Abstract: Several studies have shown the association between
ambient particulate matter (PM) and adverse health effects and
climate change, thus highlighting the need to limit the anthropogenic
sources of PM. PM Exposure is commonly monitored as mass
concentration of PM10 (particle aerodynamic diameter < 10μm) or
PM2.5 (particle aerodynamic diameter < 2.5μm), although increasing
toxicity with decreasing aerodynamic diameter has been reported due
to increased surface area and enhanced chemical reactivity with other
species. Additionally, the light scattering properties of PM increases
with decreasing size. Hence, it is important to study the chemical
characterization of finer fraction of the particulate matter and to
identify their sources so that they can be controlled appropriately to a
large extent at the sources before reaching to the receptors.
Abstract: The power consumption of an Optical Packet Switch
equipped with SOA technology based Spanke switching fabric is
evaluated. Sophisticated analytical models are introduced to evaluate
the power consumption versus the offered traffic, the main
switch parameters, and the used device characteristics. The impact
of Amplifier Spontaneous Emission (ASE) noise generated by a
transmission system on the power consumption is investigated. As
a matter of example for 32×32 switches supporting 64 wavelengths
and offered traffic equal to 0,8, the average energy consumption per
bit is 5, 07 · 10-2 nJ/bit and increases if ASE noise introduced by
the transmission systems is increased.
Abstract: Creep stresses and strain rates have been obtained
for a thin rotating disc having variable density with inclusion by
using Seth-s transition theory. The density of the disc is assumed to
vary radially, i.e. ( ) 0 ¤ü ¤ü r/b m - = ; ¤ü 0 and m being real positive
constants. It has been observed that a disc, whose density increases
radially, rotates at higher angular speed, thus decreasing the
possibility of a fracture at the bore, whereas for a disc whose
density decreases radially, the possibility of a fracture at the bore
increases.
Abstract: Nowadays, where most of the leading economies are
service oriented and e-business is being widely used for their
management, supply chain management has become one of the most
studied and practiced fields. Quality has an important role on today-s
business processes, so it is important to understand the impact of IT
service quality on the performance of supply chains. This paper will
start by analyzing the Supply Chain Operations Reference (SCOR)
model and each of its five activities: Plan, Source, Make, Delivery,
and Return. This article proposes a framework for analyzing Effect of
IT Service Quality on Supply Chain Performance. Using the
proposed framework, hypotheses are framed for the direct effect of IT
service quality on Supply Chain Performance and its indirect effect
through effective Supply Chain Management. The framework will be
validated empirically based on the surveys of executives of various
organizations and statistical analyses of the data collected.
Abstract: This paper presents a methodology towards the emulation of the electrical power consumption of the RF device during the cellular phone/handset transmission mode using the LTE technology. The emulation methodology takes the physical environmental variables and the logical interface between the baseband and the RF system as inputs to compute the emulated power dissipation of the RF device. The emulated power, in between the measured points corresponding to the discrete values of the logical interface parameters is computed as a polynomial interpolation using polynomial basis functions. The evaluation of polynomial and spline curve fitting models showed a respective divergence (test error) of 8% and 0.02% from the physically measured power consumption. The precisions of the instruments used for the physical measurements have been modeled as intervals. We have been able to model the power consumption of the RF device operating at 5MHz using homotopy between 2 continuous power consumptions of the RF device operating at the bandwidths 3MHz and 10MHz.
Abstract: In this paper, we have developed a method to
compute fractal dimension (FD) of discrete time signals, in the
time domain, by modifying the box-counting method. The size
of the box is dependent on the sampling frequency of the
signal. The number of boxes required to completely cover the
signal are obtained at multiple time resolutions. The time
resolutions are made coarse by decimating the signal. The loglog
plot of total number of boxes required to cover the curve
versus size of the box used appears to be a straight line, whose
slope is taken as an estimate of FD of the signal. The results
are provided to demonstrate the performance of the proposed
method using parametric fractal signals. The estimation
accuracy of the method is compared with that of Katz, Sevcik,
and Higuchi methods. In addition, some properties of the FD
are discussed.
Abstract: Personal name matching system is the core of
essential task in national citizen database, text and web mining,
information retrieval, online library system, e-commerce and record
linkage system. It has necessitated to the all embracing research in
the vicinity of name matching. Traditional name matching methods
are suitable for English and other Latin based language. Asian
languages which have no word boundary such as Myanmar language
still requires sounds alike matching system in Unicode based
application. Hence we proposed matching algorithm to get analogous
sounds alike (phonetic) pattern that is convenient for Myanmar
character spelling. According to the nature of Myanmar character, we
consider for word boundary fragmentation, collation of character.
Thus we use pattern conversion algorithm which fabricates words in
pattern with fragmented and collated. We create the Myanmar sounds
alike phonetic group to help in the phonetic matching. The
experimental results show that fragmentation accuracy in 99.32% and
processing time in 1.72 ms.
