Abstract: Performance of vehicle depends on driving patterns
and vehicle drive train configuration. Driving patterns depends on
traffic condition, road condition and driver behavior. HEV design is
carried out under certain constrain like vehicle operating range,
acceleration, decelerations, maximum speed and road grades which
are directly related to the driving patterns. Therefore the detailed
study on HEV performance over a different drive cycle is required
for selection and sizing of HEV components. A simple hardware is
design to measured velocity v/s time profile of the vehicle by
operating vehicle on Indian roads under real traffic conditions. To
size the HEV components, a detailed dynamic model of the vehicle is
developed considering the effect of inertia of rotating components
like wheels, drive chain, engine and electric motor. Using vehicle
model and different Indian drive cycles data, total tractive power
demanded by vehicle and power supplied by individual components
has been calculated.Using above information selection and estimation
of component sizing for HEV is carried out so that HEV performs
efficiently under hostile driving condition. Complete analysis is
carried out in LABVIEW.
Abstract: Recently, much research has been conducted for
security for wireless sensor networks and ubiquitous computing.
Security issues such as authentication and data integrity are major
requirements to construct sensor network systems. Advanced
Encryption Standard (AES) is considered as one of candidate
algorithms for data encryption in wireless sensor networks. In this
paper, we will present the hardware architecture to implement low
power AES crypto module. Our low power AES crypto module has
optimized architecture of data encryption unit and key schedule unit
which could be applicable to wireless sensor networks. We also details
low power design methods used to design our low power AES crypto
module.
Abstract: Software-as-a-Service (SaaS) is a form of cloud
computing that relieves the user of the burden of hardware and
software installation and management. SaaS can be used at the course
level to enhance curricula and student experience. When cloud
computing and SaaS are included in educational literature, the focus
is typically on implementing administrative functions. Yet, SaaS can
make more immediate and substantial contributions to the technical
course content in educational offerings. This paper explores cloud
computing and SaaS, provides examples, reports on experiences
using SaaS to offer specialized software in courses, and analyzes the
advantages and disadvantages of using SaaS at the course level. The
paper contributes to the literature in higher education by analyzing
the major technical concepts, potential, and constraints for using
SaaS to deliver specialized software at the course level. Further it
may enable more educators and students to benefit from this
emerging technology.
Abstract: Data mining, which is the exploration of
knowledge from the large set of data, generated as a result of
the various data processing activities. Frequent Pattern Mining
is a very important task in data mining. The previous
approaches applied to generate frequent set generally adopt
candidate generation and pruning techniques for the
satisfaction of the desired objective. This paper shows how
the different approaches achieve the objective of frequent
mining along with the complexities required to perform the
job. This paper will also look for hardware approach of cache
coherence to improve efficiency of the above process. The
process of data mining is helpful in generation of support
systems that can help in Management, Bioinformatics,
Biotechnology, Medical Science, Statistics, Mathematics,
Banking, Networking and other Computer related
applications. This paper proposes the use of both upward and
downward closure property for the extraction of frequent item
sets which reduces the total number of scans required for the
generation of Candidate Sets.
Abstract: Addis Ababa is a seat of African Union (AU), United
Nations Economic Commission for Africa (UN-ECA) and hundreds of
embassies and consular representatives. Addis Ababa is one of the
highest capitals in the world with an average 2400 meters above sea
level. It is dichotomous city with a blend of modern high-rise and
deteriorating slum quarters. Water supply and sanitation, waste
management and housing are continuing to be serious problems.
Forest wood based domestic energy use as well as uncontrolled
emissions from mobile and fixed sources has endangered the state of
the urban environment. Analysis based on satellite imagery has
revealed the deteriorating urban environment within the last three
decades. The recently restructured city administration has brought
improvements in the condition of the urban environment. However,
the overwhelming size of the challenges faced by the city dwarfed
their fairly good results.
