Abstract: In this work, the effects of scale on thermal behavior of the slab in a walking-beam type reheating furnace is studied by considering scale formation and growth in a furnace environment. Also, mathematical heat transfer model to predict the thermal radiation in a complex shaped reheating furnace with slab and skid buttons is developed with combined nongray WSGGM and blocked-off solution procedure. The model can attack the heat flux distribution within the furnace and the temperature distribution in the slab throughout the reheating furnace process by considering the heat exchange between the slab and its surroundings, including the radiant heat transfer among the slabs, the skids, the hot combustion gases and the furnace wall as well as the gas convective heat transfer in the furnace. With the introduction of the mathematical formulations validation of the present numerical model is conducted by calculating two example problems of blocked-off and nongray gas radiative heat transfer. After discussing the formation and growth of the scale on the slab surface, slab heating characteristics with scale is investigated in terms of temperature rise with time.
Abstract: A plausible architecture of an ancient genetic code is derived from an extended base triplet vector space over the Galois field of the extended base alphabet {D, G, A, U, C}, where the letter D represent one or more hypothetical bases with unspecific pairing. We hypothesized that the high degeneration of a primeval genetic code with five bases and the gradual origin and improvements of a primitive DNA repair system could make possible the transition from the ancient to the modern genetic code. Our results suggest that the Watson-Crick base pairing and the non-specific base pairing of the hypothetical ancestral base D used to define the sum and product operations are enough features to determine the coding constraints of the primeval and the modern genetic code, as well as the transition from the former to the later. Geometrical and algebraic properties of this vector space reveal that the present codon assignment of the standard genetic code could be induced from a primeval codon assignment. Besides, the Fourier spectrum of the extended DNA genome sequences derived from the multiple sequence alignment suggests that the called period-3 property of the present coding DNA sequences could also exist in the ancient coding DNA sequences.
Abstract: Efficient storage, transmission and use of video information are key requirements in many multimedia applications currently being addressed by MPEG-4. To fulfill these requirements, a new approach for representing video information which relies on an object-based representation, has been adopted. Therefore, objectbased watermarking schemes are needed for copyright protection. This paper proposes a novel blind object watermarking scheme for images and video using the in place lifting shape adaptive-discrete wavelet transform (SA-DWT). In order to make the watermark robust and transparent, the watermark is embedded in the average of wavelet blocks using the visual model based on the human visual system. Wavelet coefficients n least significant bits (LSBs) are adjusted in concert with the average. Simulation results shows that the proposed watermarking scheme is perceptually invisible and robust against many attacks such as lossy image/video compression (e.g. JPEG, JPEG2000 and MPEG-4), scaling, adding noise, filtering, etc.
Abstract: Spam mails are unwanted mails sent to large number
of users. Spam mails not only consume the network resources, but
cause security threats as well. This paper proposes an efficient
technique to detect, and to prevent spam mail in the sender side rather
than the receiver side. This technique is based on a counter set on the
sender server. When a mail is transmitted to the server, the mail server
checks the number of the recipients based on its counter policy. The
counter policy performed by the mail server is based on some
pre-defined criteria. When the number of recipients exceeds the
counter policy, the mail server discontinues the rest of the process, and
sends a failure mail to sender of the mail; otherwise the mail is
transmitted through the network. By using this technique, the usage of
network resources such as bandwidth, and memory is preserved. The
simulation results in real network show that when the counter is set on
the sender side, the time required for spam mail detection is 100 times
faster than the time the counter is set on the receiver side, and the
network resources are preserved largely compared with other
anti-spam mail techniques in the receiver side.
Abstract: Mobile agents are a powerful approach to develop distributed systems since they migrate to hosts on which they have the resources to execute individual tasks. In a dynamic environment like a peer-to-peer network, Agents have to be generated frequently and dispatched to the network. Thus they will certainly consume a certain amount of bandwidth of each link in the network if there are too many agents migration through one or several links at the same time, they will introduce too much transferring overhead to the links eventually, these links will be busy and indirectly block the network traffic, therefore, there is a need of developing routing algorithms that consider about traffic load. In this paper we seek to create cooperation between a probabilistic manner according to the quality measure of the network traffic situation and the agent's migration decision making to the next hop based on decision tree learning algorithms.
Abstract: Nowadays, financial and economic crises are growing
more and reach more countries and sectors. These events have, as a
result, a considerable impact on the activities of the firms which think
unstable and in danger.
But besides this heavy uncertainty which weighs on the different
firms, the family firm, object of our research, is not only confronted
with these external difficulties but also with an internal challenge and
of size: that of transmission. Indeed, the transmission of an
organization from one generation to another can succeed as it can
fail; leaving considerable damage.
Our research registers as part of these problems since we tried to
understand relation between the behavior of two main actors of the
process of succession, predecessor and successor; and the success of
transmission.
