Abstract: The residue number system (RNS) is popular in high performance computation applications because of its carry-free nature. The challenges of RNS systems design lie in the moduli set selection and in the reverse conversion from residue representation to weighted representation. In this paper, we proposed a fully parallel reverse conversion algorithm for the moduli set {rn - 2, rn - 1, rn}, based on simple mathematical relationships. Also an efficient hardware realization of this algorithm is presented. Our proposed converter is very faster and results to hardware savings, compared to the other reverse converters.
Abstract: This paper presents a simple three phase power flow
method for solution of three-phase unbalanced radial distribution
system (RDN) with voltage dependent loads. It solves a simple
algebraic recursive expression of voltage magnitude, and all the data
are stored in vector form. The algorithm uses basic principles of
circuit theory and can be easily understood. Mutual coupling between
the phases has been included in the mathematical model. The
proposed algorithm has been tested with several unbalanced radial
distribution networks and the results are presented in the article. 8-
bus and IEEE 13 bus unbalanced radial distribution system results
are in agreements with the literature and show that the proposed
model is valid and reliable.
Abstract: The purpose of the study is to determine secondary prospective mathematics teachers- views related to using flash animations in mathematics lessons and to reveal how the sample presentations towards different mathematical concepts altered their views. This is a case study involving three secondary prospective mathematics teachers from a state university in Turkey. The data gathered from two semi-structural interviews. Findings revealed that these animations help understand mathematics meaningfully, relate mathematics and real world, visualization, and comprehend the importance of mathematics. The analysis of the data indicated that the sample presentations enhanced participants- views about using flash animations in mathematics lessons.
Abstract: To derive the fractional flow equation oil
displacement will be assumed to take place under the so-called
diffusive flow condition. The constraints are that fluid saturations at
any point in the linear displacement path are uniformly distributed
with respect to thickness; this allows the displacement to be described
mathematically in one dimension. The simultaneous flow of oil and
water can be modeled using thickness averaged relative permeability,
along the centerline of the reservoir. The condition for fluid potential
equilibrium is simply that of hydrostatic equilibrium for which the
saturation distribution can be determined as a function of capillary
pressure and therefore, height. That is the fluids are distributed in
accordance with capillary-gravity equilibrium.
This paper focused on the fraction flow of water versus
cumulative oil recoveries using Buckley Leverett method. Several
field cases have been developed to aid in analysis. Producing watercut
(at surface conditions) will be compared with the cumulative oil
recovery at breakthrough for the flowing fluid.
Abstract: The central recirculation zone (CRZ) in a swirl
stabilized gas turbine combustor has a dominant effect on the fuel air
mixing process and flame stability. Most of state of the art swirlers
share one disadvantage; the fixed swirl number for the same swirler
configuration. Thus, in a mathematical sense, Reynolds number
becomes the sole parameter for controlling the flow characteristics
inside the combustor. As a result, at low load operation, the
generated swirl is more likely to become feeble affecting the flame
stabilization and mixing process. This paper introduces a new swirler
concept which overcomes the mentioned weakness of the modern
configurations. The new swirler introduces air tangentially and
axially to the combustor through tangential vanes and an axial vanes
respectively. Therefore, it provides different swirl numbers for the
same configuration by regulating the ratio between the axial and
tangential flow momenta. The swirler aerodynamic performance was
investigated using four CFD simulations in order to demonstrate the
impact of tangential to axial flow rate ratio on the CRZ. It was found
that the length of the CRZ is directly proportional to the tangential to
axial air flow rate ratio.
Abstract: This work presents a methodology for the selection
and design of propeller oriented to the experimental verification of
theoretical results. The problem of propeller selection and design
usually present itself in the following manner: a certain air volume
and static pressure are required for a certain system. Once the
necessity of fan design on a theoretical basis has been recognized, it
is possible to determinate the dimensions for a fan unit so that it will
perform in accordance with a certain set of specifications. The same
procedures in this work then can be applied in other propeller
selection.
