Abstract: Cavitation in cryogenic liquids is widely present in
contemporary science. In the current study, we re-examine a
previously validated acoustic cavitation model which was developed
for a gas bubble in liquid water. Furthermore, simulations of
cryogenic fluids including the thermal effect, the effect of acoustic
pressure amplitude and the frequency of sound field on the bubble
dynamics are presented. A gas bubble (Helium) in liquids Nitrogen,
Oxygen and Hydrogen in an acoustic field at ambient pressure and
low temperature is investigated numerically. The results reveal that
the oscillation of the bubble in liquid Hydrogen fluctuates more than
in liquids Oxygen and Nitrogen. The oscillation of the bubble in
liquids Oxygen and Nitrogen is approximately similar.
Abstract: The paper describes a Chinese shadow play animation
system based on Kinect. Users, without any professional training, can
personally manipulate the shadow characters to finish a shadow play
performance by their body actions and get a shadow play video
through giving the record command to our system if they want. In our
system, Kinect is responsible for capturing human movement and
voice commands data. Gesture recognition module is used to control
the change of the shadow play scenes. After packaging the data from
Kinect and the recognition result from gesture recognition module,
VRPN transmits them to the server-side. At last, the server-side uses
the information to control the motion of shadow characters and video
recording. This system not only achieves human-computer interaction,
but also realizes the interaction between people. It brings an
entertaining experience to users and easy to operate for all ages. Even
more important is that the application background of Chinese shadow
play embodies the protection of the art of shadow play animation.
Abstract: This paper presents a novel design of a microstrip
fractal antenna based on the use of Sierpinski triangle shape, it’s
designed and simulated by using FR4 substrate in the operating
frequency bands (GPS, WiMAX), the design is a fractal antenna with
a modified ground structure. The proposed antenna is simulated and
validated by using CST Microwave Studio Software, the simulated
results presents good performances in term of radiation pattern and
matching input impedance.
Abstract: We present a trigonometric scheme to approximate a
circular arc with its two end points and two end tangents/unit
tangents. A rational cubic trigonometric Bézier curve is constructed
whose end control points are defined by the end points of the circular
arc. Weight functions and the remaining control points of the cubic
trigonometric Bézier curve are estimated by variational approach to
reproduce a circular arc. The radius error is calculated and found less
than the existing techniques.
Abstract: Near infrared (NIR) spectroscopy has always been of
great interest in the food and agriculture industries. The development
of prediction models has facilitated the estimation process in recent
years. In this study, 110 crude palm oil (CPO) samples were used to
build a free fatty acid (FFA) prediction model. 60% of the collected
data were used for training purposes and the remaining 40% used for
testing. The visible peaks on the NIR spectrum were at 1725 nm and
1760 nm, indicating the existence of the first overtone of C-H bands.
Principal component regression (PCR) was applied to the data in
order to build this mathematical prediction model. The optimal
number of principal components was 10. The results showed
R2=0.7147 for the training set and R2=0.6404 for the testing set.
Abstract: Safety is one of the most important considerations
when buying a new car. While active safety aims at avoiding
accidents, passive safety systems such as airbags and seat belts
protect the occupant in case of an accident. In addition to legal
regulations, organizations like Euro NCAP provide consumers with
an independent assessment of the safety performance of cars and
drive the development of safety systems in automobile industry.
Those ratings are mainly based on injury assessment reference values
derived from physical parameters measured in dummies during a car
crash test.
The components and sub-systems of a safety system are designed
to achieve the required restraint performance. Sled tests and other
types of tests are then carried out by car makers and their suppliers
to confirm the protection level of the safety system. A Knowledge
Discovery in Databases (KDD) process is proposed in order to
minimize the number of tests. The KDD process is based on the
data emerging from sled tests according to Euro NCAP specifications.
About 30 parameters of the passive safety systems from different data
sources (crash data, dummy protocol) are first analysed together with
experts opinions. A procedure is proposed to manage missing data
and validated on real data sets. Finally, a procedure is developed to
estimate a set of rough initial parameters of the passive system before
testing aiming at reducing the number of tests.
Abstract: Electricity spot prices are highly volatile under
optimal generation capacity scenarios due to factors such as nonstorability
of electricity, peak demand at certain periods, generator
outages, fuel uncertainty for renewable energy generators, huge
investments and time needed for generation capacity expansion etc.
As a result market participants are exposed to price and volume risk,
which has led to the development of risk management practices. This
paper provides an overview of risk management practices by market
participants in electricity markets using financial derivatives.
Abstract: Fuzzy inference method based approach to the
forming of modular intellectual system of assessment the quality of
communication services is proposed. Developed under this approach
the basic fuzzy estimation model takes into account the
recommendations of the International Telecommunication Union in
respect of the operation of packet switching networks based on IPprotocol.
To implement the main features and functions of the fuzzy
control system of quality telecommunication services it is used
multilayer feedforward neural network.
