Abstract: Verification and Validation of Simulated Process
Model is the most important phase of the simulator life cycle.
Evaluation of simulated process models based on Verification and
Validation techniques checks the closeness of each component model
(in a simulated network) with the real system/process with respect to
dynamic behaviour under steady state and transient conditions. The
process of Verification and Validation helps in qualifying the process
simulator for the intended purpose whether it is for providing
comprehensive training or design verification. In general, model
verification is carried out by comparison of simulated component
characteristics with the original requirement to ensure that each step
in the model development process completely incorporates all the
design requirements. Validation testing is performed by comparing
the simulated process parameters to the actual plant process
parameters either in standalone mode or integrated mode.
A Full Scope Replica Operator Training Simulator for PFBR -
Prototype Fast Breeder Reactor has been developed at IGCAR,
Kalpakkam, INDIA named KALBR-SIM (Kalpakkam Breeder
Reactor Simulator) where in the main participants are
engineers/experts belonging to Modeling Team, Process Design and
Instrumentation & Control design team. This paper discusses about
the Verification and Validation process in general, the evaluation
procedure adopted for PFBR operator training Simulator, the
methodology followed for verifying the models, the reference
documents and standards used etc. It details out the importance of
internal validation by design experts, subsequent validation by
external agency consisting of experts from various fields, model
improvement by tuning based on expert’s comments, final
qualification of the simulator for the intended purpose and the
difficulties faced while co-coordinating various activities.
Abstract: Fast changing knowledge systems on the Internet can
be accessed more efficiently with the help of automatic document
summarization and updating techniques. The aim of multi-document
update summary generation is to construct a summary unfolding the
mainstream of data from a collection of documents based on the
hypothesis that the user has already read a set of previous documents.
In order to provide a lot of semantic information from the documents,
deeper linguistic or semantic analysis of the source documents were
used instead of relying only on document word frequencies to select
important concepts. In order to produce a responsive summary,
meaning oriented structural analysis is needed. To address this issue,
the proposed system presents a document summarization approach
based on sentence annotation with aspects, prepositions and named
entities. Semantic element extraction strategy is used to select
important concepts from documents which are used to generate
enhanced semantic summary.
Abstract: A parametric study on circular thin-walled pipes
subjected to pure bending is performed. Both straight and curved
pipes are considered. Ratio D/t, initial pipe curvature and internal
pressure are the parameters varying in the analyses. The study is
mainly FEA-based.
It is found that negative curvatures (opposite to bending moment)
considerably increase stiffness and buckling limit of the pipe when no
internal pressure is acting and, similarly, positive curvatures decrease
the stiffness and buckling limit. For internal pressurised pipes the
effects of initial pipe curvature are less relevant. Results show that
this phenomenon is in relationship with the cross-section deformation
due to bending moment, which undergoes relevant ovalisation for no
pressurised pipes and little ovalisation for pressurised pipes.
Abstract: Solenoid operated electromagnetic control valve
(ECV) playing an important role for car’s air conditioning control
system. ECV is used in external variable displacement swash plate
type compressor and controls the entire air conditioning system by
means of a pulse width modulation (PWM) input signal supplying
from an external source (controller). Complete form of ECV contains
number of internal features like valve body, core, valve guide,
plunger, guide pin, plunger spring, bellows etc. While designing the
ECV; dimensions of different internal items must meet the standard
requirements as it is quite challenging. In this research paper,
especially the dimensioning of ECV body and its three pressure ports
through which the air/refrigerant passes are considered. Here internal
leakage test analysis of ECV body is being carried out from its
discharge port (Pd) to crankcase port (Pc) when the guide valve is
placed inside it. The experiments have made both in ordinary and
digital system using different assumptions and thereafter compare the
results.
Abstract: In Brazil, neonatal mortality rate is considered
incompatible with the country development conditions, and has been
a Public Health concern. Reduction in infant mortality rates has also
been part of the Millennium Development Goals, a commitment
made by countries, members of the Organization of United Nations
(OUN), including Brazil. Fetal mortality rate is considered a highly
sensitive indicator of health care quality. Suitable actions, such as
good quality and access to health services may contribute positively
towards reduction in these fetal and neonatal rates. With appropriate
antenatal follow-up and health care during gestation and delivery,
some death causes could be reduced or even prevented by means of
early diagnosis and intervention, as well as changes in risk factors
and interventions. Objectives: To study the quality of maternal and
infant health care based on fetal and neonatal mortality, as well as the
possible actions to prevent those deaths in Botucatu (Brazil).
