Abstract: In this paper zero-dissipative explicit Runge-Kutta
method is derived for solving second-order ordinary differential
equations with periodical solutions. The phase-lag and dissipation
properties for Runge-Kutta (RK) method are also discussed. The new
method has algebraic order three with dissipation of order infinity.
The numerical results for the new method are compared with existing
method when solving the second-order differential equations with
periodic solutions using constant step size.
Abstract: Knowledge sharing in general and the contextual
access to knowledge in particular, still represent a key challenge in
the knowledge management framework. Researchers on semantic
web and human machine interface study techniques to enhance this
access. For instance, in semantic web, the information retrieval is
based on domain ontology. In human machine interface, keeping
track of user's activity provides some elements of the context that can
guide the access to information. We suggest an approach based on
these two key guidelines, whilst avoiding some of their weaknesses.
The approach permits a representation of both the context and the
design rationale of a project for an efficient access to knowledge. In
fact, the method consists of an information retrieval environment
that, in the one hand, can infer knowledge, modeled as a semantic
network, and on the other hand, is based on the context and the
objectives of a specific activity (the design). The environment we
defined can also be used to gather similar project elements in order to
build classifications of tasks, problems, arguments, etc. produced in a
company. These classifications can show the evolution of design
strategies in the company.
Abstract: A key to success of high quality software development
is to define valid and feasible requirements specification. We have
proposed a method of model-driven requirements analysis using
Unified Modeling Language (UML). The main feature of our method
is to automatically generate a Web user interface mock-up from UML
requirements analysis model so that we can confirm validity of
input/output data for each page and page transition on the system by
directly operating the mock-up. This paper proposes a support method
to check the validity of a data life cycle by using a model checking tool
“UPPAAL" focusing on CRUD (Create, Read, Update and Delete).
Exhaustive checking improves the quality of requirements analysis
model which are validated by the customers through automatically
generated mock-up. The effectiveness of our method is discussed by a
case study of requirements modeling of two small projects which are a
library management system and a supportive sales system for text
books in a university.
Abstract: This research work is aimed at speech recognition
using scaly neural networks. A small vocabulary of 11 words were
established first, these words are “word, file, open, print, exit, edit,
cut, copy, paste, doc1, doc2". These chosen words involved with
executing some computer functions such as opening a file, print
certain text document, cutting, copying, pasting, editing and exit.
It introduced to the computer then subjected to feature extraction
process using LPC (linear prediction coefficients). These features are
used as input to an artificial neural network in speaker dependent
mode. Half of the words are used for training the artificial neural
network and the other half are used for testing the system; those are
used for information retrieval.
The system components are consist of three parts, speech
processing and feature extraction, training and testing by using neural
networks and information retrieval.
The retrieve process proved to be 79.5-88% successful, which is
quite acceptable, considering the variation to surrounding, state of
the person, and the microphone type.
Abstract: Voltage flicker problems have long existed in several
of the distribution areas served by the Taiwan Power Company. In
the past, those research results indicating that the estimated ΔV10
value based on the conventional method is significantly smaller than
the survey value. This paper is used to study the relationship between
the voltage flicker problems and harmonic power variation for the
power system with electric arc furnaces. This investigation discussed
thought the effect of harmonic power fluctuation with flicker
estimate value. The method of field measurement, statistics and
simulation is used. The survey results demonstrate that 10 ΔV
estimate must account for the effect of harmonic power variation.
Abstract: This paper proposes a smart design strategy for a sequential detector to reliably detect the primary user-s signal, especially in fast fading environments. We study the computation of the log-likelihood ratio for coping with a fast changing received signal and noise sample variances, which are considered random variables. First, we analyze the detectability of the conventional generalized log-likelihood ratio (GLLR) scheme when considering fast changing statistics of unknown parameters caused by fast fading effects. Secondly, we propose an efficient sensing algorithm for performing the sequential probability ratio test in a robust and efficient manner when the channel statistics are unknown. Finally, the proposed scheme is compared to the conventional method with simulation results with respect to the average number of samples required to reach a detection decision.
Abstract: An advanced Monte Carlo simulation method, called Subset Simulation (SS) for the time-dependent reliability prediction for underground pipelines has been presented in this paper. The SS can provide better resolution for low failure probability level with efficient investigating of rare failure events which are commonly encountered in pipeline engineering applications. In SS method, random samples leading to progressive failure are generated efficiently and used for computing probabilistic performance by statistical variables. SS gains its efficiency as small probability event as a product of a sequence of intermediate events with larger conditional probabilities. The efficiency of SS has been demonstrated by numerical studies and attention in this work is devoted to scrutinise the robustness of the SS application in pipe reliability assessment. It is hoped that the development work can promote the use of SS tools for uncertainty propagation in the decision-making process of underground pipelines network reliability prediction.
