Abstract: An approach of design of stable of control systems with ultimately wide ranges of uncertainly disturbed parameters is offered. The method relies on using of nonlinear structurally stable functions from catastrophe theory as controllers. Theoretical part presents an analysis of designed nonlinear second-order control systems. As more important the integrators in series, canonical controllable form and Jordan forms are considered. The analysis resumes that due to added controllers systems become stable and insensitive to any disturbance of parameters. Experimental part presents MATLAB simulation of design of control systems of epidemic spread, aircrafts angular motion and submarine depth. The results of simulation confirm the efficiency of offered method of design. KeywordsCatastrophes, robust control, simulation, uncertain parameters.
Abstract: Authentication plays a vital role in many secure
systems. Most of these systems require user to log in with his or her
secret password or pass phrase before entering it. This is to ensure all
the valuables information is kept confidential guaranteeing also its
integrity and availability. However, to achieve this goal, users are
required to memorize high entropy passwords or pass phrases.
Unfortunately, this sometimes causes difficulty for user to remember
meaningless strings of data. This paper presents a new scheme which
assigns a weight to each personal question given to the user in
revealing the encrypted secrets or password. Concentration of this
scheme is to offer fault tolerance to users by allowing them to forget
the specific password to a subset of questions and still recover the
secret and achieve successful authentication. Comparison on level of
security for weight-based and weightless secret recovery scheme is
also discussed. The paper concludes with the few areas that requires
more investigation in this research.
Abstract: A numerical simulation of vortex-induced vibration of
a 2-dimensional elastic circular cylinder with two degree of freedom
under the uniform flow is calculated when Reynolds is 200.
2-dimensional incompressible Navier-Stokes equations are solved
with the space-time finite element method, the equation of the cylinder
motion is solved with the new explicit integral method and the mesh
renew is achieved by the spring moving mesh technology. Considering
vortex-induced vibration with the low reduced damping parameter, the
variety trends of the lift coefficient, the drag coefficient, the
displacement of cylinder are analyzed under different oscillating
frequencies of cylinder. The phenomena of locked-in, beat and
phases-witch were captured successfully. The evolution of vortex
shedding from the cylinder with time is discussed. There are very
similar trends in characteristics between the results of the one degree
of freedom cylinder model and that of the two degree of freedom
cylinder model. The streamwise vibrations have a certain effect on the
lateral vibrations and their characteristics.
Abstract: Numerical integration of initial boundary problem for advection equation in 3 ℜ is considered. The method used is
conditionally stable semi-Lagrangian advection scheme with high order interpolation on unstructured mesh. In order to increase time step integration the BFECC method with limiter TVD correction is used. The method is adopted on parallel graphic processor unit environment using NVIDIA CUDA and applied in Navier-Stokes solver. It is shown that the calculation on NVIDIA GeForce 8800
GPU is 184 times faster than on one processor AMDX2 4800+ CPU. The method is extended to the incompressible fluid dynamics solver. Flow over a Cylinder for 3D case is compared to the experimental data.
Abstract: In this paper, a Gaussian multiple input multiple output multiple eavesdropper (MIMOME) channel is considered where a transmitter communicates to a receiver in the presence of an eavesdropper. We present a technique for determining the secrecy capacity of the multiple input multiple output (MIMO) channel under Gaussian noise. We transform the degraded MIMOME channel into multiple single input multiple output (SIMO) Gaussian wire-tap channels and then use scalar approach to convert it into two equivalent multiple input single output (MISO) channels. The secrecy capacity model is then developed for the condition where the channel state information (CSI) for main channel only is known to the transmitter. The results show that the secret communication is possible when the eavesdropper channel noise is greater than a cutoff noise level. The outage probability is also analyzed of secrecy capacity is also analyzed. The effect of fading and outage probability is also analyzed.
Abstract: increased competition and increased costs of
designing made it important for the firms to identify the right
products and the right methods for manufacturing the products. Firms
should focus on customers and identify customer demands directly to
design the right products. Several management methods and
techniques that are currently available improve one or more functions
or processes in an industry and do not take the complete product life
cycle into consideration. On the other hand target costing is a method
/ philosophy that takes financial, manufacturing and customer aspects
into consideration during designing phase and helps firms in making
product design decisions to increase the profit / value of the
company. It uses various techniques to identify customer demands, to
decrease costs of manufacturing and finally to achieve strategic goals.
Target Costing forms an integral part of total product design /
redesign based on strategic plans.