Abstract: Red blood cells (RBC) are the most common types of
blood cells and are the most intensively studied in cell biology. The
lack of RBCs is a condition in which the amount of hemoglobin level
is lower than normal and is referred to as “anemia”. Abnormalities in
RBCs will affect the exchange of oxygen. This paper presents a
comparative study for various techniques for classifying the RBCs as
normal or abnormal (anemic) using WEKA. WEKA is an open
source consists of different machine learning algorithms for data
mining applications. The algorithms tested are Radial Basis Function
neural network, Support vector machine, and K-Nearest Neighbors
algorithm. Two sets of combined features were utilized for
classification of blood cells images. The first set, exclusively consist
of geometrical features, was used to identify whether the tested blood
cell has a spherical shape or non-spherical cells. While the second
set, consist mainly of textural features was used to recognize the
types of the spherical cells. We have provided an evaluation based on
applying these classification methods to our RBCs image dataset
which were obtained from Serdang Hospital - Malaysia, and
measuring the accuracy of test results. The best achieved
classification rates are 97%, 98%, and 79% for Support vector
machines, Radial Basis Function neural network, and K-Nearest
Neighbors algorithm respectively.
Abstract: Solar air heater is a type of heat exchanger which
transforms solar radiation into heat energy. The thermal performance
of conventional solar air heater has been found to be poor because of
the low convective heat transfer coefficient from the absorber plate to
the air. It is attributed to the formation of a very thin boundary layer
at the absorber plate surface commonly known as viscous sub-layer.
Thermal efficiency of solar air heater can be improved by providing
the artificial roughness on absorber plate is the most efficient
technique. In this paper an attempt is made to provide artificial
roughness by incorporating inclined multiple V-ribs in the underside
of the absorber plate. 60˚V – ribs are arranged inclined to the
direction of air flow. Performance of collector estimated theoretically
and experimentally. Results of the investigation reveal that thermal
efficiency of collector with multiple V-ribs increased by 14%.
Abstract: We present an analytical model for the calculation of
the sensitivity, the spectral current noise and the detective parameter
for an optically illuminated In0.53Ga0.47As n+nn+ diode. The
photocurrent due to the excess carrier is obtained by solving the
continuity equation. Moreover, the current noise level is evaluated at
room temperature and under a constant voltage applied between the
diode terminals. The analytical calculation of the current noise in the
n+nn+ structure is developed by considering the free carries
fluctuations. The responsivity and the detection parameter are
discussed as functions of the doping concentrations and the emitter
layer thickness in one-dimensional homogeneous n+nn+ structure.
Abstract: In this work, we propose and analyze a model of
Phytoplankton-Zooplankton interaction with harvesting considering
that some species are exploited commercially for food. Criteria for
local stability, instability and global stability are derived and some
threshold harvesting levels are explored to maintain the population
at an appropriate equilibrium level even if the species are exploited
continuously.Further,biological and bionomic equilibria of the system
are obtained and an optimal harvesting policy is also analysed using
the Pantryagin’s Maximum Principle.Finally analytical findings are
also supported by some numerical simulations.
Abstract: Several of the practical industrial control processes are
multivariable processes. Due to the relation amid the variables
(interaction), delay in the loops, it is very intricate to design a
controller directly for these processes. So first, the interaction of the
variables is analyzed using Relative Normalized Gain Array
(RNGA), which considers the time constant, static gain and delay
time of the processes. Based on the effect of RNGA, relative gain
array (RGA) and NI, the pair (control configuration) of variables to
be controlled by decentralized control is selected. The equivalent
transfer function (ETF) of the process model is estimated as first
order process with delay using the corresponding elements in the
Relative gain array and Relative average residence time array
(RARTA) of the processes. Secondly, a decentralized Proportional-
Integral (PI) controller is designed for each ETF simply using
frequency response specifications. Finally, the performance and
robustness of the algorithm is comparing with existing related
approaches to validate the effectiveness of the projected algorithm.
Abstract: Image spam is a kind of email spam where the spam
text is embedded with an image. It is a new spamming technique
being used by spammers to send their messages to bulk of internet
users. Spam email has become a big problem in the lives of internet
users, causing time consumption and economic losses. The main
objective of this paper is to detect the image spam by using histogram
properties of an image. Though there are many techniques to
automatically detect and avoid this problem, spammers employing
new tricks to bypass those techniques, as a result those techniques are
inefficient to detect the spam mails. In this paper we have proposed a
new method to detect the image spam. Here the image features are
extracted by using RGB histogram, HSV histogram and combination
of both RGB and HSV histogram. Based on the optimized image
feature set classification is done by using k- Nearest Neighbor(k-NN)
algorithm. Experimental result shows that our method has achieved
better accuracy. From the result it is known that combination of RGB
and HSV histogram with k-NN algorithm gives the best accuracy in
spam detection.