Abstract: We present a new approach to evaluation of Cyber Security in Power Systems using the method of modeling the power systems Infrastructure using software agents. Interfaces between module and the home smart meter are recognized as the primary points of intrusion.
Abstract: Many environment specific methods and systems for Robot Navigation exist. However vast strides in the evolution of navigation technologies and system techniques create the need for a general unified framework that is scalable, modular and dynamic. In this paper a Unified Framework for a Robust Conflict-free Robot Navigation System that can be used for either a structured or unstructured and indoor or outdoor environments has been proposed. The fundamental design aspects and implementation issues encountered during the development of the module are discussed. The results of the deployment of three major peripheral modules of the framework namely the GSM based communication module, GIS Module and GPS module are reported in this paper.
Abstract: The CMLP building was developed to be a model for
sustainability with strategies to reduce water, energy and pollution,
and to provide a healthy environment for the building occupants. The
aim of this paper is to investigate the environmental effects of energy
used by this building. A LCA (life cycle analysis) was led to measure
the real environmental effects produced by the use of energy. The
impact categories most affected by the energy use were found to be
the human health effects, as well as ecotoxicity. Natural gas
extraction, uranium milling for nuclear energy production, and the
blasting for mining and infrastructure construction are the processes
contributing the most to emissions in the human health effect. Data
comparing LCA results of CMLP building with a conventional
building results showed that energy used by the CMLP building has
less damage for the environment and human health than a
conventional building.
Abstract: The city of Melbourne in Victoria, Australia, provides a number of examples of how a growing city can integrate urban planning and water planning to achieve sustainable urban development, environmental protection, liveability and integrated water management outcomes, and move towards becoming a “Water Sensitive City". Three examples are provided - the development at Botanic Ridge, where a 318 hectare residential development is being planned and where integrated water management options are being implemented using a “triple bottom line" sustainability investment approach; the Toolern development, which will capture and reuse stormwater and recycled water to greatly reduce the suburb-s demand for potable water, and the development at Kalkallo where a 1,200 hectare industrial precinct development is planned which will merge design of the development's water supply, sewerage services and stormwater system. The Paper argues that an integrated urban planning and water planning approach is fundamental to creating liveable, vibrant communities which meet social and financial needs while being in harmony with the local environment. Further work is required on developing investment frameworks and risk analysis frameworks to ensure that all possible solutions can be assessed equally.
Abstract: In this paper a low cost knowledge base system (KBS)
framework is proposed for design of deep drawing die and procedure
for developing system modules. The task of building the system is
structured into different modules for major activities of design of
deep drawing die. A manufacturability assessment module of the
proposed framework is developed to check the manufacturability of
deep drawn parts. The technological knowledge is represented by
using IF- THEN rules and it is coded in AutoLISP language. The
module is designed to be loaded into the prompt area of AutoCAD.
The cost of implementation of proposed system makes it affordable
for small and medium scale sheet metal industries.
Abstract: e-mail has become an important means of electronic
communication but the viability of its usage is marred by Unsolicited
Bulk e-mail (UBE) messages. UBE consists of many types
like pornographic, virus infected and 'cry-for-help' messages as well
as fake and fraudulent offers for jobs, winnings and medicines. UBE
poses technical and socio-economic challenges to usage of e-mails.
To meet this challenge and combat this menace, we need to
understand UBE. Towards this end, the current paper presents a
content-based textual analysis of nearly 3000 winnings-announcing
UBE. Technically, this is an application of Text Parsing and
Tokenization for an un-structured textual document and we approach
it using Bag Of Words (BOW) and Vector Space Document Model
techniques. We have attempted to identify the most frequently
occurring lexis in the winnings-announcing UBE documents. The
analysis of such top 100 lexis is also presented. We exhibit the
relationship between occurrence of a word from the identified lexisset
in the given UBE and the probability that the given UBE will be
the one announcing fake winnings. To the best of our knowledge and
survey of related literature, this is the first formal attempt for
identification of most frequently occurring lexis in winningsannouncing
UBE by its textual analysis. Finally, this is a sincere
attempt to bring about alertness against and mitigate the threat of
such luring but fake UBE.
Abstract: Intelligent Video-Surveillance (IVS) systems are
being more and more popular in security applications. The analysis
and recognition of abnormal behaviours in a video sequence has
gradually drawn the attention in the field of IVS, since it allows
filtering out a large number of useless information, which guarantees
the high efficiency in the security protection, and save a lot of human
and material resources. We present in this paper ADABeV, an
intelligent video-surveillance framework for event recognition in
crowded scene to detect the abnormal human behaviour. This
framework is attended to be able to achieve real-time alarming,
reducing the lags in traditional monitoring systems. This architecture
proposal addresses four main challenges: behaviour understanding in
crowded scenes, hard lighting conditions, multiple input kinds of
sensors and contextual-based adaptability to recognize the active
context of the scene.
