Abstract: The aim of the study was to follow changes of powervelocity
relationship in female volleyball players during an annual
training cycle. The study was conducted on eleven female volleyball
players: age 21.6±1.7 years, body height 177.9±4.7 cm, body mass
71.3±6.6 kg and training experience 8.6±3.3 years. Power–velocity
relationship was determined from five maximal 10-second
cycloergometer efforts with external loads equal: 2.5, 5.0, 7.5, 10.0
and 12.5% of body weight (BW) before (I) and after (II) the
preparatory period, after the first (III) and second (IV) competitive
season. The maximal power output increased from 9.30±0.85 W•kg–1
(I) to 9.50±0.96 W•kg–1 (II), 9.77±0.96 W•kg–1 (III) and 9.95±1.13
W•kg–1 (IV, p
Abstract: In this paper, the effects of thermodynamic,
hydrodynamic and geometric of an air cooled condenser on COP of
vapor compression cycle are investigated for a fixed condenser facing
surface area. The system is utilized with a scroll compressor,
modeled based on thermodynamic and heat transfer equations
employing Matlab software. The working refrigerant is R134a whose
thermodynamic properties are called from Engineering Equation
Software. This simulation shows that vapor compression cycle can
be designed by different configurations and COPs, economical and
optimum working condition can be obtained via considering these
parameters.
Abstract: IMCS is Integrated Monitoring and Control System for
thermal power plant. This system consists of mainly two parts; controllers and OIS (Operator Interface System). These two parts are
connected by Ethernet-based communication. The controller side of communication is managed by CNet module and OIS side is managed
by data server of OIS. CNet module sends the data of controller to data
server and receives commend data from data server. To minimizes or
balance the load of data server, this module buffers data created by controller at every cycle and send buffered data to data server on request of data server. For multiple data server, this module manages
the connection line with each data server and response for each request
from multiple data server. CNet module is included in each controller
of redundant system. When controller fail-over happens on redundant system, this module can provide data of controller to data sever
without loss. This paper presents three main features – separation of get task, usage of ring buffer and monitoring communication status –of CNet module to carry out these functions.
Abstract: Sandwich panels are widely used in the construction
industry for their ease of assembly, light weight and efficient thermal
performance. They are composed of two RC thin outer layers
separated by an insulating inner layer. In this research the inner
insulating layer is made of lightweight Autoclaved Aerated Concrete
(AAC) blocks which has good thermal insulation properties and yet
possess reasonable mechanical strength. The shear strength of the
AAC infill is relied upon to replace the traditionally used insulating
foam and to provide the shear capacity of the panel. A
comprehensive experimental program was conducted on full scale
sandwich panels subjected to bending. In this paper, detailed
numerical modeling of the tested sandwich panels is reported. Nonlinear
3-D finite element modeling of the composite action of the
sandwich panel is developed using ANSYS. Solid elements with
different crashing and cracking capabilities and different constitutive
laws were selected for the concrete and the AAC. Contact interface
elements are used in this research to adequately model the shear
transfer at the interface between the different layers. The numerical
results showed good correlation with the experimental ones
indicating the adequacy of the model in estimating the loading
capacity of panels.
Abstract: Experiments were conducted to characterize fire
properties of wood exposed to the certain external heat flux and
under variety of wood moisture content. Six kinds of Indonesian
wood: keruing, sono, cemara, kamper, pinus, and mahoni were
exposed to radiant heat from a conical heater, result in appearance of
a stable flame on the wood surface caused by spontaneous ignition. A
thermocouple K-type was used to measure the wood surface
temperature. Temperature histories were recorded throughout each
experiment at 1 s intervals using a TC-08. Data of first ignition time
and temperature, end ignition time and temperature, and charring rate
have been successfully collected. It was found that the ignition
temperature and charring rate depend on moisture content of wood.
Abstract: The present study based on removal of natural dyes of
Roselle petals, then used Roselle petals powder (RPP) as an
adsorbent for the removal of methylene blue dye (as a typical cationic
or basic dye) from aqueous solutions. The present study shows that
used Roselle petals powder exhibit adsorption trend for the dye. The
adsorption processes were carried out at various conditions of
temperatures ranging from 278 to 338 K ± 2 K , concentrations,
processing time and a wide range of pH between 2.5-11. Adsorption
isotherm equations such as Freundlich, and Langmuir were applied to
calculate the values of respective constants. Adsorption study was
found that the currently introduced adsorbent can be used to remove
cationic dyes such as methylene blue from aqueous solutions.
Abstract: Cognitive models allow predicting some aspects of utility
and usability of human machine interfaces (HMI), and simulating
the interaction with these interfaces. The action of predicting is based
on a task analysis, which investigates what a user is required to do
in terms of actions and cognitive processes to achieve a task. Task
analysis facilitates the understanding of the system-s functionalities.
Cognitive models are part of the analytical approaches, that do not
associate the users during the development process of the interface.
