Abstract: Air conditioning is mainly to be used as human
comfort medium. It has been use more often in country in which the
daily temperatures are high. In scientific, air conditioning is defined
as a process of controlling the moisture, cooling, heating and cleaning
air. Without proper estimation of cooling load, big amount of waste
energy been used because of unsuitable of air conditioning system are
not considering to overcoming heat gains from surrounding. This is
due to the size of the room is too big and the air conditioning has to
use more energy to cool the room and the air conditioning is too
small for the room. The studies are basically to develop a program to
calculate cooling load. Through this study it is easy to calculate
cooling load estimation. Furthermore it-s help to compare the cooling
load estimation by hourly and yearly. Base on the last study that been
done, the developed software are not user-friendly. For individual
without proper knowledge of calculating cooling load estimation
might be problem. Easy excess and user-friendly should be the main
objective to design something. This program will allow cooling load
able be estimate by any users rather than estimation by using rule of
thumb. Several of limitation of case study is judged to sure it-s
meeting to Malaysia building specification. Finally validation is done
by comparison manual calculation and by developed program.
Abstract: The fundamental aim of extended expansion concept is
to achieve higher work done which in turn leads to higher thermal
efficiency. This concept is compatible with the application of
turbocharger and LHR engine. The Low Heat Rejection engine was
developed by coating the piston crown, cylinder head inside with
valves and cylinder liner with partially stabilized zirconia coating of
0.5 mm thickness. Extended expansion in diesel engines is termed as
Miller cycle in which the expansion ratio is increased by reducing the
compression ratio by modifying the inlet cam for late inlet valve
closing. The specific fuel consumption reduces to an appreciable level
and the thermal efficiency of the extended expansion turbocharged
LHR engine is improved.
In this work, a thermodynamic model was formulated and
developed to simulate the LHR based extended expansion
turbocharged direct injection diesel engine. It includes a gas flow
model, a heat transfer model, and a two zone combustion model. Gas
exchange model is modified by incorporating the Miller cycle, by
delaying inlet valve closing timing which had resulted in considerable
improvement in thermal efficiency of turbocharged LHR engines. The
heat transfer model, calculates the convective and radiative heat
transfer between the gas and wall by taking into account of the
combustion chamber surface temperature swings. Using the two-zone
combustion model, the combustion parameters and the chemical
equilibrium compositions were determined. The chemical equilibrium
compositions were used to calculate the Nitric oxide formation rate by
assuming a modified Zeldovich mechanism. The accuracy of this
model is scrutinized against actual test results from the engine. The
factors which affect thermal efficiency and exhaust emissions were
deduced and their influences were discussed. In the final analysis it is
seen that there is an excellent agreement in all of these evaluations.
Abstract: Steganography meaning covered writing. Steganography includes the concealment of information within computer files [1]. In other words, it is the Secret communication by hiding the existence of message. In this paper, we will refer to cover image, to indicate the images that do not yet contain a secret message, while we will refer to stego images, to indicate an image with an embedded secret message. Moreover, we will refer to the secret message as stego-message or hidden message. In this paper, we proposed a technique called RGB intensity based steganography model as RGB model is the technique used in this field to hide the data. The methods used here are based on the manipulation of the least significant bits of pixel values [3][4] or the rearrangement of colors to create least significant bit or parity bit patterns, which correspond to the message being hidden. The proposed technique attempts to overcome the problem of the sequential fashion and the use of stego-key to select the pixels.
Abstract: In this article the homotopy continuation method (HCM) to solve the forward kinematic problem of the 3-PRS parallel manipulator is used. Since there are many difficulties in solving the system of nonlinear equations in kinematics of manipulators, the numerical solutions like Newton-Raphson are inevitably used. When dealing with any numerical solution, there are two troublesome problems. One is that good initial guesses are not easy to detect and another is related to whether the used method will converge to useful solutions. Results of this paper reveal that the homotopy continuation method can alleviate the drawbacks of traditional numerical techniques.
Abstract: In this era of technology, fueled by the pervasive usage of the internet, security is a prime concern. The number of new attacks by the so-called “bots", which are automated programs, is increasing at an alarming rate. They are most likely to attack online registration systems. Technology, called “CAPTCHA" (Completely Automated Public Turing test to tell Computers and Humans Apart) do exist, which can differentiate between automated programs and humans and prevent replay attacks. Traditionally CAPTCHA-s have been implemented with the challenge involved in recognizing textual images and reproducing the same. We propose an approach where the visual challenge has to be read out from which randomly selected keywords are used to verify the correctness of spoken text and in turn detect the presence of human. This is supplemented with a speaker recognition system which can identify the speaker also. Thus, this framework fulfills both the objectives – it can determine whether the user is a human or not and if it is a human, it can verify its identity.
