of regret. We analyze
the original work developed by Savage and the recent work
developed by Yager that generalizes the MMR method creating a
parameterized family of minimal regret methods by using the ordered
weighted averaging (OWA) operator. We suggest a new method that
uses different types of geometric operators such as the weighted
geometric mean or the ordered weighted geometric operator (OWG)
to generalize the MMR method obtaining a new parameterized family
of minimal regret methods. The main result obtained in this method
is that it allows to aggregate negative numbers in the OWG operator.
Finally, we give an illustrative example.
Abstract: Aspheric optical components are an alternative to the use of conventional lenses in the implementation of imaging systems for the visible range. Spherical lenses are capable of producing aberrations. Therefore, they are not able to focus all the light into a single point. Instead, aspherical lenses correct aberrations and provide better resolution even with compact lenses incorporating a small number of lenses.
Metrology of these components is very difficult especially when the resolution requirements increase and insufficient or complexity of conventional tools requires the development of specific approaches to characterization.
This work is part of the problem existed because the objectives are the study and comparison of different methods used to measure surface rays hybrid aspherical lenses.
Abstract: In this paper the development of a software to
encrypt messages with asymmetric cryptography is presented. In
particular, is used the RSA (Rivest, Shamir and Adleman) algorithm
to encrypt alphanumeric information. The software allows to
generate different public keys from two prime numbers provided by
the user, the user must then select a public-key to generate the
corresponding private-key. To encrypt the information, the user must
provide the public-key of the recipient as well as the message to be
encrypted. The generated ciphertext can be sent through an insecure
channel, so that would be very difficult to be interpreted by an
intruder or attacker. At the end of the communication, the recipient
can decrypt the original message if provide his/her public-key and
his/her corresponding private-key.
Abstract: The balancing numbers are natural numbers n satisfying
the Diophantine equation 1 + 2 + 3 + · · · + (n - 1) = (n + 1) +
(n + 2) + · · · + (n + r); r is the balancer corresponding to the
balancing number n.The nth balancing number is denoted by Bn
and the sequence {Bn}1
n=1 satisfies the recurrence relation Bn+1 =
6Bn-Bn-1. The balancing numbers posses some curious properties,
some like Fibonacci numbers and some others are more interesting.
This paper is a study of recurrent sequence {xn}1
n=1 satisfying the
recurrence relation xn+1 = Axn - Bxn-1 and possessing some
curious properties like the balancing numbers.
Abstract: Optimal design of structure has a main role in reduction of material usage which leads to deduction in the final cost of construction projects. Evolutionary approaches are found to be more successful techniques for solving size and shape structural optimization problem since it uses a stochastic random search instead of a gradient search. By reviewing the recent literature works the problem found was the optimization of weight. A new meta-heuristic algorithm called as Cuckoo Search (CS) Algorithm has used for the optimization of the total weight of the truss structures. This paper has used set of 10 bars and 25 bars trusses for the testing purpose. The main objective of this work is to reduce the number of iterations, weight and the total time consumption. In order to demonstrate the effectiveness of the present method, minimum weight design of truss structures is performed and the results of the CS are compared with other algorithms.
Abstract: In this paper we are interested in Moufang-Klingenberg
planesM(A) defined over a local alternative ring A of dual numbers.
We show that some collineations of M(A) preserve cross-ratio.
Abstract: A multiphase harmonic load flow algorithm is developed based on backward/forward sweep to examine the effects of various factors on the neutral to earth voltage (NEV), including unsymmetrical system configuration, load unbalance and harmonic injection. The proposed algorithm composes fundamental frequency and harmonic frequencies power flows. The algorithm and the associated models are tested on IEEE 13 bus system. The magnitude of NEV is investigated under various conditions of the number of grounding rods per feeder lengths, the grounding rods resistance and the grounding resistance of the in feeding source. Additionally, the harmonic injection of nonlinear loads has been considered and its influences on NEV under different conditions are shown.
Abstract: we propose a new normalized LMS (NLMS) algorithm, which gives satisfactory performance in certain applications in comaprison with con-ventional NLMS recursion. This new algorithm can be treated as a block based simplification of NLMS algorithm with significantly reduced number of multi¬ply and accumulate as well as division operations. It is also shown that such a recursion can be easily implemented in block floating point (BFP) arithmetic, treating the implementational issues much efficiently. In particular, the core challenges of a BFP realization to such adaptive filters are mainly considered in this regard. A global upper bound on the step size control parameter of the new algorithm due to BFP implementation is also proposed to prevent overflow in filtering as well as weight updating operations jointly.
