Abstract: Along with increasing development of generation of supersonic planes especially fighters and request for increasing the performance and maneuverability scientists and engineers suggested the delta and double delta wing design. One of the areas which was necessary to be researched, was the Aerodynamic review of this type of wings in high angles of attack at low speeds that was very important in landing and takeoff the planes and maneuvers. Leading Edges of the wings,cause the separation flow from wing surface and then formation of powerful vortex with high rotational speed which studing the mechanism and location of formation and also the position of the vortex breakdown in high angles of attack is very important. In this research, a double delta wing with 76o/45o sweep angles at high angle of attack in steady state and incompressible flow were numerically analyzed with Fluent software. With analaysis of the numerical results, we arrived the most important characteristic of the double delta wings which is keeping of lift at high angles of attacks.
Abstract: Fuzzy Cognitive Maps (FCMs) is a causal graph, which shows the relations between essential components in complex systems. Experts who are familiar with the system components and their relations can generate a related FCM. There is a big gap when human experts cannot produce FCM or even there is no expert to produce the related FCM. Therefore, a new mechanism must be used to bridge this gap. In this paper, a novel learning method is proposed to construct causal graph based on historical data and by using metaheuristic such Tabu Search (TS). The efficiency of the proposed method is shown via comparison of its results of some numerical examples with those of some other methods.
Abstract: Adapting various sensor devices to communicate
within sensor networks empowers us by providing range of
possibilities. The sensors in sensor networks need to know their
measurable belief of trust for efficient and safe communication. In this
paper, we suggested a trust model using fuzzy logic in sensor network.
Trust is an aggregation of consensus given a set of past interaction
among sensors. We applied our suggested model to sensor networks in
order to show how trust mechanisms are involved in communicating
algorithm to choose the proper path from source to destination.
Abstract: FACTS devices are used to control the power flow, to
increase the transmission capacity and to optimize the stability of the
power system. One of the most widely used FACTS devices is
Unified Power Flow Controller (UPFC). The controller used in the
control mechanism has a significantly effects on controlling of the
power flow and enhancing the system stability of UPFC. According
to this, the capability of UPFC is observed by using different control
mechanisms based on P, PI, PID and fuzzy logic controllers (FLC) in
this study. FLC was developed by taking consideration of Takagi-
Sugeno inference system in the decision process and Sugeno-s
weighted average method in the defuzzification process. Case studies
with different operating conditions are applied to prove the ability of
UPFC on controlling the power flow and the effectiveness of
controllers on the performance of UPFC. PSCAD/EMTDC program
is used to create the FLC and to simulate UPFC model.
Abstract: Innovational development of regions in Russia is generally faced with the essential influence from federal and local authorities. The organization of effective mechanism of innovation development (and self-development) is impossible without establishment of defined institutional conditions in the analyzed field. Creative utilization of scientific concepts and information should merge, giving rise to continuing innovation and advanced production. The paper presents an analysis of institutional conditions in the field of creation and development of innovation activity infrastructure and transferring of knowledge and skills between different economic agents in Russia. Knowledge is mainly privately owned, developed through R&D investments and incorporated into technology or a product. Innovation infrastructure is a strong concentration mechanism of advanced facilities, which are mainly located inside large agglomerations or city-regions in order to benefit from scale effects in both input markets (human capital, private financial capital) and output markets (higher education services, research services). The empirical results of the paper show that in the presence of more efficient innovation and knowledge transfer and transcoding system and of a more open attitude of economic agents towards innovation, the innovation and knowledge capacity of regional economy is much higher.
Abstract: The present work is concerned with the free
convective two dimensional flow and heat transfer, in isotropic fluid
filled porous rectangular enclosure with differentially heated walls for
steady state incompressible flow have been investigated for non-
Darcy flow model. Effects of Darcy number (0.0001 £Da£ 10),
Rayleigh number (10 £Ra£ 5000), and aspect ratio (0.25 £AR£ 4), for
a range of porosity (0.4 £e£ 0.9) with and without moving lower wall
have been studied. The cavity was insulated at the lower and upper
surfaces. The right and left heated surfaces allows convective
transport through the porous medium, generating a thermal
stratification and flow circulations. It was found that the Darcy
number, Rayleigh number, aspect ratio, and porosity considerably
influenced characteristics of flow and heat transfer mechanisms. The
results obtained are discussed in terms of the Nusselt number,
vectors, contours, and isotherms.
