Abstract: Capacity and efficiency of any refrigerating system
diminish rapidly as the difference between the evaporating and
condensing temperature is increased by reduction in the evaporator
temperature. The single stage vapour compression refrigeration
system is limited to an evaporator temperature of -40 0C. Below
temperature of -40 0C the either cascade refrigeration system or multi
stage vapour compression system is employed. Present work
describes thermal design of main three heat exchangers namely
condenser (HTS), cascade condenser and evaporator (LTS) of
R404A-R508B and R410A-R23 cascade refrigeration system. Heat
transfer area of condenser (HTS), cascade condenser and evaporator
(LTS) for both systems have been compared and the effect of
condensing and evaporating temperature on heat-transfer area for
both systems have been studied under same operating condition. The
results shows that the required heat-transfer area of condenser and
cascade condenser for R410A-R23 cascade system is lower than the
R404A-R508B cascade system but heat transfer area of evaporator is
similar for both the system. The heat transfer area of condenser and
cascade condenser decreases with increase in condensing temperature
(Tc), whereas the heat transfer area of cascade condenser and
evaporator increases with increase in evaporating temperature (Te).
Abstract: In this study, we introduced a communication system
where human body was used as medium through which data were
transferred. Multiple biosignal sensing units were attached to a subject
and wireless personal area network was formed. Data of the sensing
units were shared among them. We used wideband pulse
communication that was simple, low-power consuming and high data
rated. Each unit functioned as independent communication device or
node. A method of channel search and communication among the
modes was developed. A protocol of carrier sense multiple
access/collision detect was implemented in order to avoid data
collision or interferences. Biosignal sensing units should be located at
different locations due to the nature of biosignal origin. Our research
provided a flexibility of collecting data without using electrical wires.
More non-constrained measurement was accomplished which was
more suitable for u-Health monitoring.
Abstract: The paper presents a comparative performance of the
models developed to predict 28 days compressive strengths using
neural network techniques for data taken from literature (ANN-I) and
data developed experimentally for SCC containing bottom ash as
partial replacement of fine aggregates (ANN-II). The data used in the
models are arranged in the format of six and eight input parameters
that cover the contents of cement, sand, coarse aggregate, fly ash as
partial replacement of cement, bottom ash as partial replacement of
sand, water and water/powder ratio, superplasticizer dosage and an
output parameter that is 28-days compressive strength and
compressive strengths at 7 days, 28 days, 90 days and 365 days,
respectively for ANN-I and ANN-II. The importance of different
input parameters is also given for predicting the strengths at various
ages using neural network. The model developed from literature data
could be easily extended to the experimental data, with bottom ash as
partial replacement of sand with some modifications.
Abstract: The Cluster Dimension of a network is defined as, which is the minimum cardinality of a subset S of the set of nodes having the property that for any two distinct nodes x and y, there exist the node Si, s2 (need not be distinct) in S such that ld(x,s1) — d(y, s1)1 > 1 and d(x,s2) < d(x,$) for all s E S — {s2}. In this paper, strictly non overlap¬ping clusters are constructed. The concept of LandMarks for Unique Addressing and Clustering (LMUAC) routing scheme is developed. With the help of LMUAC routing scheme, It is shown that path length (upper bound)PLN,d < PLD, Maximum memory space requirement for the networkMSLmuAc(Az) < MSEmuAc < MSH3L < MSric and Maximum Link utilization factor MLLMUAC(i=3) < MLLMUAC(z03) < M Lc
Abstract: The aim of this work is to investigate on the internalflow
patterns in a plate heat exchanger channel, which affect the
rate of sedimentation fouling on the heat transfer surface of the
plate heat exchanger. The research methodologies were the
computer simulation using Computational Fluid Dynamics (CFD)
and the experimental works. COMSOL MULTIPHYSICS™
Version 3.3 was used to simulate the velocity flow fields to verify
the low and high flow regions. The results from the CFD technique
were then compared with the images obtained from the
experiments in which the fouling test rig was set up with a singlechannel
plate heat exchanger to monitor the fouling of calcium
carbonate. Two parameters were varied i.e., the crossing angle of
the two plate: 55/55, 10/10, and 55/10 degree, and the fluid flow
rate at the inlet: 0.0566, 0.1132 and 0.1698 m/s. The type of plate
“GX-12" (the surface area 0.12 m2, the depth 2.9 mm, the width of
fluid flow 215 mm and the thickness of stainless plate of 0.5 mm)
was used in this study. The results indicated that the velocity
distribution for the case of 55/55 degree seems to be very well
organized when compared with the others. Also, an increase in the
inlet velocity resulted in the reduction of fouling rate on the surface
of plate heat exchangers.
