Abstract: This work presents a comparison between the Annual
Energy Output (AEO) of two commercial vertical-axis wind turbines
(VAWTs) for a low-wind urban site: both a drag-driven and a liftdriven
concepts are examined in order to be installed on top of the
new Via dei Giustinelli building, Trieste (Italy). The power-curves,
taken from the product specification sheets, have been matched to the
wind characteristics of the selected installation site. The influence of
rotor swept area and rated power on the performance of the two
proposed wind turbines have been examined in detail, achieving a
correlation between rotor swept area, electrical generator size and
wind distribution, to be used as a guideline for the calculation of the
AEO.
Abstract: Subsonic wind tunnel experiments were conducted to
study the effect of tripped boundary layer on the pressure distribution
in the contraction region of the tunnel. Measurements were
performed by installing trip strip at two different positions in the
concave portion of the contraction. The results show that installation
of the trip strips, have significant effects on both turbulence and
pressure distribution. The reduction in the free stream turbulence and
reduction of the wall static pressure distribution deferred signified
with the location of the trip strip.
Abstract: This purpose of this paper is to present the acceptance single sampling plan when the fraction of nonconforming items is a fuzzy number and being modeled based on the fuzzy Poisson distribution. We have shown that the operating characteristic (oc) curves of the plan is like a band having a high and low bounds whose width depends on the ambiguity proportion parameter in the lot when that sample size and acceptance numbers is fixed. Finally we completed discuss opinion by a numerical example. And then we compared the oc bands of using of binomial with the oc bands of using of Poisson distribution.
Abstract: In this paper an efficient implementation of Ripemd-
160 hash function is presented. Hash functions are a special family
of cryptographic algorithms, which is used in technological
applications with requirements for security, confidentiality and
validity. Applications like PKI, IPSec, DSA, MAC-s incorporate
hash functions and are used widely today. The Ripemd-160 is
emanated from the necessity for existence of very strong algorithms
in cryptanalysis. The proposed hardware implementation can be
synthesized easily for a variety of FPGA and ASIC technologies.
Simulation results, using commercial tools, verified the efficiency of
the implementation in terms of performance and throughput. Special
care has been taken so that the proposed implementation doesn-t
introduce extra design complexity; while in parallel functionality was
kept to the required levels.
Abstract: An exact algorithm for a n-link manipulator movement amidst arbitrary unknown static obstacles is presented.
The algorithm guarantees the reaching of a target configuration of the manipulator in a finite number of steps. The algorithm is
reduced to a finite number of calls of a subroutine for planning a trajectory in the presence of known forbidden states. The polynomial approximation algorithm which is used as the subroutine is presented. The results of the exact algorithm
implementation for the control of a seven link (7 degrees of
freedom, 7DOF) manipulator are given.
Abstract: This paper provides an introduction into the
evolution of information and communication technology and illustrates its usage in the work domain. The paper is sub-divided into two parts. The first part gives an overview over the different
phases of information processing in the work domain. It starts by
charting the past and present usage of computers in work
environments and shows current technological trends, which are likely to influence future business applications. The second part
starts by briefly describing, how the usage of computers changed business processes in the past, and presents first Ambient
Intelligence applications based on identification and localization
information, which are already used in the production and retail sector. Based on current systems and prototype applications, the
paper gives an outlook of how Ambient Intelligence technologies could change business processes in the future.
Abstract: This study aims to assess the environmental hazards
from radon exhalation rate in the soil samples in selected locations in
Iraqi Kurdistan, using passive (CR-39NTDs) and active (RAD7)
detecting method. Radon concentration, effective radium content and
radon exhalation rate were estimated in soil samples that collected at
the depth level of 30 cm inside 124 houses. The results show that the
emanation rate for radon gas was variation from location to other,
depending on the geological formation. Most health risks come from
emanation of radon and its daughter due to its contribution for indoor
radon, so the results showed that there is a linear relationship
between the ratio of soil and indoor radon concentration (CSoil Rn222/
Cindoor Rn222) and the effective radium content in soil samples. The
results show that radon concentration has high and low values in
Hajyawa city and Er. Tyrawa Qr, respectively. A comparison
between our results with that mentioned in international reports was
done.
Abstract: Grid environments consist of the volatile integration
of discrete heterogeneous resources. The notion of the Grid is to
unite different users and organisations and pool their resources into
one large computing platform where they can harness, inter-operate,
collaborate and interact. If the Grid Community is to achieve this
objective, then participants (Users and Organisations) need to be
willing to donate or share their resources and permit other
participants to use their resources. Resources do not have to be
shared at all times, since it may result in users not having access to
their own resource. The idea of reward-based computing was
developed to address the sharing problem in a pragmatic manner.