Abstract: Asynchronous Transfer Mode (ATM) is widely used
in telecommunications systems to send data, video and voice at a
very high speed. In ATM network optimizing the bandwidth through
dynamic routing is an important consideration. Previous research
work shows that traditional optimization heuristics result in suboptimal
solution. In this paper we have explored non-traditional
optimization technique. We propose comparison of two such
algorithms - Genetic Algorithm (GA) and Tabu search (TS), based on
non-traditional Optimization approach, for solving the dynamic
routing problem in ATM networks which in return will optimize the
bandwidth. The optimized bandwidth could mean that some
attractive business applications would become feasible such as high
speed LAN interconnection, teleconferencing etc. We have also
performed a comparative study of the selection mechanisms in GA
and listed the best selection mechanism and a new initialization
technique which improves the efficiency of the GA.
Abstract: The VoIP networks as alternative method to traditional PSTN system has been implemented in a wide variety of structures
with multiple protocols, codecs, software and hardware–based
distributions. The use of cryptographic techniques let the users to have a secure communication, but the calculate throughput as well as the QoS parameters are affected according to the used algorithm. This
paper analyzes the VoIP throughput and the QoS parameters with
different commercial encryption methods. The measurement–based
approach uses lab scenarios to simulate LAN and WAN
environments. Security mechanisms such as TLS, SIAX2, SRTP,
IPSEC and ZRTP are analyzed with μ-LAW and GSM codecs.
Abstract: Service discovery is a very important component of Service Oriented Architectures (SOA). This paper presents two alternative approaches to customise the query results of private service registry such as Universal Description, Discovery and Integration (UDDI). The customisation is performed based on some pre-defined and/or real-time changing parameters. This work identifies the requirements, designs and additional mechanisms that must be applied to UDDI in order to support this customisation capability. We also detail the implements of the approaches and examine its performance and scalability. Based on our experimental results, we conclude that both approaches can be used to customise registry query results, but by storing personalization parameters in external resource will yield better performance and but less scalable when size of query results increases. We believe these approaches when combined with semantics enabled service registry will enhance the service discovery methods within a private UDDI registry environment.
Abstract: This paper explores an application of an adaptive learning mechanism for robots based on the natural immune system. Most of the research carried out so far are based either on the innate or adaptive characteristics of the immune system, we present a combination of these to achieve behavior arbitration wherein a robot learns to detect vulnerable areas of a track and adapts to the required speed over such portions. The test bed comprises of two Lego robots deployed simultaneously on two predefined near concentric tracks with the outer robot capable of helping the inner one when it misaligns. The helper robot works in a damage-control mode by realigning itself to guide the other robot back onto its track. The panic-stricken robot records the conditions under which it was misaligned and learns to detect and adapt under similar conditions thereby making the overall system immune to such failures.
Abstract: The gel-supported precipitation (GSP) process can be
used to make spherical particles (spherules) of nuclear fuel,
particularly for very high temperature reactors (VHTR) and even for
implementing the process called SPHEREPAC. In these different
cases, the main characteristics are the sphericity of the particles to be
manufactured and the control over their grain size. Nonetheless,
depending on the specifications defined for these spherical particles,
the GSP process has intrinsic limits, particularly when fabricating
very small particles. This paper describes the use of secondary
fragmentation (water, water/PVA and uranyl nitrate) on solid
surfaces under varying temperature and vibration conditions to assess
the relevance of using this new technique to manufacture very small
spherical particles by means of a modified GSP process. The
fragmentation mechanisms are monitored and analysed, before the
trends for its subsequent optimised application are described.
Abstract: This paper presents an integrated model that
automatically measures the change of rivers, damage area of bridge
surroundings, and change of vegetation. The proposed model is on the
basis of a neurofuzzy mechanism enhanced by SOM optimization
algorithm, and also includes three functions to deal with river imagery.
High resolution imagery from FORMOSAT-2 satellite taken before
and after the invasion period is adopted. By randomly selecting a
bridge out of 129 destroyed bridges, the recognition results show that
the average width has increased 66%. The ruined segment of the
bridge is located exactly at the most scour region. The vegetation
coverage has also reduced to nearly 90% of the original. The results
yielded from the proposed model demonstrate a pinpoint accuracy rate
at 99.94%. This study brings up a successful tool not only for
large-scale damage assessment but for precise measurement to
disasters.
Abstract: This paper presents an experimental investigation on
the machinability of laser-sintered material using small ball end mill focusing on wear mechanisms. Laser-sintered material was produced
by irradiating a laser beam on a layer of loose fine SCM-Ni-Cu powder. Bulk carbon steel JIS S55C was selected as a reference steel.
The effects of powder consolidation mechanisms and unsintered
powder on the tool life and wear mechanisms were carried out. Results indicated that tool life in cutting laser-sintered material is
lower than that in cutting JIS S55C. Adhesion of the work material and chipping were the main wear mechanisms of the ball end mill in
cutting laser-sintered material. Cutting with the unsintered powder
surrounding the tool and laser-sintered material had caused major fracture on the cutting edge.