Abstract: Color Image quantization (CQ) is an important
problem in computer graphics, image and processing. The aim of
quantization is to reduce colors in an image with minimum distortion.
Clustering is a widely used technique for color quantization; all
colors in an image are grouped to small clusters. In this paper, we
proposed a new hybrid approach for color quantization using firefly
algorithm (FA) and K-means algorithm. Firefly algorithm is a swarmbased
algorithm that can be used for solving optimization problems.
The proposed method can overcome the drawbacks of both
algorithms such as the local optima converge problem in K-means
and the early converge of firefly algorithm. Experiments on three
commonly used images and the comparison results shows that the
proposed algorithm surpasses both the base-line technique k-means
clustering and original firefly algorithm.
Abstract: In this article the accumulated results out of the effects
and length of the manufacture and production projects in the
university and research standard have been settled with the usefulness
definition of the process of project management for the accessibility
to the proportional pattern in the “time and action" stages. Studies
show that many problems confronted by the researchers in these
projects are connected to the non-profiting of: 1) autonomous timing
for gathering the educational theme, 2) autonomous timing for
planning and pattern, presenting before the construction, and 3)
autonomous timing for manufacture and sample presentation from the
output. The result of this study indicates the division of every
manufacture and production projects into three smaller autonomous
projects from its kind, budget and autonomous expenditure, shape
and order of the stages for the management of these kinds of projects.
In this case study real result are compared with theoretical results.
Abstract: A large number of chemical, bio-chemical and pollution-control processes use heterogeneous fixed-bed reactors. The use of finite hollow cylindrical catalyst pellets can enhance conversion levels in such reactors. The absence of the pellet core can significantly lower the diffusional resistance associated with the solid phase. This leads to a better utilization of the catalytic material, which is reflected in the higher values for the effectiveness factor, leading ultimately to an enhanced conversion level in the reactor. It is however important to develop a rigorous heterogeneous model for the reactor incorporating the two-dimensional feature of the solid phase owing to the presence of the finite hollow cylindrical catalyst pellet. Presently, heterogeneous models reported in the literature invariably employ one-dimension solid phase models meant for spherical catalyst pellets. The objective of the paper is to present a rigorous model of the fixed-bed reactors containing finite hollow cylindrical catalyst pellets. The reaction kinetics considered here is the widely used Michaelis–Menten kinetics for the liquid-phase bio-chemical reactions. The reaction parameters used here are for the enzymatic degradation of urea. Results indicate that increasing the height to diameter ratio helps to improve the conversion level. On the other hand, decreasing the thickness is apparently not as effective. This could however be explained in terms of the higher void fraction of the bed that causes a smaller amount of the solid phase to be packed in the fixed-bed bio-chemical reactor.
Abstract: Traditionally, terror groups have been formed by ideologically aligned actors who perceive a lack of options for achieving political or social change. However, terrorist attacks have been increasingly carried out by small groups of actors or lone individuals who may be only ideologically affiliated with larger, formal terrorist organizations. The formation of these groups represents the inverse of traditional organizational growth, whereby structural de-evolution within issue-based organizations leads to the formation of small, independent terror cells. Ideological franchising – the bypassing of formal affiliation to the “parent" organization – represents the de-evolution of traditional concepts of organizational structure in favor of an organic, independent, and focused unit. Traditional definitions of dark networks that are issue-based include focus on an identified goal, commitment to achieving this goal through unrestrained actions, and selection of symbolic targets. The next step in the de-evolution of small dark networks is the miniorganization, consisting of only a handful of actors working toward a common, violent goal. Information-sharing through social media platforms, coupled with civil liberties of democratic nations, provide the communication systems, access to information, and freedom of movement necessary for small dark networks to flourish without the aid of a parent organization. As attacks such as the 7/7 bombings demonstrate the effectiveness of small dark networks, terrorist actors will feel increasingly comfortable aligning with an ideology only, without formally organizing. The natural result of this de-evolving organization is the single actor event, where an individual seems to subscribe to a larger organization-s violent ideology with little or no formal ties.