Abstract: Generally, in order to create 3D sound using binaural
systems, we use head related transfer functions (HRTF) including the
information of sounds which is arrived to our ears. But it can decline
some three-dimensional effects in the area of a cone of confusion
between front and back directions, because of the characteristics of
HRTF.
In this paper, we propose a new method to use psychoacoustics
theory that reduces the confusion of sound image localization. In the
method, HRTF spectrum characteristic is enhanced by using the
energy ratio of the bark band. Informal listening tests show that the
proposed method improves the front-back sound localization
characteristics much better than the conventional methods
Abstract: The authors present an algorithm for order reduction of linear time invariant dynamic systems using the combined advantages of the eigen spectrum analysis and the error minimization by particle swarm optimization technique. Pole centroid and system stiffness of both original and reduced order systems remain same in this method to determine the poles, whereas zeros are synthesized by minimizing the integral square error in between the transient responses of original and reduced order models using particle swarm optimization technique, pertaining to a unit step input. It is shown that the algorithm has several advantages, e.g. the reduced order models retain the steady-state value and stability of the original system. The algorithm is illustrated with the help of two numerical examples and the results are compared with the other existing techniques.
Abstract: This paper presents a method for obtaining the
desired reference current for Voltage Source Converter (VSC) of the Shunt Active Power Filter (SAPF) using Synchronous Reference Frame Theory. The method relies on the performance of the Proportional-Integral (PI) controller for
obtaining the best control performance of the SAPF. To
improve the performance of the PI controller, the feedback
path to the integral term is introduced to compensate the
winding up phenomenon due to integrator. Using Reference
Frame Transformation, reference signals are transformed from
a - b - c stationery frame to 0 - d - q rotating frame.
Using the PI controller, the reference signals in the 0 - d - q rotating frame are controlled to get the desired reference signals for the Pulse Width Modulation. The synchronizer, the Phase Locked Loop (PLL) with PI filter is used for
synchronization, with much emphasis on minimizing delays. The system performance is examined with Shunt Active Power Filter simulation model.
Abstract: By systematically applying different engineering
methods, difficult financial problems become approachable. Using a
combination of theory and techniques such as wavelet transform,
time series data mining, Markov chain based discrete stochastic
optimization, and evolutionary algorithms, this work formulated a
strategy to characterize and forecast non-linear time series. It
attempted to extract typical features from the volatility data sets of
S&P100 and S&P500 indices that include abrupt drops, jumps and
other non-linearity. As a result, accuracy of forecasting has reached
an average of over 75% surpassing any other publicly available
results on the forecast of any financial index.
Abstract: A new tool path planning method for 5-axis flank
milling of a globoidal indexing cam is developed in this paper. The
globoidal indexing cam is a practical transmission mechanism due
to its high transmission speed, accuracy and dynamic performance.
Machining the cam profile is a complex and precise task. The profile
surface of the globoidal cam is generated by the conjugate contact
motion of the roller. The generated complex profile surface is usually
machined by 5-axis point-milling method. The point-milling method
is time-consuming compared with flank milling. The tool path for
5-axis flank milling of globoidal cam is developed to improve the
cutting efficiency. The flank milling tool path is globally optimized
according to the minimum zone criterion, and high accuracy is
guaranteed. The computational example and cutting simulation finally
validate the developed method.
Abstract: Discrete Cosine Transform (DCT) based transform coding is very popular in image, video and speech compression due to its good energy compaction and decorrelating properties. However, at low bit rates, the reconstructed images generally suffer from visually annoying blocking artifacts as a result of coarse quantization. Lapped transform was proposed as an alternative to the DCT with reduced blocking artifacts and increased coding gain. Lapped transforms are popular for their good performance, robustness against oversmoothing and availability of fast implementation algorithms. However, there is no proper study reported in the literature regarding the statistical distributions of block Lapped Orthogonal Transform (LOT) and Lapped Biorthogonal Transform (LBT) coefficients. This study performs two goodness-of-fit tests, the Kolmogorov-Smirnov (KS) test and the 2- test, to determine the distribution that best fits the LOT and LBT coefficients. The experimental results show that the distribution of a majority of the significant AC coefficients can be modeled by the Generalized Gaussian distribution. The knowledge of the statistical distribution of transform coefficients greatly helps in the design of optimal quantizers that may lead to minimum distortion and hence achieve optimal coding efficiency.
Abstract: In this paper, application of Sliding Mode Control (SMC) technique for an Active Magnetic Bearing (AMB) system with varying rotor speed is considered. The gyroscopic effect and mass imbalance inherited in the system is proportional to rotor speed in which this nonlinearity effect causes high system instability as the rotor speed increases. Transformation of the AMB dynamic model into regular system shows that these gyroscopic effect and imbalance lie in the mismatched part of the system. A H2-based sliding surface is designed which bound the mismatched parts. The solution of the surface parameter is obtained using Linear Matrix Inequality (LMI). The performance of the controller applied to the AMB model is demonstrated through simulation works under various system conditions.
