Abstract: This paper presents a model for the evaluation of
energy performance and aerodynamic forces acting on a three-bladed
small vertical axis Darrieus wind turbine depending on blade chord
curvature with respect to rotor axis.
The adopted survey methodology is based on an analytical code
coupled to a solid modeling software, capable of generating the
desired blade geometry depending on the blade design geometric
parameters, which is linked to a finite volume CFD code for the
calculation of rotor performance.
After describing and validating the model with experimental data,
the results of numerical simulations are proposed on the bases of two
different blade profile architectures, which are respectively
characterized by a straight chord and by a curved one, having a chord
radius equal to rotor external circumference. A CFD campaign of
analysis is completed for three blade-candidate airfoil sections, that is
the recently-developed DU 06-W-200 cambered blade profile, a
classical symmetrical NACA 0021 and its derived cambered airfoil,
characterized by a curved chord, having a chord radius equal to rotor
external circumference.
The effects of blade chord curvature on angle of attack, blade
tangential and normal forces are first investigated and then the
overall rotor torque and power are analyzed as a function of blade
azimuthal position, achieving a numerical quantification of the
influence of blade camber on overall rotor performance.
Abstract: L-system is a tool commonly used for modeling and simulating the growth of fractal plants. The aim of this paper is to join some problems of the computational geometry with the fractal geometry by using the L-system technique to generate fractal plant in 3D. L-system constructs the fractal structure by applying rewriting rules sequentially and this technique depends on recursion process with large number of iterations to get different shapes of 3D fractal plants. Instead, it was reiterated a specific number of iterations up to three iterations. The vertices generated from the last stage of the Lsystem rewriting process are used as input to the triangulation algorithm to construct the triangulation shape of these vertices. The resulting shapes can be used as covers for the architectural objects and in different computer graphics fields. The paper presents a gallery of triangulation forms which application in architecture creates an alternative for domes and other traditional types of roofs.
Abstract: Y chromosome microdeletions are the most common
genetic cause of male infertility and screening for these
microdeletions in azoospermic or severely oligospermic men is now
standard practice. Analysis of the Y chromosome in men with
azoospermia or severe oligozoospermia has resulted in the
identification of three regions in the euchromatic part of the long arm
of the human Y chromosome (Yq11) that are frequently deleted in
men with otherwise unexplained spermatogenic failure. PCR analysis
of microdeletions in the AZFa, AZFb and AZFc regions of the
human Y chromosome is an important screening tool. The aim of this
study was to analyse the type of microdeletions in men with fertility
disorders in Slovakia. We evaluated 227 patients with azoospermia
and with normal karyotype. All patient samples were analyzed
cytogenetically. For PCR amplification of sequence-tagged sites
(STS) of the AZFa, AZFb and AZFc regions of the Y chromosome
was used Devyser AZF set. Fluorescently labeled primers for all
markers in one multiplex PCR reaction were used and for automated
visualization and identification of the STS markers we used genetic
analyzer ABi 3500xl (Life Technologies). We reported 13 cases of
deletions in the AZF region 5,73%. Particular types of deletions were
recorded in each region AZFa,b,c .The presence of microdeletions in
the AZFc region was the most frequent. The study confirmed that
percentage of microdeletions in the AZF region is low in Slovak
azoospermic patients, but important from a prognostic view.
Abstract: Groundlessness of application probability-statistic methods are especially shown at an early stage of the aviation GTE technical condition diagnosing, when the volume of the information has property of the fuzzy, limitations, uncertainty and efficiency of application of new technology Soft computing at these diagnosing stages by using the fuzzy logic and neural networks methods. It is made training with high accuracy of multiple linear and nonlinear models (the regression equations) received on the statistical fuzzy data basis. At the information sufficiency it is offered to use recurrent algorithm of aviation GTE technical condition identification on measurements of input and output parameters of the multiple linear and nonlinear generalized models at presence of noise measured (the new recursive least squares method (LSM)). As application of the given technique the estimation of the new operating aviation engine D30KU-154 technical condition at height H=10600 m was made.