Abstract: The paper shows some ability to manage two-phase
flows arising from the use of unsteady effects. In one case, we
consider the condition of fragmentation of the interface between the
two components leads to the intensification of mixing. The problem
is solved when the temporal and linear scale are small for the
appearance of the developed mixing layer. Showing that exist such
conditions for unsteady flow velocity at the surface of the channel,
which will lead to the creation and fragmentation of vortices at Re
numbers of order unity. Also showing that the Re is not a criterion of
similarity for this type of flows, but we can introduce a criterion that
depends on both the Re, and the frequency splitting of the vortices. It
turned out that feature of this situation is that streamlines behave
stable, and if we analyze the behavior of the interface between the
components it satisfies all the properties of unstable flows. The other
problem we consider the behavior of solid impurities in the extensive
system of channels. Simulated unsteady periodic flow modeled
breaths. Consider the behavior of the particles along the trajectories.
It is shown that, depending on the mass and diameter of the particles,
they can be collected in a caustic on the channel walls, stop in a
certain place or fly back. Of interest is the distribution of particle
velocity in frequency. It turned out that by choosing a behavior of the
velocity field of the carrier gas can affect the trajectory of individual
particles including force them to fly back.
Abstract: When binary decision diagrams are formed from
uniformly distributed Monte Carlo data for a large number of
variables, the complexity of the decision diagrams exhibits a
predictable relationship to the number of variables and minterms. In
the present work, a neural network model has been used to analyze the
pattern of shortest path length for larger number of Monte Carlo data
points. The neural model shows a strong descriptive power for the
ISCAS benchmark data with an RMS error of 0.102 for the shortest
path length complexity. Therefore, the model can be considered as a
method of predicting path length complexities; this is expected to lead
to minimum time complexity of very large-scale integrated circuitries
and related computer-aided design tools that use binary decision
diagrams.
Abstract: Ozone (O3) is considered as one of the most
phytotoxic pollutants with deleterious effects on living and non living
components of Ecosystems. It reduces growth and yield of many
crops as well as alters the physiology and crop quality. The present
study described series of experiments to investigate the effects of
ambient O3 at different locations with different ambient levels of O3
depending on proximity to pollutant source and ranged between 17
ppb/h in control experiment to 112 ppb/h in industrial area
respectively. The ambient levels in other three locations (King Saud
University botanical garden, King Fahd Rd, and Almanakh Garden)
were 61,61,77 ppb/h respectively. Tow legume crops species (vicia
vaba L ; and Pisum sativum) differ in their phenology and sensitivity
were used. The results showed a significant negative effect to ozone
on morphology, number of injured leaves, growth and productivity
with a difference in the degree of response depending on the plant
type. Visia Faba showed sensitivity to ozone to number and leaf area
and the degree of injury leaves 3, pisum sativum show higher
sensitivity for the gas for degree of injury 1,The relative growth rate
and seed weight, it turns out there is no significant difference
between the two plants in plant height and number of seeds.
Abstract: One of the most important areas of knowledge management studies is knowledge sharing. Measured in terms of number of scientific articles and organization-s applications, knowledge sharing stands as an example of success in the field. This paper reviews the related papers in the context of the underlying individual behavioral variables to providea direction framework for future research and writing.
Abstract: Various models have been derived by studying large number of completed software projects from various organizations and applications to explore how project sizes mapped into project effort. But, still there is a need to prediction accuracy of the models. As Neuro-fuzzy based system is able to approximate the non-linear function with more precision. So, Neuro-Fuzzy system is used as a soft computing approach to generate model by formulating the relationship based on its training. In this paper, Neuro-Fuzzy technique is used for software estimation modeling of on NASA software project data and performance of the developed models are compared with the Halstead, Walston-Felix, Bailey-Basili and Doty Models mentioned in the literature.
Abstract: As embedded and portable systems were emerged power consumption of circuits had been major challenge. On the other hand latency as determines frequency of circuits is also vital task. Therefore, trade off between both of them will be desirable. Modulo 2n+1 adders are important part of the residue number system (RNS) based arithmetic units with the interesting moduli set (2n-1,2n, 2n+1). In this manuscript we have introduced novel binary representation to the design of modulo 2n+1 adder. VLSI realization of proposed architecture under 180 nm full static CMOS technology reveals its superiority in terms of area, power consumption and power-delay product (PDP) against several peer existing structures.
Abstract: The number of intrusions and attacks against critical
infrastructures and other information networks is increasing rapidly.
While there is no identified evidence that terrorist organizations are
currently planning a coordinated attack against the vulnerabilities of
computer systems and network connected to critical infrastructure,
and origins of the indiscriminate cyber attacks that infect computers
on network remain largely unknown. The growing trend toward the
use of more automated and menacing attack tools has also
overwhelmed some of the current methodologies used for tracking
cyber attacks. There is an ample possibility that this kind of cyber
attacks can be transform to cyberterrorism caused by illegal purposes.
Cyberterrorism is a matter of vital importance to national welfare.
Therefore, each countries and organizations have to take a proper
measure to meet the situation and consider effective legislation about
cyberterrorism.