Abstract: Equipment miniaturisation offers several opportunities such as an increased surface-to-volume ratio and higher heat transfer coefficients. However, moving towards small-diameter channels demands extra attention to fouling, reliability and stable operation of the system. The present investigation explores possibilities to enhance the stability of the once-through micro evaporator by reducing its flow boiling induced pressure fluctuations. Experimental comparison shows that the measured reduction factor approaches a theoretically derived value. Pressure fluctuations are reduced by a factor of ten in the solid conical channel and a factor of 15 in the porous conical channel. This presumably leads to less backflow and therefore to a better flow control.
Abstract: Many works have been carried out to compare the
efficiency of several goodness of fit procedures for identifying
whether or not a particular distribution could adequately explain a
data set. In this paper a study is conducted to investigate the power
of several goodness of fit tests such as Kolmogorov Smirnov (KS),
Anderson-Darling(AD), Cramer- von- Mises (CV) and a proposed
modification of Kolmogorov-Smirnov goodness of fit test which
incorporates a variance stabilizing transformation (FKS). The
performances of these selected tests are studied under simple
random sampling (SRS) and Ranked Set Sampling (RSS). This
study shows that, in general, the Anderson-Darling (AD) test
performs better than other GOF tests. However, there are some
cases where the proposed test can perform as equally good as the
AD test.
Abstract: The manufacturing transmission line tower parts has
being generated hazardous waste which is required proper disposal
of waste for protection of land pollution. Manufacturing Process in
the manufacturing of steel angle, plates, pipes, channels are passes
through conventional, semi automatic and CNC machines for
cutting, marking, punching, drilling, notching, bending operations.
All fabricated material Coated with thin layer of Zinc in Galvanizing
plant where molten zinc is used for coating. Prior to Galvanizing,
chemical like 33% concentrated HCl Acid, ammonium chloride and
d-oil being used for pretreatment of iron. The bath of water with
sodium dichromate is used for cooling and protection of the
galvanized steel. For the heating purpose the furnace oil burners are
used. These above process the Zinc dross, Zinc ash, ETP sludge and
waste pickled acid generated as hazardous waste. The RPG has
made captive secured land fill site, since 1997 since then it was
using for disposal of hazardous waste after completion of SLF
(Secured land fill) site. The RPG has raised height from ground
level then now it is being used for disposal of waste as he designed
the SLF after in creasing height of from GL it is functional without
leach ate or adverse impacts in the environment.
Abstract: Information hiding for authenticating and verifying the content integrity of the multimedia has been exploited extensively in the last decade. We propose the idea of using genetic algorithm and non-deterministic dependence by involving the un-watermarkable coefficients for digital image authentication. Genetic algorithm is used to intelligently select coefficients for watermarking in a DCT based image authentication scheme, which implicitly watermark all the un-watermarkable coefficients also, in order to thwart different attacks. Experimental results show that such intelligent selection results in improvement of imperceptibility of the watermarked image, and implicit watermarking of all the coefficients improves security against attacks such as cover-up, vector quantization and transplantation.
Abstract: Carrier mobility has become the most important
characteristic of high speed low dimensional devices. Due to
development of very fast switching semiconductor devices, speed of
computer and communication equipment has been increasing day by
day and will continue to do so in future. As the response of any
device depends on the carrier motion within the devices, extensive
studies of carrier mobility in the devices has been established
essential for the growth in the field of low dimensional devices.
Small-signal ac transport of degenerate two-dimensional hot
electrons in GaAs quantum wells is studied here incorporating
deformation potential acoustic, polar optic and ionized impurity
scattering in the framework of heated drifted Fermi-Dirac carrier
distribution. Delta doping is considered in the calculations to
investigate the effects of double delta doping on millimeter and submillimeter
wave response of two dimensional hot electrons in GaAs
nanostructures. The inclusion of delta doping is found to enhance
considerably the two dimensional electron density which in turn
improves the carrier mobility (both ac and dc) values in the GaAs
quantum wells thereby providing scope of getting higher speed
devices in future.
Abstract: Quality costs are the costs associated with preventing,
finding, and correcting defective work. Since the main language of
corporate management is money, quality-related costs act as means of
communication between the staff of quality engineering departments
and the company managers. The objective of quality engineering is to
minimize the total quality cost across the life of product. Quality
costs provide a benchmark against which improvement can be
measured over time. It provides a rupee-based report on quality
improvement efforts. It is an effective tool to identify, prioritize and
select quality improvement projects. After reviewing through the
literature it was noticed that a simplified methodology for data
collection of quality cost in a manufacturing industry was required.
The quantified standard methodology is proposed for collecting data
of various elements of quality cost categories for manufacturing
industry. Also in the light of research carried out so far, it is felt
necessary to standardise cost elements in each of the prevention,
appraisal, internal failure and external failure costs. . Here an attempt
is made to standardise the various cost elements applicable to
manufacturing industry and data is collected by using the proposed
quantified methodology. This paper discusses the case study carried
in luggage manufacturing industry.
