Abstract: In Secondary Surveillance Radar (SSR) systems, it is
more difficult to locate and recognise aircrafts in the neighbourhood of civil airports since aerial traffic becomes greater. Here, we propose to apply a recent Blind Source Separation (BSS) algorithm based
on Time-Frequency Analysis, in order to separate messages sent by different aircrafts and falling in the same radar beam in reception. The above source separation method involves joint-diagonalization
of a set of smoothed version of spatial Wigner-Ville distributions.
The technique makes use of the difference in the t-f signatures of the nonstationary sources to be separated. Consequently, as the SSR sources emit different messages at different frequencies, the above fitted to this new application. We applied the technique in simulation to separate SSR replies. Results are provided at the end
of the paper.
Abstract: Researchers have long had trouble in measurement of
Exchangeable Sodium Ratio (ESR) at salt-affected soils. this
parameter are often determined using laborious and time consuming
laboratory tests, but it may be more appropriate and economical to
develop a method which uses a more simple soil salinity index. The
aim of this study was to determine the relationship between
exchangeable sodium ratio (ESR) and sodium adsorption ratio (SAR)
in some salt-affected soils of Khuzestan plain. To this purpose, two
experimental areas (S1, S2) of Khuzestan province-IRAN were
selected and four treatments with three replications by series of
double rings were applied. The treatments were included 25cm,
50cm, 75cm and 100cm water application. The statistical results of
the study indicated that in order to predict soil ESR based on soil
SAR the linear regression model ESR=0.2048+0.0066 SAR
(R2=0.53) & ESR=0.0564+0.0171 SAR (R2=0.76) can be
recommended in Pilot S1 and S2 respectively.
Abstract: In this paper, the difference between the Alternating
Direction Method (ADM) and the Non-Splitting Method (NSM) is
investigated, while both methods applied to the simulations for 2-D
multimaterial radiation diffusion issues. Although the ADM have the
same accuracy orders with the NSM on the uniform meshes, the
accuracy of ADM will decrease on the distorted meshes or the
boundary of domain. Numerical experiments are carried out to
confirm the theoretical predication.
Abstract: Because of architectural condition and structure application, sometimes mass source and stiffness source are not coincidence, and the structure is irregular. The structure is also might be asymmetric as an asymmetric bracing in plan which leads to unbalance distribution of stiffness or because of unbalance distribution of the mass. Both condition lead to eccentricity and torsion in the structure. The deficiency of ordinary code to evaluate the performance of steel structures against earthquake has been caused designing based on performance level or capacity spectrum be used. By using the mentioned methods it is possible to design a structure that its behavior against different earthquakes be predictive. In this article 5- story buildings with different percentage of asymmetric which is because of stiffness changes and kind of bracing (x and chevron bracing) have been designed. The static and dynamic nonlinear analysis under three acceleration recording has been done. Finally performance level of the structure has been evaluated.
Abstract: The increasing divorce and fertility rates outside of marriage, the changing values in the last decades have led to a high prevalence of single parent families. Currently, worldwide, singleparent families represent about a quarter of all families. Recent changes occurring in the structure of single-parent families and also the multitude of factors that influence the quality of life of these families require the development of new research tools in order to provide foundations for social policies addressed to this type of family. The purpose of this paper is to present an analysis concerning the quality of life for single parent families in Romania, based on data collected through a research methodology developed by the authors within a scientific research project funded by a national grant called Partnerships in priority areas.
Abstract: The scroll pump belongs to the category of positive
displacement pump can be used for continuous pumping of gases at
low pressure apart from general vacuum application. The shape of
volume occupied by the gas moves and deforms continuously as the
spiral orbits. To capture flow features in such domain where mesh
deformation varies with time in a complicated manner, mesh less
solver was found to be very useful. Least Squares Kinetic Upwind
Method (LSKUM) is a kinetic theory based mesh free Euler solver
working on arbitrary distribution of points. Here upwind is enforced
in molecular level based on kinetic flux vector splitting scheme
(KFVS). In the present study we extended the LSKUM to moving
node viscous flow application. This new code LSKUM-NS-MN for
moving node viscous flow is validated for standard airfoil pitching
test case. Simulation performed for flow through scroll pump using
LSKUM-NS-MN code agrees well with the experimental pumping
speed data.
Abstract: The main objective of the present paper is to derive an easy numerical technique for the analysis of the free vibration through the stepped regions of plates. Based on the utilities of the step by step integration initial values IV and Finite differences FD methods, the present improved Initial Value Finite Differences (IVFD) technique is achieved. The first initial conditions are formulated in convenient forms for the step by step integrations while the upper and lower edge conditions are expressed in finite difference modes. Also compatibility conditions are created due to the sudden variation of plate thickness. The present method (IVFD) is applied to solve the fourth order partial differential equation of motion for stepped plate across two different panels under the sudden step compatibility in addition to different types of end conditions. The obtained results are examined and the validity of the present method is proved showing excellent efficiency and rapid convergence.