Methods: Classification of prevention according to the International
Classification of Diseases and the modified Wigglesworth´s
classification. In order to evaluate adequacy, indicators of quality of
antenatal and delivery care were established by the authors. Results:
Considering fetal deaths, 56.7% of them occurred before delivery,
which reveals possible shortcomings in antenatal care, and 38.2% of
them were a result of intra- labor changes, which could be prevented
or reduced by adequate obstetric management. These findings were
different from those in the group of early neonatal deaths which were
also studied. Adequacy of health services showed that antenatal and
childbirth care was appropriate for 24% and 33.3% of pregnant
women, respectively, which corroborates the results of prevention.
These results revealed that shortcomings in obstetric and antenatal
care could be the causes of deaths in the study. Early and late
neonatal deaths have similar characteristics: 76% could be prevented
or reduced mainly by adequate newborn care (52.9%) and adequate
health care for gestational women (11.7%). When adequacy of care
was evaluated, childbirth and newborn care was adequate in 25.8%
and antenatal care was adequate in 16.1%. In conclusion, direct
relationship was found between adequacy and quality of care
rendered to pregnant women and newborns, and fetal and infant
mortality. Moreover, our findings highlight that deaths could be
prevented by an adequate obstetric and neonatal management.
Abstract: It is widely believed that mobile device is a promising technology for lending the opportunity for the third wave of electronic commerce. Mobile devices have changed the way companies do business. Many applications are under development or being incorporated into business processes. In this day, mobile applications are a vital component of any industry strategy.One of the greatest benefits of selling merchandise and providing services on a mobile application is that it widens a company’s customer base significantly.Mobile applications are accessible to interested customers across regional and international borders in different electronic business (e-business) area. But there is a dark side to this success story. The security risks associated with mobile devices and applications are very significant. This paper introduces a broad risk analysis for the various threats, vulnerabilities, and risks in mobile e-business applications and presents some important risk mitigation approaches. It reviews and compares two different frameworks for security assurance in mobile e-business applications. Based on the comparison, the paper suggests some recommendations for applications developers and business owners in mobile e-business application development process.
Abstract: In the last few decades, many southeast-Asia women
migrate to Taiwan by marriage, and it usually takes several years for
them to acquire Taiwanese citizenship. This study investigates the
relationship between their citizenship acquisition and whether they
develop Taiwanese identities, and how does it affect their ethnical
identity towards their original ethnics. Furthermore, the present study
also explores that whether citizenship acquisition help the immigrant
women to explore the host society further and make commitment to it,
or the identification towards mainstream Taiwanese society is only
symbolic and superficial? One hundred and ninety-two immigrant
women were measured using Multigroup Ethnic Identity
Measure-Revised and a global 10-point ethnic identity question.
Correlation tests, t-test, and hierarchical regression were performed to
answer the above questions. The results revealed that citizenship
acquisition does help immigrant women to identify with Taiwanese
society, but it does not affect how they identify with their own ethnics.
Furthermore, the results also indicated that acquiring citizenship
would not help these immigrant women become involved in deeper
cultural exploration of Taiwan nor would it encourage them to make
commitments to the host society.
Abstract: Although it is not intended to identify distance
education students as a homogeneous group, recent research has
demonstrated that there are some demographic and personality
common traits among most of them that provide the basis for the
description of a typical distance learning student. The purpose of this
paper is to describe these common traits and to facilitate their
learning journey within a distance education program. The described
research is an initiative of the Distance Education Unit at the
European University Cyprus (Laureate International Universities) in
the context of its action for the improvement of the students’
performance.
Abstract: To date, one of the few comprehensive indicators for
the measurement of food security is the Global Food Security Index
(GFSI). This index is a dynamic quantitative and qualitative
benchmarking model, constructed from 28 unique indicators, that
measures drivers of food security across both developing and
developed countries. Whereas the GFSI has been calculated across a
set of 109 countries, in this paper we aim to present and compare, for
the Middle East and North Africa (MENA), 1) the Food Security
Index scores achieved and 2) the data available on affordability,
availability, and quality of food. The data for this work was taken
from the latest available report published by the creators of the GFSI,
which in turn used information from national and international
statistical sources. MENA countries rank from place 17/109 (Israel,
although with resent political turmoil this is likely to have changed)
to place 91/109 (Yemen) with household expenditure spent in food
ranging from 15.5% (Israel) to 60% (Egypt). Lower spending on food
as a share of household consumption in most countries and better
food safety net programs in the MENA have contributed to a notable
increase in food affordability. The region has also, however,
experienced a decline in food availability, owing to more limited
food supplies and higher volatility of agricultural production. In
terms of food quality and safety the MENA has the top ranking
country (Israel). The most frequent challenges faced by the countries
of the MENA include public expenditure on agricultural research and
development as well as volatility of agricultural production. Food
security is a complex phenomenon that interacts with many other
indicators of a country’s wellbeing; in the MENA it is slowly but
markedly improving.
