Abstract: In order to better understand the performance of
screen channel liquid acquisition devices (LADs) in liquid oxygen (LOX), a computational fluid dynamics (CFD) simulation of LOX passing through a LAD screen channel was conducted. In the
simulation, the screen is taken as a 'porous jump' where the pressure
drop across the screen depends on the incoming velocity and is formulated by Δp = Av + Bv2
. The CFD simulation reveals the importance of the pressure losses due to the flow entering from
across the screen and impacting and merging with the channel flow
and the vortices in the channel to the cumulative flow resistance. In fact, both the flow resistance of flows impact and mergence and the
resistance created by vortices are much larger than the friction and dynamic pressure losses in the channel and are comparable to the
flow resistance across the screen. Therefore, these resistances in the
channel must be considered as part of the evaluation for the LAD
channel performance. For proper operation of a LAD in LOX these resistances must be less than the bubble point pressure for the screen
channel in LOX. The simulation also presents the pressure and velocity distributions within the LAD screen channel, expanding the understanding of the fluid flow characteristics within the channel.
Abstract: The migration of a deformable drop in simple shear
flow at finite Reynolds numbers is investigated numerically by
solving the full Navier-Stokes equations using a finite
difference/front tracking method. The objectives of this study are to
examine the effectiveness of the present approach to predict the
migration of a drop in a shear flow and to investigate the behavior of
the drop migration with different drop sizes and non-unity viscosity
ratios. It is shown that the drop deformation depends strongly on the
capillary number, so that; the proper non-dimensional number for the
interfacial tension is the capillary number. The rate of migration
increased with increasing the drop radius. In other words, the
required time for drop migration to the centreline decreases. As the
viscosity ratio increases, the drop rotates more slowly and the
lubrication force becomes stronger. The increased lubrication force
makes it easier for the drop to migrate to the centre of the channel.
The migration velocity of the drop vanishes as the drop reaches the
centreline under viscosity ratio of one and non-unity viscosity ratios.
To validate the present calculations, some typical results are
compared with available experimental and theoretical data.
Abstract: A block backward differentiation formula of uniform
order eight is proposed for solving first order stiff initial value
problems (IVPs). The conventional 8-step Backward Differentiation
Formula (BDF) and additional methods are obtained from the same
continuous scheme and assembled into a block matrix equation which
is applied to provide the solutions of IVPs on non-overlapping
intervals. The stability analysis of the method indicates that the
method is L0-stable. Numerical results obtained using the proposed
new block form show that it is attractive for solutions of stiff problems
and compares favourably with existing ones.
Abstract: This paper discusses a new heavy tailed distribution based data hiding into discrete cosine transform (DCT) coefficients of image, which provides statistical security as well as robustness against steganalysis attacks. Unlike other data hiding algorithms, the proposed technique does not introduce much effect in the stegoimage-s DCT coefficient probability plots, thus making the presence of hidden data statistically undetectable. In addition the proposed method does not compromise on hiding capacity. When compared to the generic block DCT based data-hiding scheme, our method found more robust against a variety of image manipulating attacks such as filtering, blurring, JPEG compression etc.
Abstract: Ants are fascinating creatures that demonstrate the
ability to find food and bring it back to their nest. Their ability as a
colony, to find paths to food sources has inspired the development of
algorithms known as Ant Colony Systems (ACS). The principle of
cooperation forms the backbone of such algorithms, commonly used
to find solutions to problems such as the Traveling Salesman
Problem (TSP). Ants communicate to each other through chemical
substances called pheromones. Modeling individual ants- ability to
manipulate this substance can help an ACS find the best solution.
This paper introduces a Dynamic Ant Colony System with threelevel
updates (DACS3) that enhance an existing ACS. Experiments
were conducted to observe single ant behavior in a colony of
Malaysian House Red Ants. Such behavior was incorporated into the
DACS3 algorithm. We benchmark the performance of DACS3 versus
DACS on TSP instances ranging from 14 to 100 cities. The result
shows that the DACS3 algorithm can achieve shorter distance in
most cases and also performs considerably faster than DACS.
Abstract: In this paper, self-starting block hybrid method of
order (5,5,5,5)T is proposed for the solution of the special second
order ordinary differential equations with associated initial or
boundary conditions. The continuous hybrid formulations enable us
to differentiate and evaluate at some grids and off – grid points to
obtain four discrete schemes, which were used in block form for
parallel or sequential solutions of the problems. The computational
burden and computer time wastage involved in the usual reduction of
second order problem into system of first order equations are avoided
by this approach. Furthermore, a stability analysis and efficiency of
the block method are tested on stiff ordinary differential equations,
and the results obtained compared favorably with the exact solution.