This article presents a study about the evaluation of a human
machine interaction with a contextual assistant-s interface using ACTR
and GOMS cognitive models. The present work shows how these
techniques may be applied in the evaluation of HMI, design and
research by emphasizing firstly the task analysis and secondly the
time execution of the task. In order to validate and support our
results, an experimental study of user performance is conducted at
the DOMUS laboratory, during the interaction with the contextual
assistant-s interface. The results of our models show that the GOMS
and ACT-R models give good and excellent predictions respectively
of users performance at the task level, as well as the object level.
Therefore, the simulated results are very close to the results obtained
in the experimental study.
Abstract: Vector quantization is a powerful tool for speech
coding applications. This paper deals with LPC Coding of speech
signals which uses a new technique called Multi Switched Split
Vector Quantization (MSSVQ), which is a hybrid of Multi, switched,
split vector quantization techniques. The spectral distortion
performance, computational complexity, and memory requirements
of MSSVQ are compared to split vector quantization (SVQ), multi
stage vector quantization(MSVQ) and switched split vector
quantization (SSVQ) techniques. It has been proved from results that
MSSVQ has better spectral distortion performance, lower
computational complexity and lower memory requirements when
compared to all the above mentioned product code vector
quantization techniques. Computational complexity is measured in
floating point operations (flops), and memory requirements is
measured in (floats).
Abstract: Neighborhood Rough Sets (NRS) has been proven to
be an efficient tool for heterogeneous attribute reduction. However,
most of researches are focused on dealing with complete and noiseless
data. Factually, most of the information systems are noisy, namely,
filled with incomplete data and inconsistent data. In this paper, we
introduce a generalized neighborhood rough sets model, called
VPTNRS, to deal with the problem of heterogeneous attribute
reduction in noisy system. We generalize classical NRS model with
tolerance neighborhood relation and the probabilistic theory.
Furthermore, we use the neighborhood dependency to evaluate the
significance of a subset of heterogeneous attributes and construct a
forward greedy algorithm for attribute reduction based on it.
Experimental results show that the model is efficient to deal with noisy
data.
Abstract: Soils are normally dried in either a convection oven or stove. Laboratory moisture content testing indicated that the typical drying durations for a convection oven were, 24 hours. The purpose of this study was to determine the accuracy and soil drying duration of both, moisture content and liquid limit using microwave radiation. The soils were tested with both, convection and microwave ovens. The convection oven was considered to produce the true values for both, natural moisture content and liquid limit of soils; it was, therefore, used as a basis for comparison for the results of the microwave ovens. The samples used in this study were obtained from different projects of Consulting Engineering Bureau of College of Engineering of Sulaimani University. These samples were collected from different locations and at the different depths and consist mostly of brown and light brown clay and silty clay. A total of 102 samples were prepared. 26 of them were tested for natural moisture determination, while the other 76 were used for liquid limits determination
Abstract: Information technology managers nowadays are
facing with tremendous pressure to plan, implement, and adopt new
technology solution due to the rapidity of technology changes.
Resulted from a lack of study that have been done in this topic, the
aim of this paper is to provide a comparison review on current tools
that are currently being used in order to respond to technological
changes. The study is based on extensive literature review of
published works with majority of them are ranging from 2000 to the
first part of 2011. The works were gathered from journals, books,
and other information sources available on the Web. Findings show
that, each tools has different focus and none of the tools are
providing a framework in holistic view, which should include
technical, people, process, and business environment aspect. Hence,
this result provides potential information about current available
tools that IT managers could use to manage changes in technology.
Further, the result reveals a research gap in the area where the
industries a short of such framework.
Abstract: A challenging problem in radar signal processing is to
achieve reliable target detection in the presence of interferences. In
this paper, we propose a novel algorithm for automatic censoring of
radar interfering targets in log-normal clutter. The proposed
algorithm, termed the forward automatic censored cell averaging
detector (F-ACCAD), consists of two steps: removing the corrupted
reference cells (censoring) and the actual detection. Both steps are
performed dynamically by using a suitable set of ranked cells to
estimate the unknown background level and set the adaptive
thresholds accordingly. The F-ACCAD algorithm does not require
any prior information about the clutter parameters nor does it require
the number of interfering targets. The effectiveness of the F-ACCAD
algorithm is assessed by computing, using Monte Carlo simulations,
the probability of censoring and the probability of detection in
different background environments.
Abstract: The purpose of this study is to analyze the islands
tourist travel information sources, as well as for the satisfaction of the
tourist destination services. This study used questionnaires to the
island of Taiwan to the Penghu Islands to engage in tourism activities
tourist adopt the designated convenience sampling method, a total of
889 valid questionnaires were collected. After statistical analysis, this
study found that: 1. tourists to the Penghu Islands travel information
source for “friends and family came to Penghu". 2. Tourists feel the
service of the outlying islands of Penghu, the highest feelings of
“friendly local residents". 3. There are different demographic variables
affect the tourist travel information source and service satisfaction.