Abstract: Validity, integrity, and impacts of the IT systems of
the US federal courts have been studied as part of the Human Rights
Alert-NGO (HRA) submission for the 2015 Universal Periodic
Review (UPR) of human rights in the United States by the Human
Rights Council (HRC) of the United Nations (UN). The current
report includes overview of IT system analysis, data-mining and case
studies. System analysis and data-mining show: Development and
implementation with no lawful authority, servers of unverified
identity, invalidity in implementation of electronic signatures,
authentication instruments and procedures, authorities and
permissions; discrimination in access against the public and
unrepresented (pro se) parties and in favor of attorneys; widespread
publication of invalid judicial records and dockets, leading to their
false representation and false enforcement. A series of case studies
documents the impacts on individuals' human rights, on banking
regulation, and on international matters. Significance is discussed in
the context of various media and expert reports, which opine
unprecedented corruption of the US justice system today, and which
question, whether the US Constitution was in fact suspended. Similar
findings were previously reported in IT systems of the State of
California and the State of Israel, which were incorporated, subject to
professional HRC staff review, into the UN UPR reports (2010 and
2013). Solutions are proposed, based on the principles of publicity of
the law and the separation of power: Reliance on US IT and legal
experts under accountability to the legislative branch, enhancing
transparency, ongoing vigilance by human rights and internet
activists. IT experts should assume more prominent civic duties in the
safeguard of civil society in our era.
Abstract: This paper presents a combination of both robust
nonlinear controller and nonlinear controller for a class of nonlinear
4Y Octorotor UAV using Back-stepping and sliding mode controller.
The robustness against internal and external disturbance and
decoupling control are the merits of the proposed paper. The
proposed controller decouples the Octorotor dynamical system. The
controller is then applied to a 4Y Octortor UAV and its feature will
be shown.
Abstract: Nowadays, the successful implementation of ICTs is
vital for almost any kind of organization. Good governance and ICT
management are essential for delivering value, managing
technological risks, managing resources and performance
measurement. In addition, outsourcing is a strategic IT service
solution which complements IT services provided internally in
organizations. This paper proposes the measurement tools of a new
holistic maturity model based on standards ISO/IEC 20000 and
ISO/IEC 38500, and the frameworks and best practices of ITIL and
COBIT, with a specific focus on IT outsourcing. These measurement
tools allow independent validation and practical application in the
field of higher education, using a questionnaire, metrics tables, and
continuous improvement plan tables as part of the measurement
process. Guidelines and standards are proposed in the model for
facilitating adaptation to universities and achieving excellence in the
outsourcing of IT services.
Abstract: Over the last few decades, oilfield service rolling
equipment has significantly increased in weight, primarily because of
emissions regulations, which require larger/heavier engines, larger
cooling systems, and emissions after-treatment systems, in some
cases, etc. Larger engines cause more vibration and shock loads,
leading to failure of electronics and control systems.
If the vibrating frequency of the engine matches the system
frequency, high resonance is observed on structural parts and mounts.
One such existing automated control equipment system comprising
wire rope mounts used for mounting computers was designed
approximately 12 years ago. This includes the use of an industrialgrade
computer to control the system operation. The original
computer had a smaller, lighter enclosure. After a few years, a newer
computer version was introduced, which was 10 lbm heavier. Some
failures of internal computer parts have been documented for cases in
which the old mounts were used. Because of the added weight, there
is a possibility of having the two brackets impact each other under
off-road conditions, which causes a high shock input to the computer
parts. This added failure mode requires validating the existing mount
design to suit the new heavy-weight computer.
This paper discusses the modal finite element method (FEM)
analysis and experimental modal analysis conducted to study the
effects of vibration on the wire rope mounts and the computer. The
existing mount was modelled in ANSYS software, and resultant
mode shapes and frequencies were obtained. The experimental modal
analysis was conducted, and actual frequency responses were
observed and recorded.
Results clearly revealed that at resonance frequency, the brackets
were colliding and potentially causing damage to computer parts. To
solve this issue, spring mounts of different stiffness were modeled in
ANSYS software, and the resonant frequency was determined.
