Abstract: Generally flow behavior in centrifugal fan is observed
to be in a state of instability with flow separation zones on suction
surface as well as near the front shroud. Overall performance of the
diffusion process in a centrifugal fan could be enhanced by
judiciously introducing the boundary layer suction slots. With easy
accessibility of CFD as an analytical tool, an extensive numerical
whole field analysis of the effect of boundary layer suction slots in
discrete regions of suspected separation points is possible. This paper
attempts to explore the effect of boundary layer suction slots
corresponding to various geometrical locations on the impeller with
converging configurations for the slots. The analysis shows that the
converging suction slots located on the impeller blade about 25%
from the trailing edge, significantly improves the static pressure
recovery across the fan. Also it is found that Slots provided at a
radial distance of about 12% from the leading and trailing edges
marginally improve the static pressure recovery across the fan.
Abstract: In this paper three different approaches for person
verification and identification, i.e. by means of fingerprints, face and
voice recognition, are studied. Face recognition uses parts-based
representation methods and a manifold learning approach. The
assessment criterion is recognition accuracy. The techniques under
investigation are: a) Local Non-negative Matrix Factorization
(LNMF); b) Independent Components Analysis (ICA); c) NMF with
sparse constraints (NMFsc); d) Locality Preserving Projections
(Laplacianfaces). Fingerprint detection was approached by classical
minutiae (small graphical patterns) matching through image
segmentation by using a structural approach and a neural network as
decision block. As to voice / speaker recognition, melodic cepstral
and delta delta mel cepstral analysis were used as main methods, in
order to construct a supervised speaker-dependent voice recognition
system. The final decision (e.g. “accept-reject" for a verification
task) is taken by using a majority voting technique applied to the
three biometrics. The preliminary results, obtained for medium
databases of fingerprints, faces and voice recordings, indicate the
feasibility of our study and an overall recognition precision (about
92%) permitting the utilization of our system for a future complex
biometric card.
Abstract: In this paper, a self starting two step continuous block
hybrid formulae (CBHF) with four Off-step points is developed using
collocation and interpolation procedures. The CBHF is then used to
produce multiple numerical integrators which are of uniform order
and are assembled into a single block matrix equation. These
equations are simultaneously applied to provide the approximate
solution for the stiff ordinary differential equations. The order of
accuracy and stability of the block method is discussed and its
accuracy is established numerically.
Abstract: The overlay approach has been widely used by many service providers for Traffic Engineering (TE) in large Internet backbones. In the overlay approach, logical connections are set up between edge nodes to form a full mesh virtual network on top of the physical topology. IP routing is then run over the virtual network. Traffic engineering objectives are achieved through carefully routing logical connections over the physical links. Although the overlay approach has been implemented in many operational networks, it has a number of well-known scaling issues. This paper proposes a new approach to achieve traffic engineering without full-mesh overlaying with the help of integrated approach and equal subset split method. Traffic engineering needs to determine the optimal routing of traffic over the existing network infrastructure by efficiently allocating resource in order to optimize traffic performance on an IP network. Even though constraint-based routing [1] of Multi-Protocol Label Switching (MPLS) is developed to address this need, since it is not widely tested or debugged, Internet Service Providers (ISPs) resort to TE methods under Open Shortest Path First (OSPF), which is the most commonly used intra-domain routing protocol. Determining OSPF link weights for optimal network performance is an NP-hard problem. As it is not possible to solve this problem, we present a subset split method to improve the efficiency and performance by minimizing the maximum link utilization in the network via a small number of link weight modifications. The results of this method are compared against results of MPLS architecture [9] and other heuristic methods.
Abstract: This paper study the behavior of the solution at the crack edges for an elliptical crack with developing cusps, Ω in the plane elasticity subjected to shear loading. The problem of finding the resulting shear stress can be formulated as a hypersingular integral equation over Ω and it is then transformed into a similar equation over a circular region, D, using conformal mapping. An appropriate collocation points are chosen on the region D to reduce the hypersingular integral equation into a system of linear equations with (2N+1)(N+1) unknown coefficients, which will later be used in the determination of shear stress intensity factors and maximum shear stress intensity. Numerical solution for the considered problem are compared with the existing asymptotic solution, and displayed graphically. Our results give a very good agreement to the existing asymptotic solutions.
Abstract: Nowadays, desalination of salt water is considered an important industrial process. In many parts of the world, particularly in the gulf countries, the multi-stage flash (MSF) water desalination has an essential contribution in the production of fresh water. In this study, a simple mathematical model is defined to design a MSF desalination system and the feasibility of using the MSF desalination process in proximity of a 42 MW power plant is investigated. This power plant can just provide 10 ton/h superheated steam from low pressure (LP) section of heat recovery steam generator (HRSG) for thermal desalting system. The designed MSF system with gained output ratio (GOR) of 10.3 has 24 flashing stages and can produce 2480 ton/d of fresh water. The expected performance characteristics of the designed MSF desalination plant are determined. In addition, the effect of motive water pressure on the amount of non-condensable gases removed by water jet vacuum pumps is investigated.