Participants are offered a reward to donate their resources to the
Grid. A reward may include monetary recompense or a pro rata share
of available resources when constrained. This latter point may imply
a quality of service, which in turn may require some globally agreed
reservation mechanism. This paper presents a platform for economybased
computing using the WebCom Grid middleware. Using this
middleware, participants can configure their resources at times and
priority levels to suit their local usage policy. The WebCom system
accounts for processing done on individual participants- resources
and rewards them accordingly.
Abstract: In wireless networks, bandwidth is scare resource and it is essential to utilize it effectively. This paper analyses effects of using different bandwidth management techniques on the network performances of the Wireless Local Area Networks (WLANs) that use hybrid load balancing scheme. In particular, we study three bandwidth management schemes, namely Complete Sharing (CS), Complete Partitioning (CP), and Partial Sharing (PS). Performances of these schemes are evaluated by simulation experiments in term of percentage of network association blocking. Our results show that the CS scheme can provide relatively low blocking percentage in various network traffic scenarios whereas the PS scheme can enhance quality of services of the multimedia traffic with rather small expenses on the blocking percentage of the best effort traffic.
Abstract: When considering the development of constitutive
equations describing the behavior of materials under cyclic plastic
strains, different kinds of formulations can be adopted. The primary
intention of this study is to develop computer programming of
plasticity models to accurately predict the life of engineering
components. For this purpose, the energy or cyclic strain is computed
in multi-surface plasticity models in non-proportional loading and to
present their procedures and codes results.
Abstract: We propose a new approach on how to obtain the approximate solutions of Hamilton-Jacobi (HJ) equations. The process of the approximation consists of two steps. The first step is to transform the HJ equations into the virtual time based HJ equations (VT-HJ) by introducing a new idea of ‘virtual-time’. The second step is to construct the approximate solutions of the HJ equations through a computationally iterative procedure based on the VT-HJ equations. It should be noted that the approximate feedback solutions evolve by themselves as the virtual-time goes by. Finally, we demonstrate the effectiveness of our approximation approach by means of simulations with linear and nonlinear control problems.
Abstract: The problem of lot sizing, sequencing and scheduling
multiple products in flow line production systems has been studied
by several authors. Almost all of the researches in this area assumed
that setup times and costs are sequence –independent even though
sequence dependent setups are common in practice. In this paper we
present a new mixed integer non linear program (MINLP) and a
heuristic method to solve the problem in sequence dependent case.
Furthermore, a genetic algorithm has been developed which applies
this constructive heuristic to generate initial population. These two
proposed solution methods are compared on randomly generated
problems. Computational results show a clear superiority of our
proposed GA for majority of the test problems.
Abstract: Harmonic pollution and low power factor in power
systems caused by power converters have been of great concern. To
overcome these problems several converter topologies using
advanced semiconductor devices and control schemes have been
proposed. This investigation is to identify a low cost, small size,
efficient and reliable ac to dc converter to meet the input performance
index of UPS. The performance of single phase and three phase ac to
dc converter along with various control techniques are studied and
compared. The half bridge converter topology with linear current
control is identified as most suitable. It is simple, energy efficient
because of single switch power loss and transformer-less operation of
UPS. The results are validated practically using a prototype built
using IGBT and analog controller. The performance for both single
and three-phase system is verified. Digital implementation of closed
loop control achieves higher reliability. Its cost largely depends on
chosen bit precision. The minimal bit precision for optimum
converter performance is identified as 16-bit with fixed-point
operation. From the investigation and practical implementation it is
concluded that half bridge ac – dc converter along with digital linear
controller meets the performance index of UPS for single and three
phase systems.
Abstract: Chikungunya virus (CHICKV) is an arboviruses belonging to family Tagoviridae and is transmitted to human through by mosquito (Aedes aegypti and Aedes albopictus) bite. A large outbreak of chikungunya has been reported in India between 2006 and 2007, along with several other countries from South-East Asia and for the first time in Europe. It was for the first time that the CHICKV outbreak has been reported with mortality from Reunion Island and increased mortality from Asian countries. CHICKV affects all age groups, and currently there are no specific drugs or vaccine to cure the disease. The need of antiviral agents for the treatment of CHICKV infection and the success of virtual screening against many therapeutically valuable targets led us to carry out the structure based drug design against Chikungunya nSP2 protease (PDB: 3TRK). Highthroughput virtual screening of publicly available databases, ZINC12 and BindingDB, has been carried out using the Openeye tools and Schrodinger LLC software packages. Openeye Filter program has been used to filter the database and the filtered outputs were docked using HTVS protocol implemented in GLIDE package of Schrodinger LLC. The top HITS were further used for enriching the similar molecules from the database through vROCS; a shape based screening protocol implemented in Openeye. The approach adopted has provided different scaffolds as HITS against CHICKV protease. Three scaffolds: Indole, Pyrazole and Sulphone derivatives were selected based on the docking score and synthetic feasibility. Derivatives of Pyrazole were synthesized and submitted for antiviral screening against CHICKV.