Abstract: Domain-specific languages describe specific solutions to problems in the application domain. Traditionally they form a solution composing black-box abstractions together. This, usually, involves non-deep transformations over the target model. In this paper we argue that it is potentially powerful to operate with grey-box abstractions to build a domain-specific software system. We present parametric code templates as grey-box abstractions and conceptual tools to encapsulate and manipulate these templates. Manipulations introduce template-s merging routines and can be defined in a generic way. This involves reasoning mechanisms at the code templates level. We introduce the concept of Neurath Modelling Language (NML) that operates with parametric code templates and specifies a visualisation mapping mechanism for target models. Finally we provide an example of calculating a domain-specific software system with predefined NML elements.
Abstract: Nowadays, a passenger car suspension must has high
performance criteria with light weight, low cost, and low energy
consumption. Pilot controlled proportional valve is designed and
analyzed to get small pressure change rate after blow-off, and to get a
fast response of the damper, a reverse damping mechanism is adapted.
The reverse continuous variable damper is designed as a HS-SH
damper which offers good body control with reduced transferred input
force from the tire, compared with any other type of suspension
system. The damper structure is designed, so that rebound and
compression damping forces can be tuned independently, of which the
variable valve is placed externally. The rate of pressure change with
respect to the flow rate after blow-off becomes smooth when the fixed
orifice size increases, which means that the blow-off slope is
controllable using the fixed orifice size. Damping forces are measured
with the change of the solenoid current at the different piston
velocities to confirm the maximum hysteresis of 20 N, linearity, and
variance of damping force. The damping force variance is wide and
continuous, and is controlled by the spool opening, of which scheme is
usually adapted in proportional valves. The reverse continuous
variable damper developed in this study is expected to be utilized in
the semi-active suspension systems in passenger cars after its
performance and simplicity of the design is confirmed through a real
car test.
Abstract: A study of the H-beam's nanosize structure phase
states after thermomechanical strengthening was carried out by TEM.
The following processes were analyzed. 1. The dispersing of the
cementite plates by cutting them by moving dislocations. 2. The
dissolution of cementite plates and repeated precipitation of the
cementite particles on the dislocations, the boundaries, subgrains and
grains. 3. The decay of solid solution of carbon in the α-iron after
"self-tempering" of martensite. 4. The final transformation of the
retained austenite in beinite with α-iron particles and cementite
formation. 5. The implementation of the diffusion mechanism of γ ⇒
α transformation.
Abstract: The purpose of this study is to investigate the
relationship between corporate governance and pricing for initial
public offerings (IPOs). Empirical result finds that the prediction of
pricing of IPOs with corporate governance added can have a rather
higher degree of predicting accuracy than that of non governance
added during the training and testing samples. Therefore, it can be
observed that corporate governance mechanism can affect the pricing
of IPOs
Abstract: In multi hop wireless systems, such as ad hoc and
sensor networks, mobile ad hoc network applications are deployed,
security emerges as a central requirement. A particularly devastating
attack is known as the wormhole attack, where two or more malicious
colluding nodes create a higher level virtual tunnel in the network,
which is employed to transport packets between the tunnel end points.
These tunnels emulate shorter links in the network. In which
adversary records transmitted packets at one location in the network,
tunnels them to another location, and retransmits them into the
network. The wormhole attack is possible even if the attacker has not
compromised any hosts and even if all communication provides
authenticity and confidentiality. In this paper, we analyze wormhole
attack nature in ad hoc and sensor networks and existing methods of
the defending mechanism to detect wormhole attacks without require
any specialized hardware. This analysis able to provide in
establishing a method to reduce the rate of refresh time and the
response time to become more faster.
Abstract: With the demand of mobility by users, wireless
technologies have become the hotspot developing arena. Internet
Engineering Task Force (IETF) working group has developed Mobile
IP to support node mobility. The concept of node mobility indicates
that in spite of the movement of the node, it is still connected to the
internet and all the data transactions are preserved. It provides
location-independent access to Internet. After the incorporation of
host mobility, network mobility has undergone intense research.
There are several intricacies faced in the real world implementation
of network mobility significantly the problem of nested networks and
their consequences. This article is concerned regarding a problem of
nested network called pinball route problem and proposes a solution
to eliminate the above problem. The proposed mechanism is
implemented using NS2 simulation tool and it is found that the
proposed mechanism efficiently reduces the overload caused by the
pinball route problem.
Abstract: The paper shows how the CASMAS modeling language,
and its associated pervasive computing architecture, can be
used to facilitate continuity of care by providing members of patientcentered
communities of care with a support to cooperation and
knowledge sharing through the usage of electronic documents and
digital devices. We consider a scenario of clearly fragmented care to
show how proper mechanisms can be defined to facilitate a better
integration of practices and information across heterogeneous care
networks. The scenario is declined in terms of architectural components
and cooperation-oriented mechanisms that make the support
reactive to the evolution of the context where these communities
operate.