Abstract: Nitrogen loss from irrigated cropland, particularly
sandy soils, significantly contributes to nitrate (NO3
-) levels in
surface and groundwaters. Thus, it is of great interest to use
inexpensive natural products that can increase the fertilizer efficiency
and decrease nitrate leaching. In this study, the ability of natural
Iranian zeolite clinoptilolite (Cp) and surfactant modified zeolite
clinoptilolite (SMZ) to remove NH4
+ and NO3
-, respectively, from
aqueous solutions was determined. The feasibility of using Cp and
SMZ as soil amendment to reduce nitrate leaching from soil using
lysimeters was also investigated. Zeolite showed 10.23% to 88.42%
NH4
+ removal efficiency over a wide range of initial NH4
+
concentrations. Nitrate removal efficiency by SMZ was 32.26% to
82.26%. Field study results showed that Cp and SMZ significantly (p
< 0.05) reduced leachate NO3-N concentration compared to control.
There was no significant difference between maximum and mean
leachate NO3-N concentration of SMZ lysimeters and those of Cp
lysimeters.
Abstract: Shirvan is located in plain in Northern Khorasan province north east of Iran and has semiarid to temperate climate. To investigate the annual changes in some qualitative parameters such as electrical conductivity, total dissolved solids and chloride concentrations which have increased during ten continuous years. Fourteen groundwater sources including deep as well as semi-deep wells were sampled and were analyzed using standard methods. The trends of obtained data were analyzed during these years and the effects of different factors on the changes in electrical conductivity, concentration of chloride and total dissolved solids were clarified. The results showed that the amounts of some qualitative parameters have been increased during 10 years time which has led to decrease in water quality. The results also showed that increased in urban populations as well as extensive industrialization in the studied area are the most important reasons to influence underground water quality. Furthermore decrease in water quantity is also evident due to more water utilization and occurrence of recent droughts in the region during recent years.
Abstract: A novel low-cost flight simulator with the development
goals cost effectiveness and high performance has been realized for
meeting the huge pilot training needs of airlines. The simulator
consists of an aircraft dynamics model, a sophisticated designed
low-profile electrical driven motion system with a subsided cabin, a
mixed reality based semi-virtual cockpit system, a control loading
system and some other subsystems. It shows its advantages over
traditional flight simulator by its features achieved with open
architecture, software solutions and low-cost hardware.
Abstract: This paper proposes an efficient finite precision block floating point (BFP) treatment to the fixed coefficient finite impulse response (FIR) digital filter. The treatment includes effective implementation of all the three forms of the conventional FIR filters, namely, direct form, cascaded and par- allel, and a roundoff error analysis of them in the BFP format. An effective block formatting algorithm together with an adaptive scaling factor is pro- posed to make the realizations more simple from hardware view point. To this end, a generic relation between the tap weight vector length and the input block length is deduced. The implementation scheme also emphasises on a simple block exponent update technique to prevent overflow even during the block to block transition phase. The roundoff noise is also investigated along the analogous lines, taking into consideration these implementational issues. The simulation results show that the BFP roundoff errors depend on the sig- nal level almost in the same way as floating point roundoff noise, resulting in approximately constant signal to noise ratio over a relatively large dynamic range.
Abstract: The VoIP networks as alternative method to traditional PSTN system has been implemented in a wide variety of structures
with multiple protocols, codecs, software and hardware–based
distributions. The use of cryptographic techniques let the users to have a secure communication, but the calculate throughput as well as the QoS parameters are affected according to the used algorithm. This
paper analyzes the VoIP throughput and the QoS parameters with
different commercial encryption methods. The measurement–based
approach uses lab scenarios to simulate LAN and WAN
environments. Security mechanisms such as TLS, SIAX2, SRTP,
IPSEC and ZRTP are analyzed with μ-LAW and GSM codecs.
