Abstract: Gas hydrates form when a number of factors co-exist:
free water, hydrocarbon gas, cold temperatures and high pressures are typical of the near mud-line conditions in a deepwater drilling
operation. Subsequently, when drilling with water based muds, particularly on exploration wells, the risk of hydrate formation
associated with a gas influx is high. The consequences of gas hydrate
formation while drilling are severe, and as such, every effort should be made to ensure the risk of hydrate formation is either eliminated
or significantly reduced. Thermodynamic inhibitors are used to reduce the free water content of a drilling mud, and thus suppress the
hydrate formation temperature. Very little experimental work has
been performed by oil and gas research companies on the evaluation
of gas hydrate formation in a water-based drilling mud. The main
objective of this paper is to investigate the experimental gas hydrate
formation for a mixture of methane, carbon dioxide & nitrogen in a
water-based drilling mud with or without presence of different
concentrations of thermodynamic inhibitors including pure salt and a
combination of salt with methanol or ethylene glycol at different
concentrations in a static loop apparatus. The experiments were
performed using a static loop apparatus consisting of a 2.4307 cm
inside diameter and 800 cm long pipe. All experiments were conducted at 2200 psia. The temperature in the loop was decreased at
a rate of 3.33 °F/h from initial temperature of 80 °F.
Abstract: Web applications have become complex and crucial for many firms, especially when combined with areas such as CRM (Customer Relationship Management) and BPR (Business Process Reengineering). The scientific community has focused attention to Web application design, development, analysis, testing, by studying and proposing methodologies and tools. Static and dynamic techniques may be used to analyze existing Web applications. The use of traditional static source code analysis may be very difficult, for the presence of dynamically generated code, and for the multi-language nature of the Web. Dynamic analysis may be useful, but it has an intrinsic limitation, the low number of program executions used to extract information. Our reverse engineering analysis, used into our WAAT (Web Applications Analysis and Testing) project, applies mutational techniques in order to exploit server side execution engines to accomplish part of the dynamic analysis. This paper studies the effects of mutation source code analysis applied to Web software to build application models. Mutation-based generated models may contain more information then necessary, so we need a pruning mechanism.
Abstract: In this note, the robust static output feedback
stabilisation of an induction machine is addressed. The machine is
described by a non homogenous bilinear model with structural
uncertainties, and the feedback gain is computed via an iterative LMI
(ILMI) algorithm.
Abstract: In this article an isotropic linear elastic half-space with
a cylindrical cavity of finite length is considered to be under the
effect of a ring shape time-harmonic torsion force applied at an
arbitrary depth on the surface of the cavity. The equation of
equilibrium has been written in a cylindrical coordinate system. By
means of Fourier cosine integral transform, the non-zero
displacement component is obtained in the transformed domain. With
the aid of the inversion theorem of the Fourier cosine integral
transform, the displacement is obtained in the real domain. With the
aid of boundary conditions, the involved boundary value problem for
the fundamental solution is reduced to a generalized Cauchy singular
integral equation. Integral representation of the stress and
displacement are obtained, and it is shown that their degenerated
form to the static problem coincides with existing solutions in the
literature.
Abstract: Density functional theory (DFT) calculations were
performed to compute nitrogen-14 and boron-11 nuclear quadrupole
resonance (NQR) spectroscopy parameters in the representative
model of armchair boron nitride nanotube (BNNT) for the first time.
The considered model consisting of 1 nm length of H-capped (5, 5)
single-wall BNNT were first allowed to fully relax and then the NQR
calculations were carried out on the geometrically optimized model.
The evaluated nuclear quadrupole coupling constants and asymmetry
parameters for the mentioned nuclei reveal that the model can be
divided into seven layers of nuclei with an equivalent electrostatic
environment where those nuclei at the ends of tubes have a very
strong electrostatic environment compared to the other nuclei along
the length of tubes. The calculations were performed via Gaussian 98
package of program.
Abstract: This study is to evaluate the behavior of integral and
segmental specimens through static and cyclic tests. Integral
specimens were made with the same size to be compared with
segmental specimens that were made by connected precast members.
To evaluate its bending performance and serviceability, 1 integral and
3 segmental specimens were tested under static load. And 1 integral
and 2 segmental specimens were tested under cyclic load, respectively.
Different load ranges were considered in the cyclic tests to evaluate the
safety and serviceability. The test results showed that under static
loading, segmental specimens had about 94% of the integral
specimen's maximum moment, averagely. Under cyclic loading, the
segmental specimens showed that had enough safety in the range of
higher than service load and enough serviceability. In conclusion, the
maximum crack width (0.16mm) satisfied the allowable crack width
(0.30mm) in the range of service load.