Abstract: Electronic Systems are the core of everyday lives.
They form an integral part in financial networks, mass transit,
telephone systems, power plants and personal computers. Electronic
systems are increasingly based on complex VLSI (Very Large Scale
Integration) integrated circuits. Initial electronic design automation is
concerned with the design and production of VLSI systems. The next
important step in creating a VLSI circuit is Physical Design. The
input to the physical design is a logical representation of the system
under design. The output of this step is the layout of a physical
package that optimally or near optimally realizes the logical
representation. Physical design problems are combinatorial in nature
and of large problem sizes. Darwin observed that, as variations are
introduced into a population with each new generation, the less-fit
individuals tend to extinct in the competition of basic necessities.
This survival of fittest principle leads to evolution in species. The
objective of the Genetic Algorithms (GA) is to find an optimal
solution to a problem .Since GA-s are heuristic procedures that can
function as optimizers, they are not guaranteed to find the optimum,
but are able to find acceptable solutions for a wide range of
problems. This survey paper aims at a study on Efficient Algorithms
for VLSI Physical design and observes the common traits of the
superior contributions.
Abstract: Functional imaging procedures for the non-invasive assessment of tissue microcirculation are highly requested, but require a mathematical approach describing the trans- and intercapillary passage of tracer particles. Up to now, two theoretical, for the moment different concepts have been established for tracer kinetic modeling of contrast agent transport in tissues: pharmacokinetic compartment models, which are usually written as coupled differential equations, and the indicator dilution theory, which can be generalized in accordance with the theory of lineartime- invariant (LTI) systems by using a convolution approach. Based on mathematical considerations, it can be shown that also in the case of an open two-compartment model well-known from functional imaging, the concentration-time course in tissue is given by a convolution, which allows a separation of the arterial input function from a system function being the impulse response function, summarizing the available information on tissue microcirculation. Due to this reason, it is possible to integrate the open two-compartment model into the system-theoretic concept of indicator dilution theory (IDT) and thus results known from IDT remain valid for the compartment approach. According to the long number of applications of compartmental analysis, even for a more general context similar solutions of the so-called forward problem can already be found in the extensively available appropriate literature of the seventies and early eighties. Nevertheless, to this day, within the field of biomedical imaging – not from the mathematical point of view – there seems to be a trench between both approaches, which the author would like to get over by exemplary analysis of the well-known model.
Abstract: The two significant overvoltages in power system,
switching overvoltage and lightning overvoltage, are investigated in
this paper. Firstly, the effect of various power system parameters on
Line Energization overvoltages is evaluated by simulation in ATP.
The dominant parameters include line parameters; short-circuit
impedance and circuit breaker parameters. Solutions to reduce
switching overvoltages are reviewed and controlled closing using
switchsync controllers is proposed as proper method.
This paper also investigates lightning overvoltages in the
overhead-cable transition. Simulations are performed in
PSCAD/EMTDC. Surge arresters are applied in both ends of cable to
fulfill the insulation coordination. The maximum amplitude of
overvoltages inside the cable is surveyed which should be of great
concerns in insulation coordination studies.
Abstract: The nearly 21-year-old Jiujiang Bridge, which is suffering from uneven line shape, constant great downwarping of the main beam and cracking of the box girder, needs reinforcement and cable adjustment. It has undergone cable adjustment for twice with incomplete data. Therefore, the initial internal force state of the Jiujiang Bridge is identified as the key for the cable adjustment project. Based on parameter identification by means of static force test data, this paper suggests determining the initial internal force state of the cable-stayed bridge according to the cable force-displacement relationship parameter identification method. That is, upon measuring the displacement and the change in cable forces for twice, one can identify the parameters concerned by means of optimization. This method is applied to the cable adjustment, replacement and reinforcement project for the Jiujiang Bridge as a guidance for the cable adjustment and reinforcement project of the bridge.
Abstract: This paper describes the evolution of language
politics and the part played by political leaders with reference to
the Dravidian parties in Tamil Nadu. It explores the interesting
evolution from separatism to coalition in sustaining the values of
parliamentary democracy and federalism. It seems that the
appropriation of language politics is fully ascribed to the DMK
leadership under Annadurai and Karunanidhi. For them, the Tamil
language is a self-determining power, a terrain of nationhood, and
a perennial source of social and political powers. The DMK
remains a symbol of Tamil nationalist party playing language
politics in the interest of the Tamils. Though electoral alliances
largely determine the success, the language politics still has
significant space in the politics of Tamil Nadu. Ironically, DMK
moves from the periphery to centre for getting national recognition
for the Tamils as well as for its own maximization of power. The
evolution can be seen in two major phases as: language politics for
party building; and language politics for state building with three
successive political processes, namely, language politics in the
process of separatism, representative politics and coalition. The
much pronounced Dravidian Movement is radical enough to
democratize the party ideology to survive the spirit of
parliamentary democracy. This has secured its own rewards in
terms of political power. The political power provides the means to
achieve the social and political goal of the political party.