Abstract: The use of Quantum dots is a promising emerging
Technology for implementing digital system at the nano level. It is
effecient for attractive features such as faster speed , smaller size and
low power consumption than transistor technology. In this paper,
various Combinational and sequential logical structures - HALF
ADDER, SR Latch and Flip-Flop, D Flip-Flop preceding NAND,
NOR, XOR,XNOR are discussed based on QCA design, with
comparatively less number of cells and area. By applying these
layouts, the hardware requirements for a QCA design can be reduced.
These structures are designed and simulated using QCA Designer
Tool. By taking full advantage of the unique features of this
technology, we are able to create complete circuits on a single layer
of QCA. Such Devices are expected to function with ultra low
power Consumption and very high speeds.
Abstract: In this paper, we propose disease diagnosis hardware
architecture by using Hypernetworks technique. It can be used to
diagnose 3 different diseases (SPECT Heart, Leukemia, Prostate
cancer). Generally, the disparate diseases require specified diagnosis
hardware model for each disease. Using similarities of three diseases
diagnosis processor, we design diagnosis processor that can diagnose
three different diseases. Our proposed architecture that is combining
three processors to one processor can reduce hardware size without
decrease of the accuracy.
Abstract: For a variety of safety and economic reasons, engineering undergraduates in Australia have experienced diminishing access to the real hardware that is typically the embodiment of their theoretical studies. This trend will delay the development of practical competence, decrease the ability to model and design, and suppress motivation. The author has attempted to address this concern by creating a software tool that contains both photographic images of real machinery, and sets of graphical modeling 'tools'. Academics from a range of disciplines can use the software to set tutorial tasks, and incorporate feedback comments for a range of student responses. An evaluation of the software demonstrated that students who had solved modeling problems with the aid of the electronic tutor performed significantly better in formal examinations with similar problems. The 2-D graphical diagnostic routines in the Tutor have the potential to be used in a wider range of problem-solving tasks.
Abstract: The theory of Groebner Bases, which has recently been
honored with the ACM Paris Kanellakis Theory and Practice Award,
has become a crucial building block to computer algebra, and is
widely used in science, engineering, and computer science. It is wellknown
that Groebner bases computation is EXP-SPACE in a general
polynomial ring setting.
However, for many important applications in computer science
such as satisfiability and automated verification of hardware and
software, computations are performed in a Boolean ring. In this paper,
we give an algorithm to show that Groebner bases computation is PSPACE
in Boolean rings. We also show that with this discovery,
the Groebner bases method can theoretically be as efficient as
other methods for automated verification of hardware and software.
Additionally, many useful and interesting properties of Groebner
bases including the ability to efficiently convert the bases for different
orders of variables making Groebner bases a promising method in
automated verification.
Abstract: The interaction of tunneling or mining with
groundwater has become a very relevant problem not only due to the
need to guarantee the safety of workers and to assure the efficiency of
the tunnel drainage systems, but also to safeguard water resources
from impoverishment and pollution risk. Therefore it is very
important to forecast the drainage processes (i.e., the evaluation of
drained discharge and drawdown caused by the excavation). The aim
of this study was to know better the system and to quantify the flow
drained from the Fontane mines, located in Val Germanasca (Turin,
Italy). This allowed to understand the hydrogeological local changes
in time. The work has therefore been structured as follows: the
reconstruction of the conceptual model with the geological,
hydrogeological and geological-structural study; the calculation of
the tunnel inflows (through the use of structural methods) and the
comparison with the measured flow rates; the water balance at the
basin scale. In this way it was possible to understand what are the
relationships between rainfall, groundwater level variations and the
effect of the presence of tunnels as a means of draining water.
Subsequently, it the effects produced by the excavation of the mining
tunnels was quantified, through numerical modeling. In particular,
the modeling made it possible to observe the drawdown variation as a
function of number, excavation depth and different mines linings.
Abstract: In multi hop wireless systems, such as ad hoc and
sensor networks, mobile ad hoc network applications are deployed,
security emerges as a central requirement. A particularly devastating
attack is known as the wormhole attack, where two or more malicious
colluding nodes create a higher level virtual tunnel in the network,
which is employed to transport packets between the tunnel end points.