Abstract: Mining tailings represent a generating source of rich heavy metal material with a potential danger the public health and the environment, since these metals, under certain conditions, can leach and contaminate aqueous systems that serve like supplying potable water sources. The strategy for this work is based on the observation, experimentation and the simulation that can be obtained by binding real answers of the hydrodynamic behavior of metals leached from mining tailings, and the applied mathematics that provides the logical structure to decipher the individual effects of the general physicochemical phenomenon. The case of study presented herein focuses on mining tailings deposits located in Monte San Nicolas, Guanajuato, Mexico, an abandoned mine. This was considered the contamination source that under certain physicochemical conditions can favor the metal leaching, and its transport towards aqueous systems. In addition, the cartography, meteorology, geology and the hydrodynamics and hydrological characteristics of the place, will be helpful in determining the way and the time in which these systems can interact. Preliminary results demonstrated that arsenic presents a great mobility, since this one was identified in several superficial aqueous systems of the micro watershed, as well as in sediments in concentrations that exceed the established maximum limits in the official norms. Also variations in pH and potential oxide-reduction were registered, conditions that favor the presence of different species from this element its solubility and therefore its mobility.
Abstract: This paper describes a method to measure and
compensate a 4 axes ultra-precision machine tool that generates micro
patterns on the large surfaces. The grooving machine is usually used
for making a micro mold for many electrical parts such as a light guide
plate for LCD and fuel cells. The ultra precision machine tool has three
linear axes and one rotational table. Shaping is usually used to
generate micro patterns. In the case of 50 μm pitch and 25 μm height
pyramid pattern machining with a 90° wedge angle bite, one of linear
axis is used for long stroke motion for high cutting speed and other
linear axis are used for feeding. The triangular patterns can be
generated with many times of long stroke of one axis. Then 90°
rotation of work piece is needed to make pyramid patterns with
superposition of machined two triangular patterns.
To make a two dimensional positioning error, straightness of two
axes in out of plane, squareness between the each axis are important.
Positioning errors, straightness and squarness were measured by laser
interferometer system. Those were compensated and confirmed by
ISO230-6. One of difficult problem to measure the error motions is
squareness or parallelism of axis between the rotational table and
linear axis. It was investigated by simultaneous moving of rotary table
and XY axes. This compensation method is introduced in this paper.
Abstract: Elliptic curve-based certificateless signature is slowly
gaining attention due to its ability to retain the efficiency of
identity-based signature to eliminate the need of certificate
management while it does not suffer from inherent private
key escrow problem. Generally, cryptosystem based on elliptic
curve offers equivalent security strength at smaller key sizes
compared to conventional cryptosystem such as RSA which
results in faster computations and efficient use of computing
power, bandwidth, and storage. This paper proposes to implement
certificateless signature based on bilinear pairing to
structure the framework of IKE authentication. In this paper,
we perform a comparative analysis of certificateless signature
scheme with a well-known RSA scheme and also present the
experimental results in the context of signing and verification
execution times. By generalizing our observations, we discuss the
different trade-offs involved in implementing IKE authentication
by using certificateless signature.
Abstract: The mixed oxide nuclear fuel (MOX) of U and Pu contains several percent of fission products and minor actinides, such as neptunium, americium and curium. It is important to determine accurately the decay heat from Curium isotopes as they contribute significantly in the MOX fuel. This heat generation can cause samples to melt very quickly if excessive quantities of curium are present. In the present paper, we introduce a new approach that can predict the decay heat from curium isotopes. This work is a part of the project funded by King Abdulaziz City of Science and Technology (KASCT), Long-Term Comprehensive National Plan for Science, Technology and Innovations, and take place in King Abdulaziz University (KAU), Saudi Arabia. The approach is based on the numerical solution of coupled linear differential equations that describe decays and buildups of many nuclides to calculate the decay heat produced after shutdown. Results show the consistency and reliability of the approach applied.