Language politics and leadership pattern actualized this trend
though the movement is shifted from separatism to coalition.
Abstract: This study focuses on bureau management
technologies and information systems in developing countries.
Developing countries use such systems which facilitate executive and
organizational functions through the utilization of bureau
management technologies and provide the executive staff with
necessary information.
The concepts of data and information differ from each other in
developing countries, and thus the concepts of data processing and
information processing are different. Symbols represent ideas,
objects, figures, letters and numbers. Data processing system is an
integrated system which deals with the processing of the data related
to the internal and external environment of the organization in order
to make decisions, create plans and develop strategies; it goes
without saying that this system is composed of both human beings
and machines. Information is obtained through the acquisition and
the processing of data. On the other hand, data are raw
communicative messages. Within this framework, data processing
equals to producing plausible information out of raw data.
Organizations in developing countries need to obtain information
relevant to them because rapid changes in the organizational arena
require rapid access to accurate information. The most significant
role of the directors and managers who work in the organizational
arena is to make decisions. Making a correct decision is possible only
when the directors and managers are equipped with sound ideas and
appropriate information. Therefore, acquisition, organization and
distribution of information gain significance. Today-s organizations
make use of computer-assisted “Management Information Systems"
in order to obtain and distribute information.
Decision Support System which is closely related to practice is an
information system that facilitates the director-s task of making
decisions. Decision Support System integrates human intelligence,
information technology and software in order to solve the complex
problems. With the support of the computer technology and software
systems, Decision Support System produces information relevant to
the decision to be made by the director and provides the executive
staff with supportive ideas about the decision.
Artificial Intelligence programs which transfer the studies and
experiences of the people to the computer are called expert systems.
An expert system stores expert information in a limited area and can
solve problems by deriving rational consequences.
Bureau management technologies and information systems in
developing countries create a kind of information society and
information economy which make those countries have their places
in the global socio-economic structure and which enable them to play
a reasonable and fruitful role; therefore it is of crucial importance to
make use of information and management technologies in order to
work together with innovative and enterprising individuals and it is
also significant to create “scientific policies" based on information
and technology in the fields of economy, politics, law and culture.
Abstract: Security has been an important issue and concern in the
smart home systems. Smart home networks consist of a wide range of
wired or wireless devices, there is possibility that illegal access to
some restricted data or devices may happen. Password-based
authentication is widely used to identify authorize users, because this
method is cheap, easy and quite accurate. In this paper, a neural
network is trained to store the passwords instead of using verification
table. This method is useful in solving security problems that
happened in some authentication system. The conventional way to
train the network using Backpropagation (BPN) requires a long
training time. Hence, a faster training algorithm, Resilient
Backpropagation (RPROP) is embedded to the MLPs Neural
Network to accelerate the training process. For the Data Part, 200
sets of UserID and Passwords were created and encoded into binary
as the input. The simulation had been carried out to evaluate the
performance for different number of hidden neurons and combination
of transfer functions. Mean Square Error (MSE), training time and
number of epochs are used to determine the network performance.
From the results obtained, using Tansig and Purelin in hidden and
output layer and 250 hidden neurons gave the better performance. As
a result, a password-based user authentication system for smart home
by using neural network had been developed successfully.
Abstract: The frequency contents of the non-stationary
signals vary with time. For proper characterization of such
signals, a smart time-frequency representation is necessary.
Classically, the STFT (short-time Fourier transform) is
employed for this purpose. Its limitation is the fixed timefrequency
resolution. To overcome this drawback an enhanced
STFT version is devised. It is based on the signal driven
sampling scheme, which is named as the cross-level sampling.
It can adapt the sampling frequency and the window function
(length plus shape) by following the input signal local
variations. This adaptation results into the proposed technique
appealing features, which are the adaptive time-frequency
resolution and the computational efficiency.
Abstract: The purpose of this paper is to propose a framework for constructing correct parallel processing programs based on Equivalent Transformation Framework (ETF). ETF regards computation as In the framework, a problem-s domain knowledge and a query are described in definite clauses, and computation is regarded as transformation of the definite clauses. Its meaning is defined by a model of the set of definite clauses, and the transformation rules generated must preserve meaning. We have proposed a parallel processing method based on “specialization", a part of operation in the transformations, which resembles substitution in logic programming. The method requires “Memo-tree", a history of specialization to maintain correctness. In this paper we proposes the new method for the specialization-base parallel processing without Memo-tree.