Abstract: Tritium activity concentration in Danube river water
in Serbia has been determinate using a liquid scintillation counter
Quantulus 1220. During December 2010, water samples were taken
along the entire course of Danube through Serbia, from Hungarian-
Serbian to Romanian-Serbian border. This investigation is very
important because of the nearness of nuclear reactor Paks in
Hungary. Sample preparation was performed by standard test method
using Optiphase HiSafe 3 scintillation cocktail. We used a rapid
method for the preparation of environmental samples, without
electrolytic enrichment.
Abstract: Microbial contamination, most of which are fecal born in drinking water and food industry is a serious threat to humans. Escherichia coli is one of the most common and prevalent among them. We have developed a sensor for rapid and an early detection of contaminants, taking E.coli as a threat indicator organism. The sensor is based on co-polymerizations of aniline and formaldehyde in form of thin film over glass surface using the vacuum deposition technique. The particular doping combination of thin film with Fe-Al and Fe-Cu in different concentrations changes its non conducting properties to p- type semi conductor. This property is exploited to detect the different contaminants, believed to have the different surface charge. It was found through experiments that different microbes at same OD (0.600 at 600 nm) have different conductivity in solution. Also the doping concentration is found to be specific for attracting microbes on the basis of surface charge. This is a simple, cost effective and quick detection method which not only decreases the measurement time but also gives early warnings for highly contaminated samples.
Abstract: Modeling the behavior of the dialogue management in
the design of a spoken dialogue system using statistical methodologies
is currently a growing research area. This paper presents a work
on developing an adaptive learning approach to optimize dialogue
strategy. At the core of our system is a method formalizing dialogue
management as a sequential decision making under uncertainty whose
underlying probabilistic structure has a Markov Chain. Researchers
have mostly focused on model-free algorithms for automating the
design of dialogue management using machine learning techniques
such as reinforcement learning. But in model-free algorithms there
exist a dilemma in engaging the type of exploration versus exploitation.
Hence we present a model-based online policy learning
algorithm using interconnected learning automata for optimizing
dialogue strategy. The proposed algorithm is capable of deriving
an optimal policy that prescribes what action should be taken in
various states of conversation so as to maximize the expected total
reward to attain the goal and incorporates good exploration and
exploitation in its updates to improve the naturalness of humancomputer
interaction. We test the proposed approach using the most
sophisticated evaluation framework PARADISE for accessing to the
railway information system.
Abstract: On existing online shopping on the web, SSL and
password are usually used to achieve the secure trades. SSL shields
communication from the third party who is not related with the trade,
and indicates that the trader's web site is authenticated by one of the
certification authority. Password certifies a customer as the same
person who has visited the trader's web site before, and protects the
customer's privacy such as what the customer has bought on the site.
However, there is no forensics for the trades in those cased above.
With existing methods, no one can prove what is ordered by
customers, how many products are ordered and even whether
customers have ordered or not. The reason is that the third party has to
guess what were traded with logs that are held by traders and by
customers. The logs can easily be created, deleted and forged since
they are electronically stored. To enhance security with digital
forensics for electronic commerce on the web, I indicate a secure
method with cellular phones.
Abstract: The VoIP networks as alternative method to traditional PSTN system has been implemented in a wide variety of structures
with multiple protocols, codecs, software and hardware–based
distributions. The use of cryptographic techniques let the users to have a secure communication, but the calculate throughput as well as the QoS parameters are affected according to the used algorithm. This
paper analyzes the VoIP throughput and the QoS parameters with
different commercial encryption methods. The measurement–based
approach uses lab scenarios to simulate LAN and WAN
environments. Security mechanisms such as TLS, SIAX2, SRTP,
IPSEC and ZRTP are analyzed with μ-LAW and GSM codecs.
Abstract: (Bi0.5Na0.5)TiO3 doped with 8 mol % BaTiO3 powder
(BNT-BT0.08), prepared by sol-gel method was compacted and
sintered by Spark Plasma Sintering (SPS) process. The influence of
SPS temperature on the densification of BNT-BT0.08 ceramic was
investigated. Starting from sol-gel nanopowder of BNT-BT
containing 8 mol % BaTiO3 with an average particles size of about
30 nm, were obtained ceramics with density around 98 % of the
theoretical density value when the SPS temperature used was about
850 °C. The average grain size of the resulting ceramics was 80 nm.
The BNT-BT0.08 ceramic sample obtained by SPS method has shown
good electric properties at various frequencies.