Abstract: Now a days, a significant part of commercial and governmental organisations like museums, cultural organizations, libraries, commercial enterprises, etc. invest intensively in new technologies for image digitization, digital libraries, image archiving and retrieval. Hence image authorization, authentication and security has become prime need. In this paper, we present a semi-fragile watermarking scheme for color images. The method converts the host image into YIQ color space followed by application of orthogonal dual domains of DCT and DWT transforms. The DCT helps to separate relevant from irrelevant image content to generate silent image features. DWT has excellent spatial localisation to help aid in spatial tamper characterisation. Thus image adaptive watermark is generated based of image features which allows the sharp detection of microscopic changes to locate modifications in the image. Further, the scheme utilises the multipurpose watermark consisting of soft authenticator watermark and chrominance watermark. Which has been proved fragile to some predefined processing like intentinal fabrication of the image or forgery and robust to other incidental attacks caused in the communication channel.
Abstract: the reliability analysis of the medical equipments can
help to increase the availability and the efficiency of the systems. In
this manuscript we present a simple method of decomposition that
could be easily applied on the complex medical systems. Using this
method we can easily calculate the effect of the subsystems or
components on the reliability of the overall system. Furthermore, to
investigate the effect of subsystems or components on system
performance, we perform a numerical study varying every time the
worst reliability of subsystem or component with another which has
higher reliability. It can also be useful to engineers and designers of
medical equipment, who wishes to optimize the complex systems.
Abstract: In this paper, an intelligent automatic parking control method is proposed. First, the dynamical equation of the rear parking control is derived. Then a fuzzy logic control is proposed to perform the parking planning process. Further, a rear neural network is proposed for the steering control. Through the simulations and experiments, the intelligent auto-parking mode controllers have been shown to achieve the demanded goals with satisfactory control performance and to guarantee the system robustness under parametric variations and external disturbances. To improve some shortcomings and limitations in conventional parking mode control and further to reduce consumption time and prime cost.
Abstract: In this paper we consider a nonlinear feedback control
called augmented automatic choosing control (AACC) for nonlinear
systems with constrained input using weighted gradient optimization
automatic choosing functions. Constant term which arises from
linearization of a given nonlinear system is treated as a coefficient of
a stable zero dynamics. Parameters of the control are suboptimally
selected by maximizing the stable region in the sense of Lyapunov
with the aid of a genetic algorithm. This approach is applied to a
field excitation control problem of power system to demonstrate the
splendidness of the AACC. Simulation results show that the new
controller can improve performance remarkably well.
Abstract: Our study is concerned with the development of an Emergency Medical Services (EMS) ambulance location and allocation model called the Time-based Ambulance Zoning Optimization Model (TAZ_OPT). This paper presents the framework of the study. The model is formulated using the goal programming (GP), where the goals are to determine the satellite locations of ambulances and the number of ambulances to be allocated at these locations. The model aims at maximizing the expected demand coverage based on probability of reaching the emergency location within targetted time, and minimizing the ambulance busyness likelihood value. Among the benefits of the model is the increased accessibility and availability of ambulances, thus, enhanced quality of the EMS ambulance services.
Abstract: In this paper challenges associated with a new
generation of Computer Science students are examined. The mode of
education in tertiary institutes has progressed slowly while the needs
of students have changed rapidly in an increasingly technological
world. The major learning paradigms and learning theories within
these paradigms are studied to find a suitable strategy for educating
modern students. These paradigms include Behaviourism,
Constructivism, Humanism and Cogntivism. Social Learning theory
and Elaboration theory are two theories that are further examined and
a survey is done to determine how these strategies will be received by
students. The results and findings are evaluated and indicate that
students are fairly receptive to a method that incorporates both Social
Learning theory and Elaboration theory, but that some aspects of all
paradigms need to be implemented to create a balanced and effective
strategy with technology as foundation.
Abstract: Researchers have been applying artificial/ computational intelligence (AI/CI) methods to computer games. In this research field, further researchesare required to compare AI/CI methods with respect to each game application. In thispaper, we report our experimental result on the comparison of evolution strategy, genetic algorithm and their hybrids, applied to evolving controller agents for MarioAI. GA revealed its advantage in our experiment, whereas the expected ability of ES in exploiting (fine-tuning) solutions was not clearly observed. The blend crossover operator and the mutation operator of GA might contribute well to explore the vast search space.
Abstract: International competitiveness receives much attention
nowadays, but up to now its assessment has been heavily based on
manufacturing industry statistics. This paper addresses the need for
competitiveness indicators that cover the service sector and sets out a
multilevel framework for measuring international services trade
competitiveness. The approach undertaken here aims at
comparatively examining the international competitiveness of the
EU-25 (the twenty-five European Union member states before the 1st
of January 2007), Romanian and Bulgarian services trade, as well as
the last two countries- structure of specialization on the EU-25
services market. The primary changes in the international
competitiveness of three major services sectors – transportation,
travel and other services - are analyzed. This research attempts to
determine the ability of the two recent European Union (EU) member
states to contend with the challenges that might arise from the hard
competition within the enlarged EU, in the field of services trade.