Abstract: In this paper, we introduce a novel algorithm for object tracking in video sequence. In order to represent the object to be tracked, we propose a spatial color histogram model which encodes both the color distribution and spatial information. The object tracking from frame to frame is accomplished via center voting and back projection method. The center voting method has every pixel in the new frame to cast a vote on whereabouts the object center is. The back projection method segments the object from the background. The segmented foreground provides information on object size and orientation, omitting the need to estimate them separately. We do not put any assumption on camera motion; the proposed algorithm works equally well for object tracking in both static and moving camera videos.
Abstract: In this paper, we aim to investigate a new stability analysis for discrete-time switched linear systems based on the comparison, the overvaluing principle, the application of Borne-Gentina criterion and the Kotelyanski conditions. This stability conditions issued from vector norms correspond to a vector Lyapunov function. In fact, the switched system to be controlled will be represented in the Companion form. A comparison system relative to a regular vector norm is used in order to get the simple arrow form of the state matrix that yields to a suitable use of Borne-Gentina criterion for the establishment of sufficient conditions for global asymptotic stability. This proposed approach could be a constructive solution to the state and static output feedback stabilization problems.
Abstract: In this paper, transversal vibration of buried pipelines
during loading induced by underground explosions is analyzed. The
pipeline is modeled as an infinite beam on an elastic foundation, so
that soil-structure interaction is considered by means of transverse
linear springs along the pipeline. The pipeline behavior is assumed to
be ideal elasto-plastic which an ultimate strain value limits the plastic
behavior. The blast loading is considered as a point load, considering
the affected length at some point of the pipeline, in which the
magnitude decreases exponentially with time. A closed-form solution
for the quasi-static problem is carried out for both elastic and elasticperfect
plastic behaviors of pipe materials. At the end, a comparative
study on steel and polyethylene pipes with different sizes buried in
various soil conditions, affected by a predefined underground
explosion is conducted, in which effect of each parameter is
discussed.
Abstract: Transmission network expansion planning (TNEP) is
a basic part of power system planning that determines where, when
and how many new transmission lines should be added to the
network. Up till now, various methods have been presented to solve
the static transmission network expansion planning (STNEP)
problem. But in all of these methods, transmission expansion
planning considering network adequacy restriction has not been
investigated. Thus, in this paper, STNEP problem is being studied
considering network adequacy restriction using discrete particle
swarm optimization (DPSO) algorithm. The goal of this paper is
obtaining a configuration for network expansion with lowest
expansion cost and a specific adequacy. The proposed idea has been
tested on the Garvers network and compared with the decimal
codification genetic algorithm (DCGA). The results show that the
network will possess maximum efficiency economically. Also, it is
shown that precision and convergence speed of the proposed DPSO
based method for the solution of the STNEP problem is more than
DCGA approach.
Abstract: Load balancing is the process of improving the
performance of a parallel and distributed system through a
redistribution of load among the processors [1] [5]. In this paper we
present the performance analysis of various load balancing
algorithms based on different parameters, considering two typical
load balancing approaches static and dynamic. The analysis indicates
that static and dynamic both types of algorithm can have
advancements as well as weaknesses over each other. Deciding type
of algorithm to be implemented will be based on type of parallel
applications to solve. The main purpose of this paper is to help in
design of new algorithms in future by studying the behavior of
various existing algorithms.
Abstract: In this paper, we consider Wiener nonlinear model for solid oxide fuel cell (SOFC). The Wiener model of the SOFC consists of a linear dynamic block and a static output non-linearity followed by the block, in which linear part is approximated by state-space model and the nonlinear part is identified by a polynomial form. To control the SOFC system, we have to consider various view points such as operating conditions, another constraint conditions, change of load current and so on. A change of load current is the significant one of these for good performance of the SOFC system. In order to keep the constant stack terminal voltage by changing load current, the nonlinear model predictive control (MPC) is proposed in this paper. After primary control method is designed to guarantee the fuel utilization as a proper constant, a nonlinear model predictive control based on the Wiener model is developed to control the stack terminal voltage of the SOFC system. Simulation results verify the possibility of the proposed Wiener model and MPC method to control of SOFC system.
Abstract: Power system stability enhancement by simultaneous tuning of a Power System Stabilizer (PSS) and a Static Var Compensator (SVC)-based controller is thoroughly investigated in this paper. The coordination among the proposed damping stabilizers and the SVC internal voltage regulators has also been taken into consideration. The design problem is formulated as an optimization problem with a time-domain simulation-based objective function and Real-Coded Genetic Algorithm (RCGA) is employed to search for optimal controller parameters. The proposed stabilizers are tested on a weakly connected power system with different disturbances and loading conditions. The nonlinear simulation results are presented to show the effectiveness and robustness of the proposed control schemes over a wide range of loading conditions and disturbances. Further, the proposed design approach is found to be robust and improves stability effectively even under small disturbance and unbalanced fault conditions.