Abstract: This study was conducted Ismailoglu grape type (Vitis
vinifera L.) and its vine which was aged 15 was grown on its own
root in a vegetation period of 2013 in Nevşehir province in Turkey.
In this research, it was investigated whether the applications of
Control (C), 1/3 cluster tip reduction (1/3 CTR), shoot tip reduction
(STR), 1/3 CTR + STR, TKI-HUMAS (TKI-HM) (Soil) (S), TKIHM
(Foliar) (F), TKI-HM (S + F), 1/3 CTR + TKI-HM (S), 1/3 CTR
+ TKI-HM (F), 1/3 CTR + TKI-HM (S+F), STR + TKI-HM (S), STR
+ TKI-HM (F), STR + TKI-HM (S + F), 1/3 CTR + STR+TKI-HM
(S), 1/3 CTR + STR + TKI-HM (F), 1/3 CTR + STR + TKI-HM (S +
F) on yield and yield components of Ismailoglu grape type. The
results were obtained as the highest fresh grape yield (16.15 kg/vine)
with TKI-HM (S), as the highest cluster weight (652.39 g) with 1/3
CTR + STR, as the highest 100 berry weight (419.07 g) with 1/3
CTR + STR + TKI-HM (F), as the highest maturity index (44.06)
with 1/3 CTR, as the highest must yield (810.00 ml) with STR +
TKI-HM (F), as the highest intensity of L* color (42.04) with TKIHM
(S + F), as the highest intensity of a* color (2.60) with 1/3 CTR
+ TKI-HM (S), as the highest intensity of b* color (7.16) with 1/3
CTR + TKI-HM (S) applications. To increase the fresh grape yield of
Ismailoglu grape type can be recommended TKI-HM (S) application.
Abstract: The incidence of mechanical fracture of an
automobile piston rings prompted development of fracture analysis
method on this case. The three rings (two compression rings and one
oil ring) were smashed into several parts during the power-test (after
manufacturing the engine) causing piston and liner to be damaged.
The radial and oblique cracking happened on the failed piston rings.
The aim of the fracture mechanics simulations presented in this paper
was the calculation of particular effective fracture mechanics
parameters, such as J-integrals and stress intensity factors. Crack
propagation angles were calculated as well. Two-dimensional
fracture analysis of the first compression ring has been developed in
this paper using ABAQUS CAE6.5-1 software. Moreover, SEM
fractography was developed on fracture surfaces and is discussed in
this paper. Results of numerical calculations constitute the basis for
further research on real object.
Abstract: It is quite essential to form dialogue mechanisms and
dialogue channels to solve intercultural communication issues.
Therefore, every country should develop a intercultural education
project which aims to resolve international communication issues.
For proper mediation training, the first step is to reach an agreement
on the actors to run the project. The strongest mediation mechanisms
in the world should be analyzed and initiated within the educational
policies. A communication-based mediation model should be
developed for international mediation training. Mediators can use
their convincing communication skills as a part of this model. At the
first, fundamental stages of the mediation training should be specified
within the scope of the model. Another important topic at this point is
common sence and peace leaders to act as an ombudsman in this
process. Especially for solving some social issues and conflicts,
common sense leaders acting as an ombudsman would lead to
effective communication. In mediation training that is run by
universities and non-governmental organizations, another phase is to
focus on conducting the meetings. In intercultural mediation training,
one of the most critical topics is to conduct the meeting traffic and
performing a shuttle diplomacy. Meeting traffic is where the mediator
organizes meetings with the parties with initiative powers, in order to
contribute to the solution of the issue, and schedule these meetings.
In this notice titled “ Intercultural mediation training and the training
process of common sense leaders by the leadership of universities
communication and artistic campaigns" , communication models and
strategies about this topic will be constructed and an intercultural art
activities and perspectives will be presented.
Abstract: The practical implementation of audio-video coupled speech recognition systems is mainly limited by the hardware complexity to integrate two radically different information capturing devices with good temporal synchronisation. In this paper, we propose a solution based on a smart CMOS image sensor in order to simplify the hardware integration difficulties. By using on-chip image processing, this smart sensor can calculate in real time the X/Y projections of the captured image. This on-chip projection reduces considerably the volume of the output data. This data-volume reduction permits a transmission of the condensed visual information via the same audio channel by using a stereophonic input available on most of the standard computation devices such as PC, PDA and mobile phones. A prototype called VMIKE (Visio-Microphone) has been designed and realised by using standard 0.35um CMOS technology. A preliminary experiment gives encouraged results. Its efficiency will be further investigated in a large variety of applications such as biometrics, speech recognition in noisy environments, and vocal control for military or disabled persons, etc.