Abstract: Now-a-days autonomous mobile robots have found
applications in diverse fields. An autonomous robot system must be
able to behave in an intelligent manner to deal with complex and
changing environment. This work proposes the performance of path
planning and navigation of autonomous mobile robot using
Gravitational Search Algorithm (GSA), Simulated Annealing (SA)
and Particle Swarm optimization (PSO) based intelligent controllers
in an unstructured environment. The approach not only finds a valid
collision free path but also optimal one. The main aim of the work is
to minimize the length of the path and duration of travel from a
starting point to a target while moving in an unknown environment
with obstacles without collision. Finally, a comparison is made
between the three controllers, it is found that the path length and time
duration made by the robot using GSA is better than SA and PSO
based controllers for the same work.
Abstract: Steganography is the art and science that hides the information in an appropriate cover carrier like image, text, audio and video media. In this work the authors propose a new image based steganographic method for hiding information within the complex bit planes of the image. After slicing into bit planes the cover image is analyzed to extract the most complex planes in decreasing order based on their bit plane complexity. The complexity function next determines the complex noisy blocks of the chosen bit plane and finally pixel mapping method (PMM) has been used to embed secret bits into those regions of the bit plane. The novel approach of using pixel mapping method (PMM) in bit plane domain adaptively embeds data on most complex regions of image, provides high embedding capacity, better imperceptibility and resistance to steganalysis attack.
Abstract: The method of introducing the proxy interpretation for
sending and receiving requests increase the capability of the server
and our approach UDIV (User-Data Identity Security) to solve the
data and user authentication without extending size of the data makes
better than hybrid IDS (Intrusion Detection System). And at the same
time all the security stages we have framed have to pass through less
through that minimize the response time of the request. Even though
an anomaly detected, before rejecting it the proxy extracts its identity
to prevent it to enter into system. In case of false anomalies, the
request will be reshaped and transformed into legitimate request for
further response. Finally we are holding the normal and abnormal
requests in two different queues with own priorities.
Abstract: The study is devoted to define the optimal conditions
for the nitriding of pure iron at atmospheric pressure by using NH3-
Ar-C3H8 gas mixtures. After studying the mechanisms of phase
formation and mass transfer at the gas-solid interface, a mathematical
model is developed in order to predict the nitrogen transfer rate in the
solid, the ε-carbonitride layer growth rate and the nitrogen and
carbon concentration profiles. In order to validate the model and to
show its possibilities, it is compared with thermogravimetric
experiments, analyses and metallurgical observations (X-ray
diffraction, optical microscopy and electron microprobe analysis).
Results obtained allow us to demonstrate the sound correlation
between the experimental results and the theoretical predictions.
Abstract: Environmental management implementation is
presently one of the ways of organization success and value
improvement. Increasing an organization motivation to
environmental measures introduction is caused primarily by the rising
pressure of the society that generates various incentives to endeavor
for the environmental performance improvement.
The aim of the paper is to identify and characterize the key
incentives and expectations leading organizations to the
environmental management implementation. The author focuses on
five businesses of different size and field, operating in the Czech
Republic. The qualitative approach and grounded theory procedure
are used in research.
The results point out that the significant incentives for
environmental management implementation represent primarily
demands of customers, the opportunity to declare the environmental
commitment and image improvement. The researched enterprises less
commonly expect the economical contribution, competitive
advantage increase or export rate improvement. The results show that
marketing contributions are primarily expected from the
environmental management implementation.
Abstract: Ontologies offer a means for representing and sharing
information in many domains, particularly in complex domains. For
example, it can be used for representing and sharing information
of System Requirement Specification (SRS) of complex systems
like the SRS of ERTMS/ETCS written in natural language. Since
this system is a real-time and critical system, generic ontologies,
such as OWL and generic ERTMS ontologies provide minimal
support for modeling temporal information omnipresent in these SRS
documents. To support the modeling of temporal information, one
of the challenges is to enable representation of dynamic features
evolving in time within a generic ontology with a minimal redesign
of it. The separation of temporal information from other information
can help to predict system runtime operation and to properly design
and implement them. In addition, it is helpful to provide a reasoning
and querying techniques to reason and query temporal information
represented in the ontology in order to detect potential temporal
inconsistencies. To address this challenge, we propose a lightweight
3-layer temporal Quality of Service (QoS) ontology for representing,
reasoning and querying over temporal and non-temporal information
in a complex domain ontology. Representing QoS entities in separated
layers can clarify the distinction between the non QoS entities
and the QoS entities in an ontology. The upper generic layer of
the proposed ontology provides an intuitive knowledge of domain
components, specially ERTMS/ETCS components. The separation of
the intermediate QoS layer from the lower QoS layer allows us to
focus on specific QoS Characteristics, such as temporal or integrity
characteristics. In this paper, we focus on temporal information that
can be used to predict system runtime operation. To evaluate our
approach, an example of the proposed domain ontology for handover
operation, as well as a reasoning rule over temporal relations in this
domain-specific ontology, are presented.