Based on the findings of this study not only for Penghu's tourism
industry with the unit in charge of the proposed operating and
suggestions for future research to other researchers.
Abstract: Querying a data source and routing data towards sink
becomes a serious challenge in static wireless sensor networks if sink
and/or data source are mobile. Many a times the event to be observed
either moves or spreads across wide area making maintenance of
continuous path between source and sink a challenge. Also, sink can
move while query is being issued or data is on its way towards sink.
In this paper, we extend our already proposed Grid Based Data
Dissemination (GBDD) scheme which is a virtual grid based
topology management scheme restricting impact of movement of
sink(s) and event(s) to some specific cells of a grid. This obviates the
need for frequent path modifications and hence maintains continuous
flow of data while minimizing the network energy consumptions.
Simulation experiments show significant improvements in network
energy savings and average packet delay for a packet to reach at sink.
Abstract: In today-s new technology era, cluster has become a
necessity for the modern computing and data applications since many
applications take more time (even days or months) for computation.
Although after parallelization, computation speeds up, still time
required for much application can be more. Thus, reliability of the
cluster becomes very important issue and implementation of fault
tolerant mechanism becomes essential. The difficulty in designing a
fault tolerant cluster system increases with the difficulties of various
failures. The most imperative obsession is that the algorithm, which
avoids a simple failure in a system, must tolerate the more severe
failures. In this paper, we implemented the theory of watchdog timer
in a parallel environment, to take care of failures. Implementation of
simple algorithm in our project helps us to take care of different
types of failures; consequently, we found that the reliability of this
cluster improves.
Abstract: We board the problem of creating a seismic alert
system, based upon artificial neural networks, trained by using the
well-known back-propagation and genetic algorithms, in order to emit
the alarm for the population located into a specific city, about an
eminent earthquake greater than 4.5 Richter degrees, and avoiding
disasters and human loses. In lieu of using the propagation wave, we
employed the magnitude of the earthquake, to establish a correlation
between the recorded magnitudes from a controlled area and the city,
where we want to emit the alarm. To measure the accuracy of the
posed method, we use a database provided by CIRES, which contains
the records of 2500 quakes incoming from the State of Guerrero
and Mexico City. Particularly, we performed the proposed method to
generate an issue warning in Mexico City, employing the magnitudes
recorded in the State of Guerrero.
Abstract: Image synthesis is an important area in image processing.
To synthesize images various systems are proposed in
the literature. In this paper, we propose a bio-inspired system to
synthesize image and to study the generating power of the system, we
define the class of languages generated by our system. We call image
as array in this paper. We use a primitive called iso-array to synthesize
image/array. The operation is double splicing on iso-arrays. The
double splicing operation is used in DNA computing and we use
this to synthesize image. A comparison of the family of languages
generated by the proposed self restricted double splicing systems on
iso-arrays with the existing family of local iso-picture languages is
made. Certain closure properties such as union, concatenation and
rotation are studied for the family of languages generated by the
proposed model.
Abstract: In Grid computing, a data transfer protocol called
GridFTP has been widely used for efficiently transferring a large volume
of data. Currently, two versions of GridFTP protocols, GridFTP
version 1 (GridFTP v1) and GridFTP version 2 (GridFTP v2), have
been proposed in the GGF. GridFTP v2 supports several advanced
features such as data streaming, dynamic resource allocation, and
checksum transfer, by defining a transfer mode called X-block mode.
However, in the literature, effectiveness of GridFTP v2 has not been
fully investigated. In this paper, we therefore quantitatively evaluate
performance of GridFTP v1 and GridFTP v2 using mathematical
analysis and simulation experiments. We reveal the performance
limitation of GridFTP v1, and quantitatively show effectiveness of
GridFTP v2. Through several numerical examples, we show that by
utilizing the data streaming feature, the average file transfer time of
GridFTP v2 is significantly smaller than that of GridFTP v1.
Abstract: Object-oriented programming is a wonderful way to
make programming of huge real life tasks much easier than by using
procedural languages. In order to teach those ideas to students, it
is important to find a good task that shows the advantages of OOprogramming
very naturally. This paper gives an example, the game
Battleship, which seems to work excellent for teaching the OO ideas
(using Java, [1], [2], [3], [4]).
A three-step task is presented for how to teach OO-programming
using just one example suitable to convey many of the OO ideas.
Observations are given at the end and conclusions about how the
whole teaching course worked out.
Abstract: Cell phone forensics to acquire and analyze data in the
cellular phone is nowadays being used in a national investigation
organization and a private company. In order to collect cellular phone
flash memory data, we have two methods. Firstly, it is a logical
method which acquires files and directories from the file system of the
cell phone flash memory. Secondly, we can get all data from bit-by-bit
copy of entire physical memory using a low level access method. In
this paper, we describe a forensic tool to acquire cell phone flash
memory data using a logical level approach. By our tool, we can get
EFS file system and peek memory data with an arbitrary region from
Korea CDMA cell phone.