Abstract: This paper investigates the encryption efficiency of RC6 block cipher application to digital images, providing a new mathematical measure for encryption efficiency, which we will call the encryption quality instead of visual inspection, The encryption quality of RC6 block cipher is investigated among its several design parameters such as word size, number of rounds, and secret key length and the optimal choices for the best values of such design parameters are given. Also, the security analysis of RC6 block cipher for digital images is investigated from strict cryptographic viewpoint. The security estimations of RC6 block cipher for digital images against brute-force, statistical, and differential attacks are explored. Experiments are made to test the security of RC6 block cipher for digital images against all aforementioned types of attacks. Experiments and results verify and prove that RC6 block cipher is highly secure for real-time image encryption from cryptographic viewpoint. Thorough experimental tests are carried out with detailed analysis, demonstrating the high security of RC6 block cipher algorithm. So, RC6 block cipher can be considered to be a real-time secure symmetric encryption for digital images.
Abstract: Contact stress is an important problem in industry.
This is a problem that in the first attention may be don-t appears, but
disregard of these stresses cause a lot of damages in machines. These
stresses occur at locations such as gear teeth, bearings, cams and
between a locomotive wheel and the railroad rail. These stresses
cause failure by excessive elastic deformation, yielding and fracture.
In this paper we intend show the effective parameters in contact
stress and ponder effect of curvature. In this paper we study contact
stresses on the surface of gear teeth and compare these stresses for
four popular profiles of gear teeth (involute, cycloid, epicycloids, and
hypocycloid). We study this problem with mathematical and finite
element methods and compare these two methods on different profile
surfaces.
Abstract: This paper provides an overview of auction theory literature. We present a general review on literature of various auctions and focus ourselves specifically on an English auction. We are interested in modelling bidder's behavior in an English auction environment. And hence, we present an overview of the New Zealand wool auction followed by a model that would describe a bidder's decision making behavior from the New Zealand wool auction. The mathematical assumptions in an English auction environment are demonstrated from the perspective of the New Zealand wool auction.
Abstract: This article is presented an experimental and modeling
study of a four-bed pressure swing adsorption process using
zeolite13X to provide oxygen-enriched air. The binary mixture N2/O2
(79/21 vol %) was used as a feed stream. The effects of purge/feed
ratio (P/F), adsorption pressure, cyclic time and product flow rate on
product purity and recovery under nonisothermal condition were
studied. The adsorption dynamics of process were determined using
a mathematical model incorporated mass and energy balances. A
Mathlab code using finite difference method was developed to solve
the set of coupled differential-algebraic equations, and the simulation
results are agreed well with experimental results.
Abstract: The radius-of-curvature (ROC) defines the degree of
curvature along the centerline of a roadway whereby a travelling
vehicle must follow. Roadway designs must encompass ROC in
mitigating the cost of earthwork associated with construction while
also allowing vehicles to travel at maximum allowable design speeds.
Thus, a road will tend to follow natural topography where possible,
but curvature must also be optimized to permit fast, but safe vehicle
speeds. The more severe the curvature of the road, the slower the
permissible vehicle speed. For route planning, whether for urban
settings, emergency operations, or even parcel delivery, ROC is a
necessary attribute of road arcs for computing travel time.
It is extremely rare for a geo-spatial database to contain ROC. This
paper will present a procedure and mathematical algorithm to
calculate and assign ROC to a segment pair and/or polyline.
Abstract: The research was designed to examine the relationship
between the development of muscle fatigue and the effect it has on
sport performance, specifically during maximal voluntary
contraction. This kind of this investigation using simultaneous
electrophysiological and mechanical recordings, based on advanced
mathematical processing, allows us to get parameters, and indexes in
a short time, and finally, the mapping to use for the thorough
investigation of the muscle contraction force, respectively the
phenomenon of local muscle fatigue, both for athletes and other
subjects.
Abstract: We used mathematical model to study the
transmission of dengue disease. The model is developed in which
the human population is separated into two populations, pregnant and
non-pregnant humans. The dynamical analysis method is used for
analyzing this modified model. Two equilibrium states are found and
the conditions for stability of theses two equilibrium states are
established. Numerical results are shown for each equilibrium state.