Abstract: The purpose of this research was to study the factors
that influenced the success of mobile phone entrepreneurs at Central
Plaza. The sample group included 187 entrepreneurs at Central Plaza.
A questionnaire was utilized as a tool to collect data. Statistics used
in this research included frequency, percentage, mean, and standard
deviation. Independent- sample t- test, one way ANOVA, and
multiple regression analysis. Data were analyzed by using Statistical
Package for the Social Sciences.The findings disclosed that the
majority of respondents were male between 25-40 years old, and held
an undergraduate degree. The average income of respondents was
between 15,001-25,000 baht. The majority of respondents had less
than 5 years of working experience.
In terms of personality, the findings revealed that expression and
agreement were ranked at the highest level. Whereas, emotion
stability, consciousness, open to new experience were ranked at high.
From the hypotheses testing, the findings revealed that different
genders had different success in their mobile phone business with
different income from the last 6 months. However, difference in age,
income, level of education, and experience affected the success in
terms of income, number of customers, and overall success of
business. Moreover, the factors of personalities included expression,
agreement, emotion stability, consciousness, open to new experience,
and competitive strategy. From the findings, these factors were able
to predict mobile phone business success at 66.9 percent.
Abstract: In this paper we use the property of co-occurrence
matrix in finding parallel lines in binary pictures for fingerprint
identification. In our proposed algorithm, we reduce the noise by
filtering the fingerprint images and then transfer the fingerprint
images to binary images using a proper threshold. Next, we divide
the binary images into some regions having parallel lines in the same
direction. The lines in each region have a specific angle that can be
used for comparison. This method is simple, performs the
comparison step quickly and has a good resistance in the presence of
the noise.
Abstract: User satisfaction is one of the most used success
indicators in the research of information system (IS). Literature
shows user expectations have great influence on user satisfaction.
Both expectation and satisfaction of users are important for Hospital
Information Systems (HIS). Education, IS experience, age, attitude
towards change, business title, sex and working unit of the hospital,
are examined as the potential determinant of the medical users’
expectations. Data about medical user expectations are collected by
the “Expectation Questionnaire” developed for this study.
Expectation data are used for calculating the Expectation Meeting
Ratio (EMR) with the evaluation framework also developed for this
study. The internal consistencies of the answers to the questionnaire
are measured by Cronbach´s Alpha coefficient. The multivariate
analysis of medical user’s EMRs of HIS is performed by forward
stepwise binary logistic regression analysis. Education and business
title is appeared to be the determinants of expectations from HIS.
Abstract: In this paper, the structural genetic algorithm is used to optimize the neural network to control the joint movements of robotic arm. The robotic arm has also been modeled in 3D and simulated in real-time in MATLAB. It is found that Neural Networks provide a simple and effective way to control the robot tasks. Computer simulation examples are given to illustrate the significance of this method. By combining Genetic Algorithm optimization method and Neural Networks for the given robotic arm with 5 D.O.F. the obtained the results shown that the base joint movements overshooting time without controller was about 0.5 seconds, while with Neural Network controller (optimized with Genetic Algorithm) was about 0.2 seconds, and the population size of 150 gave best results.
Abstract: Markov games can be effectively used to design
controllers for nonlinear systems. The paper presents two novel
controller design algorithms by incorporating ideas from gametheory
literature that address safety and consistency issues of the
'learned' control strategy. A more widely used approach for
controller design is the H∞ optimal control, which suffers from high
computational demand and at times, may be infeasible. We generate
an optimal control policy for the agent (controller) via a simple
Linear Program enabling the controller to learn about the unknown
environment. The controller is facing an unknown environment and
in our formulation this environment corresponds to the behavior rules
of the noise modeled as the opponent. Proposed approaches aim to
achieve 'safe-consistent' and 'safe-universally consistent' controller
behavior by hybridizing 'min-max', 'fictitious play' and 'cautious
fictitious play' approaches drawn from game theory. We empirically
evaluate the approaches on a simulated Inverted Pendulum swing-up
task and compare its performance against standard Q learning.
Abstract: Electro Discharge Sawing is a hybrid process
combining the features of SEDM and ECM. Its major characteristic is
extremely fast erosion rate compare to either of the above processes.
This paper brings out its relative feature of SEDM and EDS about
their erosion rates, surface roughness, and morphology of machined
surfaces.
Abstract: Tea is a widely consumed beverage that contains many components. Caffeine belongs to this group of components called alkaloids contain nitrogen. In this study caffeine contents of three types of Turkish teas are determined by using extraction method. After condensation process, residue of caffeine and oil are obtained with evaporation. The oil which is in the residue is removed by hot water. Extraction process performed by using chloroform and the crude caffeine is obtained. From the results of experiments, caffeine contents are found in black tea, green tea and earl grey tea as 3.57±0.43%, 3.11±0.02%, 4.29±0.27%, respectively. Caffeine contents which are found in 1, 5 and 10 cups of tea are calculated. Furthermore, the daily intake of caffeine from black teas that affects human health is investigated.