Abstract: An effective visual error concealment method has been presented by employing a robust rotation, scale, and translation (RST) invariant partial patch matching model (RSTI-PPMM) and
exemplar-based inpainting. While the proposed robust and inherently
feature-enhanced texture synthesis approach ensures the generation
of excellent and perceptually plausible visual error concealment results, the outlier pruning property guarantees the significant quality improvements, both quantitatively and qualitatively. No intermediate
user-interaction is required for the pre-segmented media and the
presented method follows a bootstrapping approach for an automatic
visual loss recovery and the image and video error concealment.
Abstract: Both image steganography and image encryption have
advantages and disadvantages. Steganograhy allows us to hide a
desired image containing confidential information in a covered or
host image while image encryption is decomposing the desired image
to a non-readable, non-comprehended manner. The encryption
methods are usually much more robust than the steganographic ones.
However, they have a high visibility and would provoke the attackers
easily since it usually is obvious from an encrypted image that
something is hidden! The combination of steganography and
encryption will cover both of their weaknesses and therefore, it
increases the security. In this paper an image encryption method
based on sinc-convolution along with using an encryption key of 128
bit length is introduced. Then, the encrypted image is covered by a
host image using a modified version of JSteg steganography
algorithm. This method could be applied to almost all image formats
including TIF, BMP, GIF and JPEG. The experiment results show
that our method is able to hide a desired image with high security and
low visibility.
Abstract: The increasing importance of FlexRay systems in
automotive domain inspires unceasingly relative researches. One
primary issue among researches is to verify the reliability of FlexRay
systems either from protocol aspect or from system design aspect.
However, research rarely discusses the effect of network topology on
the system reliability. In this paper, we will illustrate how to model
the reliability of FlexRay systems with various network topologies by
a well-known probabilistic reasoning technology, Bayesian Network.
In this illustration, we especially investigate the effectiveness of error
containment built in star topology and fault-tolerant midpoint
synchronization algorithm adopted in FlexRay communication
protocol. Through a FlexRay steer-by-wire case study, the influence
of different topologies on the failure probability of the FlexRay steerby-
wire system is demonstrated. The notable value of this research is
to show that the Bayesian Network inference is a powerful and
feasible method for the reliability assessment of FlexRay systems.
Abstract: In the context of spectrum surveillance, a new method
to recover the code of spread spectrum signal is presented, while the
receiver has no knowledge of the transmitter-s spreading sequence. In
our previous paper, we used Genetic algorithm (GA), to recover
spreading code. Although genetic algorithms (GAs) are well known
for their robustness in solving complex optimization problems, but
nonetheless, by increasing the length of the code, we will often lead
to an unacceptable slow convergence speed. To solve this problem we
introduce Particle Swarm Optimization (PSO) into code estimation in
spread spectrum communication system. In searching process for
code estimation, the PSO algorithm has the merits of rapid
convergence to the global optimum, without being trapped in local
suboptimum, and good robustness to noise. In this paper we describe
how to implement PSO as a component of a searching algorithm in
code estimation. Swarm intelligence boasts a number of advantages
due to the use of mobile agents. Some of them are: Scalability, Fault
tolerance, Adaptation, Speed, Modularity, Autonomy, and
Parallelism. These properties make swarm intelligence very attractive
for spread spectrum code estimation. They also make swarm
intelligence suitable for a variety of other kinds of channels. Our
results compare between swarm-based algorithms and Genetic
algorithms, and also show PSO algorithm performance in code
estimation process.
Abstract: In this work, axisymetric CFD simulation of fixed bed
GTL reactor has been conducted, using computational fluid dynamics
(CFD). In fixed bed CFD modeling, when N (tube-to-particle
diameter ratio) has a large value, it is common to consider the packed
bed as a porous media. Synthesis gas (a mixture of predominantly
carbon monoxide and hydrogen) was fed to the reactor. The reactor
length was 20 cm, divided to three sections. The porous zone was in
the middle section of the reactor. The model equations were solved
employing finite volume method. The effects of particle diameter,
bed voidage, fluid velocity and bed length on pressure drop have
been investigated. Simulation results showed these parameters could
have remarkable impacts on the reactor pressure drop.
Abstract: Linear two-point boundary value problem of order two is solved using extended cubic B-spline interpolation method. There is one free parameters, λ, that control the tension of the solution curve. For some λ, this method produced better results than cubic B-spline interpolation method.
Abstract: Ti-6Al-4V alloy has demonstrated a high strength to
weight ratio as well as good properties at high temperature. The
successful application of the alloy in some important areas depends
on suitable joining techniques. Friction welding has many
advantageous features to be chosen for joining Titanium alloys. The
present work investigates the feasibility of producing similar metal
joints of this Titanium alloy by rotary friction welding method. The
joints are produced at three different speeds and the performances of
the welded joints are evaluated by conducting microstructure studies,
Vickers Hardness and tensile tests at the joints. It is found that the
weld joints produced are sound and the ductile fractures in the tensile
weld specimens occur at locations away from the welded joints. It is
also found that a rotational speed of 1500 RPM can produce a very
good weld, with other parameters kept constant.