Abstract: In this paper dynamics of a vapour bubble generated
due to a local energy input inside a vertical rigid cylinder and in the
absence of buoyancy forces is investigated. Different ratios of the
diameter of the rigid cylinder to the maximum radius of the bubble
are considered. The Boundary Integral Equation Method is employed
for numerical simulation of the problem. Results show that during
the collapse phase of the bubble inside a vertical rigid cylinder, two
liquid micro jets are developed on the top and bottom sides of the
vapour bubble and are directed inward. Results also show that
existence of a deposit rib inside the vertical rigid cylinder slightly
increases the life time of the bubble. It is found that by increasing the
ratio of the cylinder diameter to the maximum radius of the bubble,
the rate of the growth and collapse phases of the bubble increases
and the life time of the bubble decreases.
Abstract: The problem of robust disturbance rejection (RDR) using a proportional state feedback controller is studied for the case of Left Invertible MIMO generalized state space linear systems with nonlinear uncertain structure. Sufficient conditions for the problem to have a solution are established. The set of all proportional feedback controllers solving the problem subject to these conditions is analytically determined.
Abstract: This paper proposes a new technique for improving
the efficiency of software testing, which is based on a conventional
attempt to reduce test cases that have to be tested for any given
software. The approach utilizes the advantage of Regression Testing
where fewer test cases would lessen time consumption of the testing
as a whole. The technique also offers a means to perform test case
generation automatically. Compared to one of the techniques in the
literature where the tester has no option but to perform the test case
generation manually, the proposed technique provides a better
option. As for the test cases reduction, the technique uses simple
algebraic conditions to assign fixed values to variables (Maximum,
minimum and constant variables). By doing this, the variables values
would be limited within a definite range, resulting in fewer numbers
of possible test cases to process. The technique can also be used in
program loops and arrays.
Abstract: A study on the performance of TCP Vegas versus
different TCP variants in homogeneous and heterogeneous wired
networks are performed via simulation experiment using network
simulator (ns-2). This performance evaluation prepared a comparison
medium for the performance evaluation of enhanced-TCP Vegas in
wired network and for wireless network. In homogeneous network,
the performance of TCP Tahoe, TCP Reno, TCP NewReno, TCP
Vegas and TCP SACK are analyzed. In heterogeneous network, the
performances of TCP Vegas against TCP variants are analyzed. TCP
Vegas outperforms other TCP variants in homogeneous wired
network. However, TCP Vegas achieves unfair throughput in
heterogeneous wired network.
Abstract: The purpose of study is to demonstrate how the characteristics of technology and the process required for development of technology affect technology transfer from public organisations to industry on the technology level. In addition, using the advantage of the analytic level and the novel means of measuring technology convergence, we examine the characteristics of converging technologies as compared to non-converging technologies in technology transfer process. In sum, our study finds that a technology from the public sector is likely to be transferred when its readiness level is closer to generation of profit, when its stage of life cycle is early and when its economic values is high. Our findings also show that converging technologies are less likely to be transferred.
Abstract: In this paper, an image adaptive, invisible digital
watermarking algorithm with Orthogonal Polynomials based
Transformation (OPT) is proposed, for copyright protection of digital
images. The proposed algorithm utilizes a visual model to determine
the watermarking strength necessary to invisibly embed the
watermark in the mid frequency AC coefficients of the cover image,
chosen with a secret key. The visual model is designed to generate a
Just Noticeable Distortion mask (JND) by analyzing the low level
image characteristics such as textures, edges and luminance of the
cover image in the orthogonal polynomials based transformation
domain. Since the secret key is required for both embedding and
extraction of watermark, it is not possible for an unauthorized user to
extract the embedded watermark. The proposed scheme is robust to
common image processing distortions like filtering, JPEG
compression and additive noise. Experimental results show that the
quality of OPT domain watermarked images is better than its DCT
counterpart.
Abstract: In this paper, we are presenting a new type of pointing interface for computers which provides mouse functionalities with near surface haptic feedback. Further, it can be configured as a haptic display where users may feel the basic geometrical shapes in the GUI by moving the finger on top of the device surface. These functionalities are achieved by tracking three dimensional positions of the neodymium magnet using Hall Effect sensors grid and generating like polarity haptic feedback using an electromagnet array. This interface brings the haptic sensations to the 3D space where previously it is felt only on top of the buttons of the haptic mouse implementations.