Abstract: Static analysis of source code is used for auditing web
applications to detect the vulnerabilities. In this paper, we propose a
new algorithm to analyze the PHP source code for detecting LFI and
RFI potential vulnerabilities. In our approach, we first define some
patterns for finding some functions which have potential to be abused
because of unhandled user inputs. More precisely, we use regular
expression as a fast and simple method to define some patterns for
detection of vulnerabilities. As inclusion functions could be also used
in a safe way, there could occur many false positives (FP). The first
cause of these FP-s could be that the function does not use a usersupplied
variable as an argument. So, we extract a list of usersupplied
variables to be used for detecting vulnerable lines of code.
On the other side, as vulnerability could spread among the variables
like by multi-level assignment, we also try to extract the hidden usersupplied
variables. We use the resulted list to decrease the false
positives of our method. Finally, as there exist some ways to prevent
the vulnerability of inclusion functions, we define also some patterns
to detect them and decrease our false positives.
Abstract: The focus of this paper is to highlight the design and
development of an educational game prototype as an evaluation
instrument for the Malaysia driving license static test. This
educational game brings gaming technology into the conventional
objective static test to make it more effective, real and interesting.
From the feeling of realistic, the future driver can learn something,
memorized and use it in the real life. The current online objective
static test only make the user memorized the answer without knowing
and understand the true purpose of the question. Therefore, in real
life, they will not behave as expected due to behavior and moral
lacking. This prototype has been developed inform of multiple-choice
questions integrated with 3D gaming environment to make it simulate
the real environment and scenarios. Based on the testing conducted,
the respondent agrees with the use of this game prototype it can
increase understanding and promote obligation towards traffic rules.
Abstract: The commercial finite element program LS-DYNA was employed to evaluate the response and energy absorbing capacity of cylindrical metal tubes that are externally wrapped with composite. The effects of composite wall thickness, loading conditions and fiber ply orientation were examined. The results demonstrate that a wrapped composite can be utilized effectively to enhance the crushing characteristics and energy absorbing capacity of the tubes. Increasing the thickness of the composite increases the mean force and the specific energy absorption under both static and dynamic crushing. The ply pattern affects the energy absorption capacity and the failure mode of the metal tube and the composite material property is also significant in determining energy absorption efficiency.
Abstract: A stiffened laminated composite panel (1 m length ×
0.5m width) was optimized for minimum weight and deflection under
several constraints using genetic algorithm. Here, a significant study
on the performance of a penalty function with two kinds of static and
dynamic penalty factors was conducted. The results have shown that
linear dynamic penalty factors are more effective than the static ones.
Also, a specially combined linear-exponential function has shown to
perform more effective than the previously mentioned penalty
functions. This was then resulted in the less sensitivity of the GA to
the amount of penalty factor.
Abstract: This research paper presents a framework on how to
build up malware dataset.Many researchers took longer time to
clean the dataset from any noise or to transform the dataset into a
format that can be used straight away for testing. Therefore, this
research is proposing a framework to help researchers to speed up
the malware dataset cleaningprocesses which later can be used for
testing. It is believed, an efficient malware dataset cleaning
processes, can improved the quality of the data, thus help to improve
the accuracy and the efficiency of the subsequent analysis. Apart
from that, an in-depth understanding of the malware taxonomy is
also important prior and during the dataset cleaning processes. A
new Trojan classification has been proposed to complement this
framework.This experiment has been conducted in a controlled lab
environment and using the dataset from VxHeavens dataset. This
framework is built based on the integration of static and dynamic
analyses, incident response method and knowledge database
discovery (KDD) processes.This framework can be used as the basis
guideline for malware researchers in building malware dataset.
Abstract: There are many issues that affect modeling and designing real-time databases. One of those issues is maintaining consistency between the actual state of the real-time object of the external environment and its images as reflected by all its replicas distributed over multiple nodes. The need to improve the scalability is another important issue. In this paper, we present a general framework to design a replicated real-time database for small to medium scale systems and maintain all timing constrains. In order to extend the idea for modeling a large scale database, we present a general outline that consider improving the scalability by using an existing static segmentation algorithm applied on the whole database, with the intent to lower the degree of replication, enables segments to have individual degrees of replication with the purpose of avoiding excessive resource usage, which all together contribute in solving the scalability problem for DRTDBS.
Abstract: A method has been developed for preparing load
models for power flow and stability. The load modeling
(LOADMOD) computer software transforms data on load class mix,
composition, and characteristics into the from required for
commonly–used power flow and transient stability simulation
programs. Typical default data have been developed for load
composition and characteristics. This paper defines LOADMOD
software and describes the dynamic and static load modeling
techniques used in this software and results of initial testing for
BAKHTAR power system.