Abstract: This study suggests how an order-receiving company
can avoid disclosing schedule information on unit tasks to the
order-placing company when carrying out a collaborative project on
the value chain in an order-oriented industry. Specifically, it suggests
methods for keeping schedule information confidential, and
categorizes potential situations by inter-task dependency. Lastly, an
approach to select the most optimal non-disclosure method is
discussed. With the methods for not disclosing work-related
information suggested in the study, order-receiving companies can
logically deal with political issues relating to the question of whether
or not to disclose information upon the execution of a collaborative
project in cooperation with an order-placing firm. Moreover,
order-placing companies can monitor undistorted information, while
respecting the legitimate rights of an order-receiving company.
Therefore, it is fair to say that the suggestions made in this study will
contribute to the smooth operation of collaborative intercompany
projects.
Abstract: In order to monitor for traffic traversal, sensors can be
deployed to perform collaborative target detection. Such a sensor
network achieves a certain level of detection performance with the
associated costs of deployment and routing protocol. This paper
addresses these two points of sensor deployment and routing algorithm
in the situation where the absolute quantity of sensors or total energy
becomes insufficient. This discussion on the best deployment system
concluded that two kinds of deployments; Normal and Power law
distributions, show 6 and 3 times longer than Random distribution in
the duration of coverage, respectively. The other discussion on routing
algorithm to achieve good performance in each deployment system
was also addressed. This discussion concluded that, in place of the
traditional algorithm, a new algorithm can extend the time of coverage
duration by 4 times in a Normal distribution, and in the circumstance
where every deployed sensor operates as a binary model.
Abstract: Due to their high power-to-weight ratio and low cost, pneumatic actuators are attractive for robotics and automation applications; however, achieving fast and accurate control of their position have been known as a complex control problem. The paper presents a methodology for obtaining controllers that achieve high position accuracy and preserve the closed-loop characteristics over a broad operating range. Experimentation with a number of conventional (or "classical") three-term controllers shows that, as repeated operations accumulate, the characteristics of the pneumatic actuator change requiring frequent re-tuning of the controller parameters (PID gains). Furthermore, three-term controllers are found to perform poorly in recovering the closed-loop system after the application of load or other external disturbances. The key reason for these problems lies in the non-linear exchange of energy inside the cylinder relating, in particular, to the complex friction forces that develop on the piston-wall interface. In order to overcome this problem but still remain within the boundaries of classical control methods, we designed an auto selective classicaql controller so that the system performance would benefit from all three control gains (KP, Kd, Ki) according to system requirements and the characteristics of each type of controller. This challenging experimentation took place for consistent performance in the face of modelling imprecision and disturbances. In the work presented, a selective PID controller is presented for an experimental rig comprising an air cylinder driven by a variable-opening pneumatic valve and equipped with position and pressure sensors. The paper reports on tests carried out to investigate the capability of this specific controller to achieve consistent control performance under, repeated operations and other changes in operating conditions.
Abstract: Most of the collision warning systems currently
available in the automotive market are mainly designed to warn
against imminent rear-end and lane-changing collisions. No collision
warning system is commercially available to warn against imminent
turning collisions at intersections, especially for left-turn collisions
when a driver attempts to make a left-turn at either a signalized or
non-signalized intersection, conflicting with the path of other
approaching vehicles traveling on the opposite-direction traffic
stream. One of the major factors that lead to left-turn collisions is the
human error and misjudgment of the driver of the turning vehicle
when perceiving the speed and acceleration of other vehicles
traveling on the opposite-direction traffic stream; therefore, using a
properly-designed collision warning system will likely reduce, or
even eliminate, this type of collisions by reducing human error. This
paper introduces perceptual framework for a proposed collision
warning system that can detect imminent left-turn collisions at
intersections. The system utilizes a commercially-available detection
sensor (either a radar sensor or a laser detector) to detect approaching
vehicles traveling on the opposite-direction traffic stream and
calculate their speeds and acceleration rates to estimate the time-tocollision
and compare that time to the time required for the turning
vehicle to clear the intersection. When calculating the time required
for the turning vehicle to clear the intersection, consideration is given
to the perception-reaction time of the driver of the turning vehicle,
which is the time required by the driver to perceive the message
given by the warning system and react to it by engaging the throttle.