Abstract: In this paper we investigate the influence of external
noise on the inference of network structures. The purpose of our
simulations is to gain insights in the experimental design of microarray
experiments to infer, e.g., transcription regulatory networks
from microarray experiments. Here external noise means, that the
dynamics of the system under investigation, e.g., temporal changes of
mRNA concentration, is affected by measurement errors. Additionally
to external noise another problem occurs in the context of microarray
experiments. Practically, it is not possible to monitor the mRNA
concentration over an arbitrary long time period as demanded by the
statistical methods used to learn the underlying network structure. For
this reason, we use only short time series to make our simulations
more biologically plausible.
Abstract: Islamic banking is one the most blossoming doctrine in
economic system of the world. The Fast growing awareness about
Islamic financial system has brought strong feeling to Muslims to
confront the western interest-based economic cycle. The Islamic
economic system is emerging as a reliable alternative to the interest
based system. This study is proposed to ascertain the motivational
factors encouraging people to go for Islamic banking in Pakistan.
These pulsing factors are determined by generation of hypothesis that
there are certain factors which are urging people to opt Islamic
banking system and to see the differences in their ranking by applying
Friedman test. These factors include: Economically derived factors
such as stability of Islamic banks in crisis, profit and loss sharing
doctrine and equity sharing etc. This study also highlights the
religiously derived factors such as interest free banking, Shariah
tenets and supervisory of Islamic Shariah board and sociopsychological
factors.
Abstract: Routing security is a major concerned in Wireless
Sensor Network since a large scale of unattended nodes is deployed
in ad hoc fashion with no possibility of a global addressing due to a
limitation of node-s memory and the node have to be self organizing
when the systems require a connection with the other nodes. It
becomes more challenging when the nodes have to act as the router
and tightly constrained on energy and computational capabilities
where any existing security mechanisms are not allowed to be fitted
directly. These reasons thus increasing vulnerabilities to the network
layer particularly and to the whole network, generally. In this paper,
a Dynamic Window Secured Implicit Geographic Forwarding
(DWSIGF) routing is presented where a dynamic time is used for
collection window to collect Clear to Send (CTS) control packet in
order to find an appropriate hoping node. The DWIGF is expected to
minimize a chance to select an attacker as the hoping node that
caused by a blackhole attack that happen because of the CTS rushing
attack, which promise a good network performance with high packet
delivery ratios.
Abstract: In this paper a hybrid technique of Genetic Algorithm
and Simulated Annealing (HGASA) is applied for Fractal Image
Compression (FIC). With the help of this hybrid evolutionary
algorithm effort is made to reduce the search complexity of matching
between range block and domain block. The concept of Simulated
Annealing (SA) is incorporated into Genetic Algorithm (GA) in order
to avoid pre-mature convergence of the strings. One of the image
compression techniques in the spatial domain is Fractal Image
Compression but the main drawback of FIC is that it involves more
computational time due to global search. In order to improve the
computational time along with acceptable quality of the decoded
image, HGASA technique has been proposed. Experimental results
show that the proposed HGASA is a better method than GA in terms
of PSNR for Fractal image Compression.
Abstract: In this paper, a numerical study has been made to
analyze the transient 2-D flows of a viscous incompressible fluid
through channels with forward or backward constriction. Problems
addressed include flow through sudden contraction and sudden
expansion channel geometries with rounded and increasingly sharp
reentrant corner. In both the cases, numerical results are presented for
the separation and reattachment points, streamlines, vorticity and
flow patterns. A fourth order accurate compact scheme has been
employed to efficiently capture steady state solutions of the
governing equations. It appears from our study that sharpness of the
throat in the channel is one of the important parameters to control the
strength and size of the separation zone without modifying the
general flow patterns. The comparison between the two cases shows
that the upstream geometry plays a significant role on vortex growth
dynamics.