Abstract: The performance of ground to deep space optical
communication systems is degraded by distortion of the beam as it
propagates through the turbulent atmosphere. Turbulence causes
fluctuations in the intensity of the received signal which ultimately
affects the acquisition time required to acquire and locate the spaceborne
target using narrow laser beam. In this paper, performance of
free-space optical (FSO) communication system in atmospheric
turbulence has been analyzed in terms of acquisition time for
coherent and non-coherent modulation schemes. Numerical results
presented in graphical and tabular forms show that the acquisition
time increases with the increase in turbulence level. This is true for
both schemes. The BPSK has lowest acquisition time among all
schemes. In non-coherent schemes, M-PPM performs better than the
other schemes. With the increase in M, acquisition time becomes
lower, but at the cost of increase in system complexity.
Abstract: In space during functioning, a satellite will be heated
up due to the behavior of its components such as power electronics.
In order to prevent problems in the satellite, this heat has to be
released in space thanks to the cooling system. This system consists
of a loop heat pipe (LHP), in which a fluid streams through an
evaporator and a condenser. In the evaporator, the fluid captures the
heat from the satellite and evaporates. Then it flows to the condenser
where it releases the heat and it condenses. In this project, the two
mains parts of a cooling system are studied: the evaporator and the
condenser. The study of the diphasic loop was done starting from
digital simulations carried out under Matlab and Femlab.
Abstract: At present the process of formation of corporate
values in Kazakh universities is under the influence of a whole range
of socio-economic and cultural changes: on the one hand universities
must maintain and transmit traditional cultural values of education,
on the other, to improve quality of service and to involve young
people to science, providing thus own competitiveness. Thus, this
article presents some results of two cycles of sociological research
conducted in 2012 and aimed at identifying possible ways to
popularize science and readiness to participate of youth in given
activities, expectations of young scientists and the prospects of future
development of the Kazakh science.
Abstract: Finding suitable non-supersingular elliptic curves for
pairing-based cryptosystems becomes an important issue for the
modern public-key cryptography after the proposition of id-based
encryption scheme and short signature scheme. In previous work
different algorithms have been proposed for finding such elliptic
curves when embedding degree k ∈ {3, 4, 6} and cofactor h ∈ {1, 2, 3,
4, 5}. In this paper a new method is presented to find more
non-supersingular elliptic curves for pairing-based cryptosystems with
general embedding degree k and large values of cofactor h. In
addition, some effective parameters of these non-supersingular elliptic
curves are provided in this paper.
Abstract: In this study integral form and new recursive formulas
for Favard constants and some connected with them numeric and
Fourier series are obtained. The method is based on preliminary
integration of Fourier series which allows for establishing finite
recursive representations for the summation. It is shown that the
derived recursive representations are numerically more effective than
known representations of the considered objects.
Abstract: In this paper we discuss the development of an Augmented Reality (AR) - based scientific visualization system prototype that supports identification, localisation, and 3D visualisation of oil leakages sensors datasets. Sensors generates significant amount of multivariate datasets during normal and leak situations. Therefore we have developed a data model to effectively manage such data and enhance the computational support needed for the effective data explorations. A challenge of this approach is to reduce the data inefficiency powered by the disparate, repeated, inconsistent and missing attributes of most available sensors datasets. To handle this challenge, this paper aim to develop an AR-based scientific visualization interface which automatically identifies, localise and visualizes all necessary data relevant to a particularly selected region of interest (ROI) along the virtual pipeline network. Necessary system architectural supports needed as well as the interface requirements for such visualizations are also discussed in this paper.
Abstract: Current advancements in nanotechnology are dependent
on the capabilities that can enable nano-scientists to extend their eyes
and hands into the nano-world. For this purpose, a haptics (devices
capable of recreating tactile or force sensations) based system for
AFM (Atomic Force Microscope) is proposed. The system enables
the nano-scientists to touch and feel the sample surfaces, viewed
through AFM, in order to provide them with better understanding of
the physical properties of the surface, such as roughness, stiffness and
shape of molecular architecture. At this stage, the proposed work uses
of ine images produced using AFM and perform image analysis to
create virtual surfaces suitable for haptics force analysis. The research
work is in the process of extension from of ine to online process
where interaction will be done directly on the material surface for
realistic analysis.