Abstract: The selection of appropriate requirements for product
releases can make a big difference in a product success. The selection
of requirements is done by different requirements prioritization
techniques. These techniques are based on pre-defined and
systematic steps to calculate the requirements relative weight.
Prioritization is complicated by new development settings, shifting
from traditional co-located development to geographically distributed
development. Stakeholders, connected to a project, are distributed all
over the world. These geographically distributions of stakeholders
make it hard to prioritize requirements as each stakeholder have their
own perception and expectations of the requirements in a software
project. This paper discusses limitations of the Analytical Hierarchy
Process with respect to geographically distributed stakeholders-
(GDS) prioritization of requirements. This paper also provides a
solution, in the form of a modified AHP, in order to prioritize
requirements for GDS. We will conduct two experiments in this
paper and will analyze the results in order to discuss AHP limitations
with respect to GDS. The modified AHP variant is also validated in
this paper.
Abstract: Since 1991 Ethiopia has officially adopted multi-party democracy. At present, there are 89 registered political parties in the country. Though political parties play an important role in the functioning of a democratic government, how to fund them is an issue of major concern. Political parties and individual candidates running for political office have to raise funds for election campaigns, and to survive as political candidates. The aim of this paper is to examine party funding problems in Africa by taking the case of Ethiopia as an example. The paper also evaluates the motives of local and international donors in giving financial and material support to political parties in emerging democracies and assesses the merits and de-merits of their donations.
Abstract: This article analyses conspiracy theories as part of the
wider discourses of missionary politics. It presents a case study of
Venezuela and describes how its leaders use conspiracy theories as
political tools. Through quotes taken form Venezuelan president
Chavez-s public speeches and other sources, and through a short
analysis of the ideological basis of his discourses, it shows how
conspiracy theories are constructed and how they affect the local
political praxis. The article also describes how conspiracy theories
have been consistently used as an important part of the construction of
a political religion for the New Man of the Bolivarian Revolution. It
concludes that the use of conspiracy theories by political leaders
produces a sense of loss of political agency.
Abstract: Motion detection is very important in image
processing. One way of detecting motion is using optical flow.
Optical flow cannot be computed locally, since only one independent
measurement is available from the image sequence at a point, while
the flow velocity has two components. A second constraint is needed.
The method used for finding the optical flow in this project is
assuming that the apparent velocity of the brightness pattern varies
smoothly almost everywhere in the image. This technique is later
used in developing software for motion detection which has the
capability to carry out four types of motion detection. The motion
detection software presented in this project also can highlight motion
region, count motion level as well as counting object numbers. Many
objects such as vehicles and human from video streams can be
recognized by applying optical flow technique.
Abstract: Dynamics of a vapour bubble generated due to a high local energy input near a circular thin bronze plate in the absence of the buoyancy forces is numerically investigated in this paper. The bubble is generated near a thin bronze plate and during the growth and collapse of the bubble, it deforms the nearby plate. The Boundary Integral Equation Method is employed for numerical simulation of the problem. The fluid is assumed to be incompressible, irrotational and inviscid and the surface tension on the bubble boundary is neglected. Therefore the fluid flow around the vapour bubble can be assumed as a potential flow. Furthermore, the thin bronze plate is assumed to have perfectly plastic behaviour. Results show that the displacement of the circular thin bronze plate has considerable effect on the dynamics of its nearby vapour bubble. It is found that by decreasing the thickness of the thin bronze plate, the growth and collapse rate of the bubble becomes higher and consequently the lifetime of the bubble becomes shorter.
Abstract: The importance of good requirements engineering is well documented. Agile practices, promoting collaboration and communications, facilitate the elicitation and management of volatile requirements. However, current Agile practices work in a well-defined environment. It is necessary to have a co-located customer. With distributed development it is not always possible to realize this co-location. In this environment a suitable process, possibly supported by tools, is required to support changing requirements. This paper introduces the issues of concern when managing requirements in a distributed environment and describes work done at the Software Technology Research Centre as part of the NOMAD project.
Abstract: A passive system "Qanat" is collection of some
underground wells. A mother-well was dug in a place far from the
city where they could reach to the water table maybe 100 meters
underground, they dug other wells to direct water toward the city,
with minimum possible gradient. Using the slope of the earth they
could bring water close to the surface in the city. The source of water
or the appearance of Qanat, land slope and the ownership lines are
the important and effective factors in the formation of routes and the
segment division of lands to the extent that making use of Qanat as
the techniques of extracting underground waters creates a channel of
routes with an organic order and hierarchy coinciding the slope of
land and it also guides the Qanat waters in the tradition texture of salt
desert and border provinces of it. Qanats are excavated in a specified
distinction from each other. The quantity of water provided by
Qanats depends on the kind of land, distance from mountain,
geographical situation of them and the rate of water supply from the
underground land. The rate of underground waters, possibility of
Qanat excavation, number of Qanats and rate of their water supply
from one hand and the quantity of cultivable fertile lands from the
other hand are the important natural factors making the size of cities.