Abstract: In this paper channel estimation techniques are
considered as the support methods for OFDM transmission systems
based on Non Binary LDPC (Low Density Parity Check) codes.
Standard frequency domain pilot aided LS (Least Squares) and
LMMSE (Linear Minimum Mean Square Error) estimators are
investigated. Furthermore, an iterative algorithm is proposed as a
solution exploiting the NB-LDPC channel decoder to improve the
performance of the LMMSE estimator. Simulation results of signals
transmitted through fading mobile channels are presented to compare
the performance of the proposed channel estimators.
Abstract: Knowledge and these notions have become more and
more important and we speak about a knowledge based society
today. A lot of small and big companies have reacted upon these new
challenges. But there is a deep abyss about knowledge conception
and practice between the professional researchers and company - life.
The question of this research was: How can small and mediumsized
companies be equal to the demands of new economy?
Questionnaires were used in this research and a special segment of
the native knowledge based on economy was focused on.
Researchers would have liked to know what the sources of success
are and how they can be in connection with questions of knowledge
acquisition, knowledge transfer, knowledge utilization in small and
medium-sized companies. These companies know that they have to
change their behaviour and thinking, but they are not on the suitable
level that they can compete with bigger or multinational companies.
Abstract: This paper provides new ways to explore the old
problem of failure of information systems development in an
organisation. Based on the theory of cognitive dissonance,
information systems (IS) failure is defined as a gap between what the
users expect from an information system and how well these
expectations are met by the perceived performance of the delivered
system. Bridging the expectation-perception gap requires that IS
professionals make a radical change from being the proprietor of
information systems and products to being service providers. In order
to deliver systems and services that IS users perceive as valuable, IS
people must become expert in determining and assessing users-
expectations and perceptions. It is also suggested that the IS
community, in general, has given relatively little attention to the
front-end process of requirements specification for IS development.
There is a simplistic belief that requirements are obtainable from
users, they are then translatable into a formal specification. The
process of information needs analysis is problematic and worthy of
investigation.
Abstract: TTV is an unenveloped circular single-stranded DNA
virus with a diameter of 30-32 nm that first was described in 1997 in
Japan. TTV was detected in various populations without proven
pathology, including blood donors and in patients with chronic HBV
and HCV hepatitis. The aim of this study was to determine the
prevalence of TTV DNA in Iranian patients with chronic hepatitis B
and C. Viral TTV-DNA was studied in 442 samples (202 with HBV,
138 with HCV and 102 controls) collected from west south of Iran.
All extracted serum DNA was amplified by TTV ORF1 gene specific
primers using the semi nested PCR technique. TTV DNA was
detected in the serum of 8.9% and 10.8% patients with chronic
hepatitis B and C, respectively. Prevalence of TTV-DNA in the serum
of 102 controls was 2.9%. Results showed significant relation of TTV
with HBV and HCV in patients by using T test examination (P
Abstract: Fruit drying is a well known process mostly used for
preservation of fruits. Osmotic dehydration of apricot slices were
carried out in three different salt-sucrose concentrations and four
different temperatures. Also three different weight ratios of solution
to sample were conducted to one set of experiments. The dehydration
curves were constructed using Peleg-s model. Increasing the solution
volume increased the mass transfer rate and hence the solid gain
increased rapidly. Increasing the volume of osmotic media caused an
increase in overall mass transfer but a 'solution to sample' ratio of 5:1
gave the best product quality. The best temperature and concentration
that had a high water loss to solid gain ratio and an acceptable taste
were 40°C and 5%, respectively.
Abstract: In this paper, a novel multipurpose audio watermarking
algorithm is proposed based on Vector Quantization (VQ) in Discrete
Cosine Transform (DCT) domain using the codeword labeling and
index-bit constrained method. By using this algorithm, it can fulfill the
requirements of both the copyright protection and content integrity
authentication at the same time for the multimedia artworks. The
robust watermark is embedded in the middle frequency coefficients of
the DCT transform during the labeled codeword vector quantization
procedure. The fragile watermark is embedded into the indices of the
high frequency coefficients of the DCT transform by using the
constrained index vector quantization method for the purpose of
integrity authentication of the original audio signals. Both the robust
and the fragile watermarks can be extracted without the original audio
signals, and the simulation results show that our algorithm is effective
with regard to the transparency, robustness and the authentication
requirements
Abstract: Recently, a vehicular ad-hoc networks(VANETs) for
Intelligent Transport System(ITS) have become able safety and convenience services surpassing the simple services such as
an electronic toll collection system. To provide the proper services,
VANET needs infrastructure over the country infrastructure. Thus, we have to spend a huge sum of
human resources. In this reason, several studies have been made on the
usage of cellular networks instead of new protocols
this study is to assess a performance evaluation of the
cellular network for VANET. In this paper, the result of a
for the suitability of cellular networks for VANET
experiment, The LTE(Long Term Evolution) of cellular networks found to be most suitable among the others cellular networks