Abstract: A statistical optimization of the saccharification
process of EFB was studied. The statistical analysis was done by
applying faced centered central composite design (FCCCD) under
response surface methodology (RSM). In this investigation, EFB
dose, enzyme dose and saccharification period was examined, and the
maximum 53.45% (w/w) yield of reducing sugar was found with 4%
(w/v) of EFB, 10% (v/v) of enzyme after 120 hours of incubation. It
can be calculated that the conversion rate of cellulose content of the
substrate is more than 75% (w/w) which can be considered as a
remarkable achievement. All the variables, linear, quadratic and
interaction coefficient, were found to be highly significant, other than
two coefficients, one quadratic and another interaction coefficient.
The coefficient of determination (R2) is 0.9898 that confirms a
satisfactory data and indicated that approximately 98.98% of the
variability in the dependent variable, saccharification of EFB, could
be explained by this model.
Abstract: This work is devoted to the calculation of the
undulatory parameters and the study of the influence of te number
parallel path of a winding on overvoltage compared to the frame and
between turns (sections) in a multiturn random winding of an
asynchronous motors supplied with PWM- converters.
Abstract: This paper presents an algorithm based on the
wavelet decomposition, for feature extraction from the ECG signal
and recognition of three types of Ventricular Arrhythmias using
neural networks. A set of Discrete Wavelet Transform (DWT)
coefficients, which contain the maximum information about the
arrhythmias, is selected from the wavelet decomposition. After that a
novel clustering algorithm based on nature inspired algorithm (Ant
Colony Optimization) is developed for classifying arrhythmia types.
The algorithm is applied on the ECG registrations from the MIT-BIH
arrhythmia and malignant ventricular arrhythmia databases. We
applied Daubechies 4 wavelet in our algorithm. The wavelet
decomposition enabled us to perform the task efficiently and
produced reliable results.
Abstract: Voice Over IP (VoIP) is a technology that could pass
the voice traffic and data packet form over an IP network. Network
can be used for intranet or Internet. Phone calls using VoIP has
advantages in terms of cheaper cost of PSTN phone to more than
half, because the cost is calculated by the cost of the global nature of
the Internet. Session Initiation Protocol (SIP) is a signaling protocol
at the application layer which serves to establish, modify, and
terminate a multimedia session involving one or more users. This SIP
signaling has SIP message in text form that is used for session
management by the SIP components, such as User Agent, Registrar,
Redirect Server, and Proxy Server. To build a SIP communication is
required SIP Express Router (SER) to be able to receive SIP
messages, for handling the basic functions of SIP messages.
Problems occur when the NAT through which affects the voice
communication will be blocked starting from the sound that is not
sent or one side of the sound are sent (half duplex). How that could
be used to penetrate NAT is to use a given mediaproxy random RTP
port to penetrate NAT.
Abstract: This paper presents a case study that uses processoriented
simulation to identify bottlenecks in the service delivery
system in an emergency department of a hospital in the United Arab
Emirates. Using results of the simulation, response surface models
were developed to explain patient waiting time and the total time
patients spend in the hospital system. Results of the study could be
used as a service improvement tool to help hospital management in
improving patient throughput and service quality in the hospital
system.
Abstract: The increase popularity of multimedia application especially in image processing places a great demand on efficient data storage and transmission techniques. Network communication such as wireless network can easily be intercepted and cause of confidential information leaked. Unfortunately, conventional compression and encryption methods are too slow; it is impossible to carry out real time secure image processing. In this research, Embedded Zerotree Wavelet (EZW) encoder which specially designs for wavelet compression is examined. With this algorithm, three methods are proposed to reduce the processing time, space and security protection that will be secured enough to protect the data.
Abstract: The technique of k-anonymization has been proposed to obfuscate private data through associating it with at least k identities. This paper investigates the basic tabular structures that
underline the notion of k-anonymization using cell suppression.
These structures are studied under idealized conditions to identify the
essential features of the k-anonymization notion. We optimize data kanonymization
through requiring a minimum number of anonymized
values that are balanced over all columns and rows. We study the
relationship between the sizes of the anonymized tables, the value k, and the number of attributes. This study has a theoretical value through contributing to develop a mathematical foundation of the kanonymization
concept. Its practical significance is still to be
investigated.