Abstract: Internet access is a vital part of the modern world and an important tool in the education of our children. It is present in schools, homes and even shopping malls. Mastering the use of the internet is likely to be an important skill for those entering the job markets of the future. An internet user can be anyone he or she wants to be in an online chat room, or play thrilling and challenging games against other players from all corners of the globe. It seems at present time (or near future) for many people relationships in the real world may be neglected as those in the virtual world increase in importance. Internet is provided a fast mode of transportation caused freedom from family bonds and mixing with different cultures and new communities. This research is an attempt to study effect of Internet on Social capital. For this purpose a survey technique on the sample size amounted 168 students of Payame Noor University of Kermanshah city in country of Iran were considered. Degree of social capital is moderate. With the help of the Multi-variable Regression, variables of Iranian message attractive, Interest to internet with effect of positive and variable Creating a cordial atmosphere with negative effect be significant.
Abstract: WiMAX and Wi-Fi are considered as the promising
broadband access solutions for wireless MAN’s and LANs,
respectively. In the recent works WiMAX is considered suitable as a
backhaul service to connect multiple dispersed Wi-Fi ‘hotspots’.
Hence a new integrated WiMAX/Wi-Fi architecture has been
proposed in literatures. In this paper the performance of an integrated
WiMAX/Wi-Fi network has been investigated by streaming a video
conference application. The difference in performance between the
two protocols is compared with respect to video conferencing. The
Heterogeneous network was simulated in the OPNET simulator.
Abstract: Process measurement is the task of empirically and objectively assigning numbers to the properties of business processes in such a way as to describe them. Desirable attributes to study and measure include complexity, cost, maintainability, and reliability. In our work we will focus on investigating process complexity. We define process complexity as the degree to which a business process is difficult to analyze, understand or explain. One way to analyze a process- complexity is to use a process control-flow complexity measure. In this paper, an attempt has been made to evaluate the control-flow complexity measure in terms of Weyuker-s properties. Weyuker-s properties must be satisfied by any complexity measure to qualify as a good and comprehensive one.
Abstract: The present work deals with the structural analysis of
turbine blades and modeling of turbine blades. A common failure
mode for turbine machines is high cycle of fatigue of compressor and
turbine blades due to high dynamic stresses caused by blade vibration
and resonance within the operation range of the machinery. In this
work, proper damping system will be analyzed to reduce the
vibrating blade. The main focus of the work is the modeling of under
platform damper to evaluate the dynamic analysis of turbine-blade
vibrations. The system is analyzed using Bond graph technique. Bond
graph is one of the most convenient ways to represent a system from
the physical aspect in foreground. It has advantage of putting together
multi-energy domains of a system in a single representation in a
unified manner. The bond graph model of dry friction damper is
simulated on SYMBOLS-shakti® software. In this work, the blades
are modeled as Timoshenko beam. Blade Vibrations under different
working conditions are being analyzed numerically.
Abstract: The hydrologic time series data display periodic
structure and periodic autoregressive process receives considerable
attention in modeling of such series. In this communication long
term record of monthly waste flow of Lyari river is utilized to
quantify by using PAR modeling technique. The parameters of
model are estimated by using Frances & Paap methodology. This
study shows that periodic autoregressive model of order 2 is the most
parsimonious model for assessing periodicity in waste flow of the
river. A careful statistical analysis of residuals of PAR (2) model is
used for establishing goodness of fit. The forecast by using proposed
model confirms significance and effectiveness of the model.
Abstract: In this paper we present a novel approach for density estimation. The proposed approach is based on using the logistic regression model to get initial density estimation for the given empirical density. The empirical data does not exactly follow the logistic regression model, so, there will be a deviation between the empirical density and the density estimated using logistic regression model. This deviation may be positive and/or negative. In this paper we use a linear combination of Gaussian (LCG) with positive and negative components as a model for this deviation. Also, we will use the expectation maximization (EM) algorithm to estimate the parameters of LCG. Experiments on real images demonstrate the accuracy of our approach.
Abstract: The degradation of selected pharmaceuticals in some
water matrices was studied by using several chemical treatments. The
pharmaceuticals selected were the beta-blocker metoprolol, the
nonsteroidal anti-inflammatory naproxen, the antibiotic amoxicillin,
and the analgesic phenacetin; and their degradations were conducted
by using UV radiation alone, ozone, Fenton-s reagent, Fenton-like
system, photo-Fenton system, and combinations of UV radiation and
ozone with H2O2, TiO2, Fe(II), and Fe(III). The water matrices, in
addition to ultra-pure water, were a reservoir water, a groundwater,
and two secondary effluents from two municipal WWTP. The results
reveal that the presence of any second oxidant enhanced the
oxidation rates, with the systems UV/TiO2 and O3/TiO2 providing the
highest degradation rates. It is also observed in most of the
investigated oxidation systems that the degradation rate followed the
sequence: amoxicillin > naproxen > metoprolol > phenacetin. Lower
rates were obtained with the pharmaceuticals dissolved in natural
waters and secondary effluents due to the organic matter present
which consume some amounts of the oxidant agents.