Abstract: Super-quadrics can represent a set of implicit surfaces,
which can be used furthermore as primitive surfaces to construct a
complex object via Boolean set operations in implicit surface
modeling. In fact, super-quadrics were developed to create a
parametric surface by performing spherical product on two parametric
curves and some of the resulting parametric surfaces were also
represented as implicit surfaces. However, because not every
parametric curve can be redefined implicitly, this causes only implicit
super-elliptic and super-hyperbolic curves are applied to perform
spherical product and so only implicit super-ellipsoids and
hyperboloids are developed in super-quadrics. To create implicit
surfaces with more diverse shapes than super-quadrics, this paper
proposes an implicit representation of spherical product, which
performs spherical product on two implicit curves like super-quadrics
do. By means of the implicit representation, many new implicit curves
such as polygonal, star-shaped and rose-shaped curves can be used to
develop new implicit surfaces with a greater variety of shapes than
super-quadrics, such as polyhedrons, hyper-ellipsoids, superhyperboloids
and hyper-toroids containing star-shaped and roseshaped
major and minor circles. Besides, the newly developed implicit
surfaces can also be used to define new primitive implicit surfaces for
constructing a more complex implicit surface in implicit surface
modeling.
Abstract: Many corporations are seriously concerned about
security of networks and therefore, their network supervisors are still
reluctant to install WLANs. In this regards, the IEEE802.11i standard
was developed to address the security problems, even though the
mistrust of the wireless LAN technology is still existing. The thought
was that the best security solutions could be found in open standards
based technologies that can be delivered by Virtual Private
Networking (VPN) being used for long time without addressing any
security holes for the past few years. This work, addresses this issue
and presents a simulated wireless LAN of IEEE802.11g protocol, and
analyzes impact of integrating Virtual Private Network technology to
secure the flow of traffic between the client and the server within the
LAN, using OPNET WLAN utility. Two Wireless LAN scenarios
have been introduced and simulated. These are based on normal
extension to a wired network and VPN over extension to a wired
network. The results of the two scenarios are compared and indicate
the impact of improving performance, measured by response time
and load, of Virtual Private Network over wireless LAN.
Abstract: These days wireless local area networks has become
very popular, when the initial IEEE802.11 is the standard for
providing wireless connectivity to automatic machinery, equipment
and stations that require rapid deployment, which may be portable,
handheld or which may be mounted on moving vehicles within a
local area. IEEE802.11 Wireless local area network is a sharedmedium
communication network that transmits information over
wireless links for all IEEE802.11 stations in its transmission range to
receive. When a user is moving from one location to another, how
the other user knows about the required station inside WLAN. For
that we designed and implemented a system to locate a mobile user
inside the wireless local area network based on RSSI with the help of
four specially designed architectures. These architectures are based
on statistical or we can say manual configuration of mapping and
radio map of indoor and outdoor location with the help of available
Sniffer based and cluster based techniques. We found a better
location of a mobile user in WLAN. We tested this work in indoor
and outdoor environments with different locations with the help of
Pamvotis, a simulator for WLAN.
Abstract: This paper aims to select the optimal location and
setting parameters of TCSC (Thyristor Controlled Series
Compensator) controller using Particle Swarm Optimization (PSO)
and Genetic Algorithm (GA) to mitigate small signal oscillations in a
multimachine power system. Though Power System Stabilizers
(PSSs) are prime choice in this issue, installation of FACTS device
has been suggested here in order to achieve appreciable damping of
system oscillations. However, performance of any FACTS devices
highly depends upon its parameters and suitable location in the
power network. In this paper PSO as well as GA based techniques are
used separately and compared their performances to investigate this
problem. The results of small signal stability analysis have been
represented employing eigenvalue as well as time domain response in
face of two common power system disturbances e.g., varying load
and transmission line outage. It has been revealed that the PSO based
TCSC controller is more effective than GA based controller even
during critical loading condition.
Abstract: Employing a recently introduced unified adaptive filter
theory, we show how the performance of a large number of important
adaptive filter algorithms can be predicted within a general framework
in nonstationary environment. This approach is based on energy conservation
arguments and does not need to assume a Gaussian or white
distribution for the regressors. This general performance analysis can
be used to evaluate the mean square performance of the Least Mean
Square (LMS) algorithm, its normalized version (NLMS), the family
of Affine Projection Algorithms (APA), the Recursive Least Squares
(RLS), the Data-Reusing LMS (DR-LMS), its normalized version
(NDR-LMS), the Block Least Mean Squares (BLMS), the Block
Normalized LMS (BNLMS), the Transform Domain Adaptive Filters
(TDAF) and the Subband Adaptive Filters (SAF) in nonstationary
environment. Also, we establish the general expressions for the
steady-state excess mean square in this environment for all these
adaptive algorithms. Finally, we demonstrate through simulations that
these results are useful in predicting the adaptive filter performance.