Abstract: In this work, we consider the rational points on elliptic
curves over finite fields Fp. We give results concerning the number
of points Np,a on the elliptic curve y2 ≡ x3 +a3(mod p) according
to whether a and x are quadratic residues or non-residues. We use
two lemmas to prove the main results first of which gives the list of
primes for which -1 is a quadratic residue, and the second is a result
from [1]. We get the results in the case where p is a prime congruent
to 5 modulo 6, while when p is a prime congruent to 1 modulo 6,
there seems to be no regularity for Np,a.
Abstract: Intelligent technologies are increasingly facilitating
sustainable water management strategies in Australia. While this
innovation can present clear cost benefits to utilities through
immediate leak detection and deference of capital costs, the impact of
this technology on households is less distinct. By offering real-time
engagement and detailed end-use consumption breakdowns, there is
significant potential for demand reduction as a behavioural response
to increased information. Despite this potential, passive
implementation without well-planned residential engagement
strategies is likely to result in a lost opportunity. This paper begins
this research process by exploring the effect of smart water meters
through the lens of three behaviour change theories. The Theory of
Planned Behaviour (TPB), Belief Revision theory (BR) and Practice
Theory emphasise different variables that can potentially influence
and predict household water engagements. In acknowledging the
strengths of each theory, the nuances and complexity of household
water engagement can be recognised which can contribute to
effective planning for residential smart meter engagement strategies.
Abstract: This paper presents a model for the evaluation of
energy performance and aerodynamic forces acting on a three-bladed
small vertical axis Darrieus wind turbine depending on blade chord
curvature with respect to rotor axis.
The adopted survey methodology is based on an analytical code
coupled to a solid modeling software, capable of generating the
desired blade geometry depending on the blade design geometric
parameters, which is linked to a finite volume CFD code for the
calculation of rotor performance.
After describing and validating the model with experimental data,
the results of numerical simulations are proposed on the bases of two
different blade profile architectures, which are respectively
characterized by a straight chord and by a curved one, having a chord
radius equal to rotor external circumference. A CFD campaign of
analysis is completed for three blade-candidate airfoil sections, that is
the recently-developed DU 06-W-200 cambered blade profile, a
classical symmetrical NACA 0021 and its derived cambered airfoil,
characterized by a curved chord, having a chord radius equal to rotor
external circumference.
The effects of blade chord curvature on angle of attack, blade
tangential and normal forces are first investigated and then the
overall rotor torque and power are analyzed as a function of blade
azimuthal position, achieving a numerical quantification of the
influence of blade camber on overall rotor performance.
Abstract: Electrical distribution systems are incurring large losses as the loads are wide spread, inadequate reactive power compensation facilities and their improper control. A comprehensive static VAR compensator consisting of capacitor bank in five binary sequential steps in conjunction with a thyristor controlled reactor of smallest step size is employed in the investigative work. The work deals with the performance evaluation through analytical studies and practical implementation on an existing system. A fast acting error adaptive controller is developed suitable both for contactor and thyristor switched capacitors. The switching operations achieved are transient free, practically no need to provide inrush current limiting reactors, TCR size minimum providing small percentages of nontriplen harmonics, facilitates stepless variation of reactive power depending on load requirement so as maintain power factor near unity always. It is elegant, closed loop microcontroller system having the features of self regulation in adaptive mode for automatic adjustment. It is successfully tested on a distribution transformer of three phase 50 Hz, Dy11, 11KV/440V, 125 KVA capacity and the functional feasibility and technical soundness are established. The controller developed is new, adaptable to both LT & HT systems and practically established to be giving reliable performance.
Abstract: Elliptic curve-based certificateless signature is slowly
gaining attention due to its ability to retain the efficiency of
identity-based signature to eliminate the need of certificate
management while it does not suffer from inherent private
key escrow problem. Generally, cryptosystem based on elliptic
curve offers equivalent security strength at smaller key sizes
compared to conventional cryptosystem such as RSA which
results in faster computations and efficient use of computing
power, bandwidth, and storage. This paper proposes to implement
certificateless signature based on bilinear pairing to
structure the framework of IKE authentication. In this paper,
we perform a comparative analysis of certificateless signature
scheme with a well-known RSA scheme and also present the
experimental results in the context of signing and verification
execution times. By generalizing our observations, we discuss the
different trade-offs involved in implementing IKE authentication
by using certificateless signature.