Abstract: This paper addresses the problem of recognizing and
interpreting the behavior of human workers in industrial
environments for the purpose of integrating humans in software
controlled manufacturing environments. In this work we propose a
generic concept in order to derive solutions for task-related manual
production applications. Thus, we are able to use a versatile concept
providing flexible components and being less restricted to a specific
problem or application. We instantiate our concept in a spot welding
scenario in which the behavior of a human worker is interpreted
when performing a welding task with a hand welding gun. We
acquire signals from inertial sensors, video cameras and triggers and
recognize atomic actions by using pose data from a marker based
video tracking system and movement data from inertial sensors.
Recognized atomic actions are analyzed on a higher evaluation level
by a finite state machine.
Abstract: One of the aims of the paper is to make a comparison
of experimental results with numerical simulation for a side cooler.
Specifically, it was the amount of air to be delivered by the side
cooler with fans running at 100%. This integral value was measured
and evaluated within the plane parallel to the front side of the side
cooler at a distance of 20mm from the front side. The flow field
extending from the side cooler to the space was also evaluated.
Another objective was to address the contribution of evaluated values
to the increase of data center energy consumption.
Abstract: Team efficacy beliefs show promise in enhancing
team performance. Using a model-based quantitative research design,
we investigated the antecedents and performance consequences of
generalized team efficacy (potency) in a sample of 56 capital projects
executed by 15 Fortune 500 companies in the process industries.
Empirical analysis of our field survey identified that generalized
team efficacy beliefs were positively associated with an objective
measure of project cost performance. Regression analysis revealed
that team competence, empowering leadership, and performance
feedback all predicted generalized team efficacy beliefs. Tests of
mediation revealed that generalized team efficacy fully mediated
between these three inputs and project cost performance.
Abstract: The objective of this paper is to develop a neural
network-based residual generator to detect the fault in the actuators
for a specific communication satellite in its attitude control system
(ACS). First, a dynamic multilayer perceptron network with dynamic
neurons is used, those neurons correspond a second order linear
Infinite Impulse Response (IIR) filter and a nonlinear activation
function with adjustable parameters. Second, the parameters from the
network are adjusted to minimize a performance index specified by
the output estimated error, with the given input-output data collected
from the specific ACS. Then, the proposed dynamic neural network
is trained and applied for detecting the faults injected to the wheel,
which is the main actuator in the normal mode for the communication
satellite. Then the performance and capabilities of the proposed
network were tested and compared with a conventional model-based
observer residual, showing the differences between these two
methods, and indicating the benefit of the proposed algorithm to
know the real status of the momentum wheel. Finally, the application
of the methods in a satellite ground station is discussed.
Abstract: Until recently it would have been unusual to consider classifying population movements and refugees as security problem. However, efforts at shaping our world to make ourselves secure have paradoxically led to ever greater insecurity. The feeling of uncertainty, pertinent throughout all discourses of security, has led to the creation of security production into seemingly benign routines of everyday life. Yet, the paper argues, neither of security discourses accounted for, disclosed and challenged the fundamental aporias embedded in Western security narratives. In turn, the paper aims to unpick the conventional security wisdom, which is haunted with strong ontologies, embedded in the politics of Orientalism, and (in)security nexus. The paper concludes that current security affair conceals the integral impossibility of fulfilling its very own promise of assured security. The paper also provides suggestions about alternative security discourse based on mutual dialogue.
Abstract: Frauds in insurance industry are one of the major
sources of operational risk of insurance companies and constitute a
significant portion of their losses. Every reasonable company on the
market aims for improving their processes of uncovering frauds and
invests their resources to reduce them. This article is addressing fraud
management area from the view of extension of existing Business
Intelligence solution. We describe the frame of such solution and
would like to share with readers all benefits brought to insurance
companies by adopting this approach in their fight against insurance
frauds.
Abstract: Magnesium alloy has been widely investigated as
biodegradable cardiovascular stent and bone implant. Its application
for biodegradable esophageal stenting remains unexplored. This
paper reports the biodegradation behaviors of AZ31 magnesium alloy
in artificial saliva and various types of beverage in vitro. Results
show that the magnesium ion release rate of AZ31 in artificial saliva
for a stent (2cm diameter, 10cm length at 50% stent surface
coverage) is 43 times lower than the daily allowance of human body
magnesium intakes. The degradation rates of AZ31 in different
beverages could also be significantly different. These results suggest
that the esophagus in nature is a less aggressive chemical
environment for degradation of magnesium alloys. The significant
difference in degradation rates of AZ31 in different beverages opens
new opportunities for development of degradation controllable
esophageal stent through customizing ingested beverages.