A regression model was developed to estimate perception-reaction
time based on age and gender of the driver of the host vehicle.
Desired acceleration rate selected by the driver of the turning vehicle,
when making the left-turn movement, is another human factor that is
considered by the system. Another regression model was developed
to estimate the acceleration rate selected by the driver of the turning
vehicle based on driver-s age and gender as well as on the location
and speed of the nearest approaching vehicle along with the
maximum acceleration rate provided by the mechanical
characteristics of the turning vehicle. By comparing time-to-collision
with the time required for the turning vehicle to clear the intersection,
the system displays a message to the driver of the turning vehicle
when departure is safe. An application example is provided to
illustrate the logic algorithm of the proposed system.
Abstract: One of the important steps in a safety and risk management system is the economical evaluation of occupational accident and diseases costs in order to decrease accidents from reoccurring in the workplace. This study proposed a plausible method for calculating occupational accident costs and illnesses in work place. This method design for cost estimation takes into account both the personnel, organizational level as well as the community level especially intended for an Iranian work place. The research indicates that a using systematic method for calculating costs which also provides risk evaluation can help managers to plan correctly the investment in health and safety measures. Using this method is that not only is it comprehensive, easy and practical and could be applied in practice by a manager within a short period of time but it also shows the importance of accident costs as well as calculates the real cost of an accident and illnesses.
Abstract: The paper presents the service learning project titled
DicDucFac (idea-leadership-product), that was planned and
conducted by the team of information sciences students. It was
planned as a workshop dealing with the application of modern social
media (Facebook, YouTube, Gmail) for the purposes of selfpromotion,
free advertising via social networks and marketing own
ideas and/or products in the virtual world. The workshop was
organized for highly-skilled computer literate unemployed youth.
These youth, as final beneficiaries, will be able to apply what they
learned in this workshop to “the real world“, increasing their chances
for employment and self-employment. The results of the project
reveal that the basic, active-learning principles embodied in our
teaching approach allow students to learn more effectively and gain
essential life skills (from computer applications to teamwork) that
can only be learned by doing. It also shows that our students received
the essentials of professional ethics and citizenship through direct,
personal engagement in professional activities and the life of the
community.
Abstract: The Resource-Constrained Project Scheduling
Problem (RCPSP) is concerned with single-item or small batch
production where limited resources have to be allocated to dependent
activities over time. Over the past few decades, a lot of work has
been made with the use of optimal solution procedures for this basic
problem type and its extensions. Brucker and Knust[1] discuss, how
timetabling problems can be modeled as a RCPSP. Authors discuss
high school timetabling and university course timetabling problem as
an example. We have formulated two mathematical formulations of
course timetabling problem in a new way which are the prototype of
single-mode RCPSP. Our focus is to show, how course timetabling
problem can be transformed into RCPSP. We solve this
transformation model with genetic algorithm.
Abstract: This article provides a comparative analysis of poetries of diverse nations around the world while largely focusing on Kazakh lyric poetry (Kazakh zhyraulyq oneri). Alongside, it sheds the light to the historical development and contemporary progress path of foremost poetry school located along the Syr Darya coast. Hereby, it-s content and central motives are examined.
Abstract: Hospitals in southern Hualien teamed with the
Hypertension Joint Care Network. Working with the network, the
team provided a special designed health education to the individual
who had been identified as a hypertension patient in the outpatient
department. Some metabolism improvements achieved. This is a
retrospective study by purposively taking 106 patients from a hospital
between 2008 and 2010. Records of before and after education
intervention of the objects was collected and analyzed to see the how
the intervention affected the patients- hypertension control via clinical
parameter monitoring. The results showed that the clinical indicators,
the LDL-C, the cholesterol and the systolic blood pressure were
significantly improved. The study provides evidence for the
effectiveness of the network in controlling hypertension.