The basic reproduction numbers are found and they are compared by
using numerical simulations.
Abstract: An optimal control strategy based on simple model, a
single phase unity power factor boost converter is presented with an
evaluation of first order differential equations. This paper presents an
evaluation of single phase boost converter having power factor
correction. The simple discrete model of boost converter is formed
and optimal control is obtained, digital PI is adopted to adjust control
error. The method of instantaneous current control is proposed in this
paper for its good tracking performance of dynamic response. The
simulation and experimental results verified our design.
Abstract: The technique of k-anonymization has been proposed to obfuscate private data through associating it with at least k identities. This paper investigates the basic tabular structures that
underline the notion of k-anonymization using cell suppression.
These structures are studied under idealized conditions to identify the
essential features of the k-anonymization notion. We optimize data kanonymization
through requiring a minimum number of anonymized
values that are balanced over all columns and rows. We study the
relationship between the sizes of the anonymized tables, the value k, and the number of attributes. This study has a theoretical value through contributing to develop a mathematical foundation of the kanonymization
concept. Its practical significance is still to be
investigated.
Abstract: Due to the constant increase in the volume of information available to applications in fields varying from medical diagnosis to web search engines, accurate support of similarity becomes an important task. This is also the case of spam filtering techniques where the similarities between the known and incoming messages are the fundaments of making the spam/not spam decision. We present a novel approach to filtering based solely on layout, whose goal is not only to correctly identify spam, but also warn about major emerging threats. We propose a mathematical formulation of the email message layout and based on it we elaborate an algorithm to separate different types of emails and find the new, numerically relevant spam types.
Abstract: In this study, the performance of a high-frequency arc
welding machine including a two-switch inverter is analyzed. The
control of the system is achieved using two different control
techniques i- fuzzy logic control (FLC) ii- state space averaging
based sliding control. Fuzzy logic control does not need accurate
mathematical model of a plant and can be used in nonlinear
applications. The second method needs the mathematical model of
the system. In this method the state space equations of the system are
derived for two different “on" and “off" states of the switches. The
derived state equations are combined with the sliding control rule
considering the duty-cycle of the converter. The performance of the
system is analyzed by simulating the system using SIMULINK tool
box of MATLAB. The simulation results show that fuzzy logic
controller is more robust and less sensitive to parameter variations.
Abstract: The purpose of this paper is to present the design and
instrumentation of a new benchmark multivariable nonlinear control
laboratory. The mathematical model of this system may be used to
test the applicability and performance of various nonlinear control
procedures. The system is a two degree-of-freedom robotic arm with
soft and hard (discontinuous) nonlinear terms. Two novel
mechanisms are designed to allow the implementation of adjustable
Coulomb friction and backlash.
Abstract: Nowadays the devices of night vision are widely used both for military and civil applications. The variety of night vision applications require a variety of the night vision devices designs. A web-based architecture of a software system for design assessment before producing of night vision devices is developed. The proposed architecture of the web-based system is based on the application of a mathematical model for designing of night vision devices. An algorithm with two components – for iterative design and for intelligent design is developed and integrated into system architecture. The iterative component suggests compatible modules combinations to choose from. The intelligent component provides compatible combinations of modules satisfying given user requirements to device parameters. The proposed web-based architecture of a system for design assessment of night vision devices is tested via a prototype of the system. The testing showed the applicability of both iterative and intelligent components of algorithm.
Abstract: Electronic banking must be secure and easy to use and
many banks heavily advertise an apparent of 100% secure system
which is contestable in many points. In this work, an alternative
approach to the design of e-banking system, through a new solution
for user authentication and security with digital certificate called
LumaCert is introduced. The certificate applies new algorithm for
asymmetric encryption by utilizing two mathematical operators
called Pentors and UltraPentors. The public and private key in this
algorithm represent a quadruple of parameters which are directly
dependent from the above mentioned operators. The strength of the
algorithm resides in the inability to find the respective Pentor and
UltraPentor operator from the mentioned parameters.