Abstract: In this paper, we propose a routing scheme that guarantees
the residual lifetime of wireless sensor networks where each
sensor node operates with a limited budget of battery energy. The
scheme maximizes the communications QoS while sustaining the
residual battery lifetime of the network for a specified duration.
Communication paths of wireless nodes are translated into a directed
acyclic graph(DAG) and the maximum-flow algorithm is applied to
the graph. The found maximum flow are assigned to sender nodes, so
as to maximize their communication QoS. Based on assigned flows,
the scheme determines the routing path and the transmission rate of
data packet so that any sensor node on the path would not exhaust
its battery energy before a specified duration.
Abstract: Lately management strategy that put Industrial Design (ID) in its core is recognized more important, as technology and price alone cannot differentiate a product. The needs to shorten the time to develop a product also shorten the development period of ID, and it necessitates the ID process management. This research analyzes the status of integration process of ID and Engineering Design (ED) of office equipment that requires the collaboration of ID and ED to clarify the issues for the efficiency of the development and to propose solutions.
Abstract: Fault-proneness of a software module is the
probability that the module contains faults. A correlation exists
between the fault-proneness of the software and the measurable
attributes of the code (i.e. the static metrics) and of the testing (i.e.
the dynamic metrics). Early detection of fault-prone software
components enables verification experts to concentrate their time and
resources on the problem areas of the software system under
development. This paper introduces Genetic Algorithm based
software fault prediction models with Object-Oriented metrics. The
contribution of this paper is that it has used Metric values of JEdit
open source software for generation of the rules for the classification
of software modules in the categories of Faulty and non faulty
modules and thereafter empirically validation is performed. The
results shows that Genetic algorithm approach can be used for
finding the fault proneness in object oriented software components.
Abstract: Today-s healthcare industries had become more
patient-centric than profession-centric, from which the issues of quality of healthcare and the patient safety are the major concerns in the modern healthcare facilities. An unplanned extubation (UE) may
be detrimental to the patient-s life, and thus is one of the major indexes
of patient safety and healthcare quality. A high UE rate not only
defeated the healthcare quality as well as the patient safety policy but
also the nurses- morality, and job satisfaction. The UE problem in a psychiatric hospital is unique and may be a tough challenge for the
healthcare professionals for the patients were mostly lacking communication capabilities. We reported with this essay a particular
project that was organized to reduce the UE rate from the current 2.3%
to a lower and satisfactory level in the long-term care units of a psychiatric hospital. The project was conducted between March 1st,
2011 and August 31st, 2011. Based on the error information gathered
from varied units of the hospital, the team analyzed the root causes
with possible solutions proposed to the meetings. Four solutions were
then concluded with consensus and launched to the units in question.
The UE rate was now reduced to a level of 0.17%. Experience from
this project, the procedure and the tools adopted would be good reference to other hospitals.
Abstract: A numerical study of flow in a horizontally channel
partially filled with a porous screen with non-uniform inlet has been
performed by lattice Boltzmann method (LBM). The flow in porous
layer has been simulated by the Brinkman-Forchheimer model.
Numerical solutions have been obtained for variable porosity models
and the effects of Darcy number and porosity have been studied in
detail. It is found that the flow stabilization is reliant on the Darcy
number. Also the results show that the stabilization of flow field and
heat transfer is depended to Darcy number. Distribution of stream
field becomes more stable by decreasing Darcy number. Results
illustrate that the effect of variable porosity is significant just in the
region of the solid boundary. In addition, difference between constant
and variable porosity models is decreased by decreasing the Darcy
number.
Abstract: The Helmholtz equation often arises in the study of physical problems involving partial differential equation. Many researchers have proposed numerous methods to find the analytic or approximate solutions for the proposed problems. In this work, the exact analytical solutions of the Helmholtz equation in spherical polar coordinates are presented using the Nikiforov-Uvarov (NU) method. It is found that the solution of the angular eigenfunction can be expressed by the associated-Legendre polynomial and radial eigenfunctions are obtained in terms of the Laguerre polynomials. The special case for k=0, which corresponds to the Laplace equation is also presented.