These tunnels emulate shorter links in the network. In which
adversary records transmitted packets at one location in the network,
tunnels them to another location, and retransmits them into the
network. The wormhole attack is possible even if the attacker has not
compromised any hosts and even if all communication provides
authenticity and confidentiality. In this paper, we analyze wormhole
attack nature in ad hoc and sensor networks and existing methods of
the defending mechanism to detect wormhole attacks without require
any specialized hardware. This analysis able to provide in
establishing a method to reduce the rate of refresh time and the
response time to become more faster.
Abstract: According to the European laws, there is the
possibility of reusing the washing wastes for the environmental
requalification of quarry lakes. The paper deals with the
hydrogeological aspects involved in this possibility, as the
introduction of finest wastes in the quarry lakes can generate
alterations of the hydrogeological setting of the area, and problems
for the future accessibility of the zone. To evaluate the
hydrogeological compatibility of the washing wastes reuse in quarry
lakes a groundwater numerical model was carried out, pointing out
both the hydrogeological feasibility of this intervention and some
guide lines for its optimization, in terms of inflow point with regard
the groundwater flow direction and loss of volume in the quarry lake.
Abstract: Four phenylurea herbicides (isoproturon, chlortoluron, diuron and linuron) were dissolved in different water matrices in order to study their chemical degradation by using UV radiation, ozone and some advanced oxidation processes (UV/H2O2, O3/H2O2, Fenton reagent and the photo- Fenton system). The waters used were: ultra-pure water, a commercial mineral water, a groundwater and a surface water taken from a reservoir. Elimination levels were established for each herbicide and for several global quality parameters, and a kinetic study was performed in order to determine basic kinetic parameters of each reaction between the target phenylureas and these oxidizing systems.
Abstract: This paper describes the design process and the realtime validation of an innovative autonomous mid-air flight and landing system developed by the Italian Aerospace Research Center in the framework of the Italian national funded project TECVOL (Technologies for the Autonomous Flight). In the paper it is provided an insight of the whole development process of the system under study. In particular, the project framework is illustrated at first, then the functional context and the adopted design and testing approach are described, and finally the on-ground validation test rig on purpose designed is addressed in details. Furthermore, the hardwarein- the-loop validation of the autonomous mid-air flight and landing system by means of the real-time test rig is described and discussed.
Abstract: Signalized intersections on high-volume arterials are
often congested during peak hours, causing a decrease in through
movement efficiency on the arterial. Much of the vehicle delay
incurred at conventional intersections is caused by high left-turn
demand. Unconventional intersection designs attempt to reduce
intersection delay and travel time by rerouting left-turns away from
the main intersection and replacing it with right-turn followed by Uturn.
The proposed new type of U-turn intersection is geometrically
designed with a raised island which provides a protected U-turn
movement. In this study several scenarios based on different
distances between U-turn and main intersection, traffic volume of
major/minor approaches and percentage of left-turn volumes were
simulated by use of AIMSUN, a type of traffic microsimulation
software. Subsequently some models are proposed in order to
compute travel time of each movement. Eventually by correlating
these equations to some in-field collected data of some implemented
U-turn facilities, the reliability of the proposed models are approved.
With these models it would be possible to calculate travel time of
each movement under any kind of geometric and traffic condition. By
comparing travel time of a conventional signalized intersection with
U-turn intersection travel time, it would be possible to decide on
converting signalized intersections into this new kind of U-turn
facility or not. However comparison of travel time is not part of the
scope of this research. In this paper only travel time of this innovative
U-turn facility would be predicted. According to some before and
after study about the traffic performance of some executed U-turn
facilities, it is found that commonly, this new type of U-turn facility
produces lower travel time. Thus, evaluation of using this type of
unconventional intersection should be seriously considered.