Abstract: In the modern manufacturing systems, the use of
thermal cutting techniques using oxyfuel, plasma and laser have
become indispensable for the shape forming of high quality complex
components; however, the conventional chip removal production
techniques still have its widespread space in the manufacturing
industry. Both these types of machining operations require the
positioning of end effector tool at the edge where the cutting process
commences. This repositioning of the cutting tool in every machining
operation is repeated several times and is termed as non-productive
time or airtime motion. Minimization of this non-productive
machining time plays an important role in mass production with high
speed machining. As, the tool moves from one region to the other by
rapid movement and visits a meticulous region once in the whole
operation, hence the non-productive time can be minimized by
synchronizing the tool movements. In this work, this problem is
being formulated as a general travelling salesman problem (TSP) and
a genetic algorithm approach has been applied to solve the same. For
improving the efficiency of the algorithm, the GA has been
hybridized with a noble special heuristic and simulating annealing
(SA). In the present work a novel heuristic in the combination of GA
has been developed for synchronization of toolpath movements
during repositioning of the tool. A comparative analysis of new Meta
heuristic techniques with simple genetic algorithm has been
performed. The proposed metaheuristic approach shows better
performance than simple genetic algorithm for minimization of nonproductive
toolpath length. Also, the results obtained with the help of
hybrid simulated annealing genetic algorithm (HSAGA) are also
found better than the results using simple genetic algorithm only.
Abstract: With the widespread growth of applications of
Wireless Sensor Networks (WSNs), the need for reliable security
mechanisms these networks has increased manifold. Many security
solutions have been proposed in the domain of WSN so far. These
solutions are usually based on well-known cryptographic
algorithms.
In this paper, we have made an effort to survey well known
security issues in WSNs and study the behavior of WSN nodes that
perform public key cryptographic operations. We evaluate time
and power consumption of public key cryptography algorithm for
signature and key management by simulation.
Abstract: Computer worm detection is commonly performed by
antivirus software tools that rely on prior explicit knowledge of the
worm-s code (detection based on code signatures). We present an
approach for detection of the presence of computer worms based on
Artificial Neural Networks (ANN) using the computer's behavioral
measures. Identification of significant features, which describe the
activity of a worm within a host, is commonly acquired from security
experts. We suggest acquiring these features by applying feature
selection methods. We compare three different feature selection
techniques for the dimensionality reduction and identification of the
most prominent features to capture efficiently the computer behavior
in the context of worm activity. Additionally, we explore three
different temporal representation techniques for the most prominent
features. In order to evaluate the different techniques, several
computers were infected with five different worms and 323 different
features of the infected computers were measured. We evaluated
each technique by preprocessing the dataset according to each one
and training the ANN model with the preprocessed data. We then
evaluated the ability of the model to detect the presence of a new
computer worm, in particular, during heavy user activity on the
infected computers.
Abstract: This paper is to present context-aware sensor grid
framework for agriculture and its design challenges. Use of sensor
networks in the domain of agriculture is not new. However, due to
the unavailability of any common framework, solutions that are
developed in this domain are location, environment and problem
dependent. Keeping the need of common framework for agriculture,
Context-Aware Sensor Grid Framework is proposed. It will be
helpful in developing solutions for majority of the problems related
to irrigation, pesticides spray, use of fertilizers, regular monitoring of
plot and yield etc. due to the capability of adjusting according to
location and environment. The proposed framework is composed of
three layer architecture including context-aware application layer,
grid middleware layer and sensor network layer.
Abstract: Two-dimensional finite element model was created in this work to investigate the stresses distribution within rock-like samples with offset open non-persistent joints under biaxial loading. The results of this study have explained the fracture mechanisms observed in tests on rock-like material with open non-persistent offset joints [1]. Finite element code SAP2000 was used to study the stresses distribution within the specimens. Four-nodded isoperimetric plain strain element with two degree of freedom per node, and the three-nodded constant strain triangular element with two degree of freedom per node were used in the present study.The results of the present study explained the formation of wing cracks at the tip of the joints for low confining stress as well as the formation of wing cracks at the middle of the joint for the higher confining stress. High shear stresses found in the numerical study at the tip of the joints explained the formation of secondary cracks at the tip of the joints in the experimental study. The study results coincide with the experimental observations which showed that for bridge inclination of 0o, the coalescence occurred due to shear failure and for bridge inclination of 90o the coalescence occurred due to tensile failure while for the other bridge inclinations coalescence occurred due to mixed tensile and shear failure.
Abstract: This article presents a detailed analysis and comparative
performance evaluation of model reference adaptive control systems.
In contrast to classical control theory, adaptive control methods allow
to deal with time-variant processes. Inspired by the works [1] and
[2], two methods based on the MIT rule and Lyapunov rule are
applied to a linear first order system. The system is simulated and
it is investigated how changes to the adaptation gain affect the
system performance. Furthermore, variations in the reference model
parameters, that is changing the desired closed-loop behaviour are
examinded.