In the same manner the cities with several Qanats have multi central
textures. The location of cities is in direct relation with land quality,
soil fertility and possibility of using underground water by excavating
Qanats. Observing the allowable distance for Qanat watering is a
determining factor for distance between villages and cities.
Topography, land slope, soil quality, watering system, ownership,
kind of cultivation, etc. are the effective factors in directing Qanats
for excavation and guiding water toward the cultivable lands and it
also causes the formation of different textures in land division of
farming provinces. Several divisions such as orderly and wide, inorderly,
thin and long, comb like, etc. are the introduction to organic
order. And at the same time they are complete coincidence with
environmental conditions in the typical development of ecological
architecture and planning in the traditional cities and settlements
order.
Abstract: In this paper, a novel scheme is proposed for ownership identification and authentication using color images by deploying Cryptography and Digital Watermarking as underlaying technologies. The former is used to compute the contents based hash and the latter to embed the watermark. The host image that will claim to be the rightful owner is first transformed from RGB to YST color space exclusively designed for watermarking based applications. Geometrically YS ÔèÑ T and T channel corresponds to the chrominance component of color image, therefore suitable for embedding the watermark. The T channel is divided into 4×4 nonoverlapping blocks. The size of block is important for enhanced localization, security and low computation. Each block along with ownership information is then deployed by SHA160, a one way hash function to compute the content based hash, which is always unique and resistant against birthday attack instead of using MD5 that may raise the condition i.e. H(m)=H(m'). The watermark payload varies from block to block and computed by the variance factorα . The quality of watermarked images is quite high both subjectively and objectively. Our scheme is blind, computationally fast and exactly locates the tampered region.
Abstract: This article presents the developments of efficient
algorithms for tablet copies comparison. Image recognition has
specialized use in digital systems such as medical imaging,
computer vision, defense, communication etc. Comparison between
two images that look indistinguishable is a formidable task. Two
images taken from different sources might look identical but due to
different digitizing properties they are not. Whereas small variation
in image information such as cropping, rotation, and slight
photometric alteration are unsuitable for based matching
techniques. In this paper we introduce different matching
algorithms designed to facilitate, for art centers, identifying real
painting images from fake ones. Different vision algorithms for
local image features are implemented using MATLAB. In this
framework a Table Comparison Computer Tool “TCCT" is
designed to facilitate our research. The TCCT is a Graphical Unit
Interface (GUI) tool used to identify images by its shapes and
objects. Parameter of vision system is fully accessible to user
through this graphical unit interface. And then for matching, it
applies different description technique that can identify exact
figures of objects.
Abstract: The aim of this study is to investigate the effect of
perceived social support and stress on the coping capability and level
of depression of foreign and local students in Malaysia. Using
convenience sampling, 200 students from three universities in
Selangor, Malaysia participated in the study. The results of this study
revealed that there was a significant relationship between perceived
social support and coping capability. It is also found that there is a
negative relationship between coping capability and depression.
Further, stress and depression are positively related whereas stress
and coping capability are negatively related. Lastly, there is no
significant difference for the stress level and coping capability
amongst local and foreign students.
Abstract: This paper addresses the development of an intelligent vision system for human-robot interaction. The two novel contributions of this paper are 1) Detection of human faces and 2) Localizing the eye. The method is based on visual attributes of human skin colors and geometrical analysis of face skeleton. This paper introduces a spatial domain filtering method named ?Fuzzily skewed filter' which incorporates Fuzzy rules for deciding the gray level of pixels in the image in their neighborhoods and takes advantages of both the median and averaging filters. The effectiveness of the method has been justified over implementing the eye tracking commands to an entertainment robot, named ''AIBO''.
Abstract: In this work, are discussed two formulations of the boundary element method - BEM to perform linear bending analysis of plates reinforced by beams. Both formulations are based on the Kirchhoff's hypothesis and they are obtained from the reciprocity theorem applied to zoned plates, where each sub-region defines a beam or a slab. In the first model the problem values are defined along the interfaces and the external boundary. Then, in order to reduce the number of degrees of freedom kinematics hypothesis are assumed along the beam cross section, leading to a second formulation where the collocation points are defined along the beam skeleton, instead of being placed on interfaces. On these formulations no approximation of the generalized forces along the interface is required. Moreover, compatibility and equilibrium conditions along the interface are automatically imposed by the integral equation. Thus, these formulations require less approximation and the total number of the degree s of freedom is reduced. In the numerical examples are discussed the differences between these two BEM formulations, comparing as well the results to a well-known finite element code.
Abstract: The paper presents an investigation in to the effect of neural network predictive control of UPFC on the transient stability performance of a multimachine power system. The proposed controller consists of a neural network model of the test system. This model is used to predict the future control inputs using the damped Gauss-Newton method which employs ‘backtracking’ as the line search method for step selection. The benchmark 2 area, 4 machine system that mimics the behavior of large power systems is taken as the test system for the study and is subjected to three phase short circuit faults at different locations over a wide range of operating conditions. The simulation results clearly establish the robustness of the proposed controller to the fault location, an increase in the critical clearing time for the circuit breakers, and an improved damping of the power oscillations as compared to the conventional PI controller.