Abstract: This paper describes a methodology for remote
performance monitoring of retail refrigeration systems. The proposed
framework starts with monitoring of the whole refrigeration circuit
which allows detecting deviations from expected behavior caused by
various faults and degradations. The subsequent diagnostics methods
drill down deeper in the equipment hierarchy to more specifically
determine root causes. An important feature of the proposed concept
is that it does not require any additional sensors, and thus, the
performance monitoring solution can be deployed at a low
installation cost. Moreover only a minimum of contextual
information is required, which also substantially reduces time and
cost of the deployment process.
Abstract: A time-domain numerical model within the
framework of transmission line modeling (TLM) is developed to
simulate electromagnetic pulse propagation inside multiple
microcavities forming photonic crystal (PhC) structures. The model
developed is quite general and is capable of simulating complex
electromagnetic problems accurately. The field quantities can be
mapped onto a passive electrical circuit equivalent what ensures that
TLM is provably stable and conservative at a local level.
Furthermore, the circuit representation allows a high level of
hybridization of TLM with other techniques and lumped circuit
models of components and devices. A photonic crystal structure
formed by rods (or blocks) of high-permittivity dieletric material
embedded in a low-dielectric background medium is simulated as an
example. The model developed gives vital spatio-temporal
information about the signal, and also gives spectral information over
a wide frequency range in a single run. The model has wide
applications in microwave communication systems, optical
waveguides and electromagnetic materials simulations.
Abstract: Sustainable development is one of the most debated
issues, recently. In terms of providing more livable Earth continuity,
while Production activities are going on, on the other hand protecting
the environment has importance. As a strategy for sustainable
development, eco-innovation is the application of innovations to
reduce environmental burdens. Endeavors to understand ecoinnovation
processes have been affected from environmental
economics and innovation economics from neoclassical economics,
and evolutionary economics other than neoclassical economics. In
the light of case study analyses, this study aims to display activities
in this field through case studies after explaining the theoretical
framework of eco-innovations. This study consists of five sections
including introduction and conclusion. In the second part of the study
identifications of the concepts related with eco-innovation are
described and eco-innovations are classified. Third section considers
neoclassical and evolutionary approaches from neoclassical
economics and evolutionary economics, respectively. Fourth section
gives the case studies of successful eco-innovations. Last section is
the conclusion part and offers suggestions for future eco-innovation
research according to the theoretical framework and the case studies.
Abstract: Mobile Ad hoc networks (MANETs) are collections
of wireless mobile nodes dynamically reconfiguring and collectively
forming a temporary network. These types of networks assume
existence of no fixed infrastructure and are often useful in battle-field
tactical operations or emergency search-and-rescue type of
operations where fixed infrastructure is neither feasible nor practical.
They also find use in ad hoc conferences, campus networks and
commercial recreational applications carrying multimedia traffic. All
of the above applications of MANETs require guaranteed levels of
performance as experienced by the end-user. This paper focuses on
key challenges in provisioning predetermined levels of such Quality
of Service (QoS). It also identifies functional areas where QoS
models are currently defined and used. Evolving functional areas
where performance and QoS provisioning may be applied are also
identified and some suggestions are provided for further research in
this area. Although each of the above functional areas have been
discussed separately in recent research studies, since these QoS
functional areas are highly correlated and interdependent, a
comprehensive and comparative analysis of these areas and their
interrelationships is desired. In this paper we have attempted to
provide such an overview.
Abstract: Nowadays, HPC, Grid and Cloud systems are evolving
very rapidly. However, the development of infrastructure solutions
related to HPC is lagging behind. While the existing infrastructure is
sufficient for simple cases, many computational problems have more
complex requirements.Such computational experiments use different
resources simultaneously to start a large number of computational
jobs.These resources are heterogeneous. They have different
purposes, architectures, performance and used software.Users need a
convenient tool that allows to describe and to run complex
computational experiments under conditions of HPC environment.
This paper introduces a modularworkflow system called SEGL
which makes it possible to run complex computational experiments
under conditions of a real HPC organization. The system can be used
in a great number of organizations, which provide HPC power.
Significant requirements to this system are high efficiency and
interoperability with the existing HPC infrastructure of the
organization without any changes.
Abstract: Ad hoc networks are characterized by multi-hop
wireless connectivity and frequently changing network topology.
Forming security association among a group of nodes in ad-hoc
networks is more challenging than in conventional networks due to the
lack of central authority, i.e. fixed infrastructure. With that view in
mind, group key management plays an important building block of
any secure group communication. The main contribution of this paper
is a low complexity key management scheme that is suitable for fully
self-organized ad-hoc networks. The protocol is also password
authenticated, making it resilient against active attacks. Unlike other
existing key agreement protocols, ours make no assumption about the
structure of the underlying wireless network, making it suitable for
“truly ad-hoc" networks. Finally, we will analyze our protocol to show
the computation and communication burden on individual nodes for
key establishment.