Increasing the stiffness of the system increased the resonant
frequency zone away from the frequency window at which the engine
showed heavy vibrations or resonance. After multiple iterations in
ANSYS software, the stiffness of the spring mount was finalized,
which was again experimentally validated.
Abstract: The problematic of gender and socioeconomic status
biased differences in academic motivation patterns is discussed.
Gender identity is understood according to symbolic interactionism
perspective: as a result of reflected appraisals, social comparisons,
self-attributions, and identifications, shaped by social environment
and family context. The effects of socioeconomic status on academic
motivation are conceptualized according to Bourdieu’s habitus
concept, reflecting the role of unconscious and internalized cultural
signals, proper to low and high socioeconomic status family contexts.
Since families differ by various socioeconomic features, the
hypothesis about possible impact of parents’ socioeconomic status on
their children’s academic motivation interfering with gender
socialization effects is held. The survey, aiming to seize gender
differences in academic motivation and self-recorded improvementoriented
efforts as a result of socialization processes operating in the
families of low and high socioeconomic status, was designed. The
results of Lithuanian higher education students’ survey are presented
and discussed.
Abstract: The globalization of markets, the need to develop
competitive advantages and core competencies, among other things,
lead organizations to increasingly cross borders to operate in other
countries. The expatriation of professionals who go to work in
another country besides their own becomes increasingly common. In
order to generate data about this issue, research was conducted
concerning the perception of expatriate employees concerning
expatriation success. The research method used was case study
through a qualitative approach. This research was done through
interviews with five India expatriates and five China expatriates,
interview with expatriate department heads and analysis of company
documents. It was found that there are differences between the
organizational perception and perception of expatriates of what
constitutes mission success. The paper also provides suggestions for
further research and suggestions for future expatriates.
Abstract: The use of eXtensible Markup Language (XML) in
web, business and scientific databases lead to the development of
methods, techniques and systems to manage and analyze XML data.
Semi-structured documents suffer due to its heterogeneity and
dimensionality. XML structure and content mining represent
convergence for research in semi-structured data and text mining. As
the information available on the internet grows drastically, extracting
knowledge from XML documents becomes a harder task. Certainly,
documents are often so large that the data set returned as answer to a
query may also be very big to convey the required information. To
improve the query answering, a Semantic Tree Based Association
Rule (STAR) mining method is proposed. This method provides
intentional information by considering the structure, content and the
semantics of the content. The method is applied on Reuter’s dataset
and the results show that the proposed method outperforms well.
Abstract: Learning through creation of contextual games is a
very promising approach when undertaking interdisciplinary and
international group projects. During 2013 and 2014 the authors
organized two intensive student projects. The two projects were in
different countries and different conditions. Between them, the two
projects involved 68 students and 12 mentors from five EU countries
and from various academic disciplines. In this paper we share our
experience of these two projects and we suggest approaches that can
be utilized to strengthen the chances of succeeding in short (12-15
days long) intensive student projects.
Abstract: This paper presents observations on the early
supervised internships in Psychology, currently called basic
internships in Brazil, and its importance in professional training. The
work is an experience report and focuses on the Professional training,
illustrated by the reality of a Brazilian institution, used as a case
study. It was developed from the authors' experience as academic
supervisors of this kind of practice throughout this undergraduate
course, combined with aspects investigated in the post-doctoral
research of one of them. Theoretical references on the subject and
related national legislation are analyzed, as well as reports of students
who experienced at least one semester of this type of practice,
articulated to the observations of the authors. The results demonstrate
the importance of the early supervised internships as a way of
creating opportunities for the students of a first contact with the
professional reality and the practice of psychologists in different
fields of insertion, preparing them for further experiments that require
more involvement in activities of training and practices in
Psychology.
Abstract: Fuzzy inference method based approach to the
forming of modular intellectual system of assessment the quality of
communication services is proposed. Developed under this approach
the basic fuzzy estimation model takes into account the
recommendations of the International Telecommunication Union in
respect of the operation of packet switching networks based on IPprotocol.
To implement the main features and functions of the fuzzy
control system of quality telecommunication services it is used
multilayer feedforward neural network.
Abstract: Image spam is a kind of email spam where the spam
text is embedded with an image. It is a new spamming technique
being used by spammers to send their messages to bulk of internet
users. Spam email has become a big problem in the lives of internet
users, causing time consumption and economic losses. The main
objective of this paper is to detect the image spam by using histogram
properties of an image. Though there are many techniques to
automatically detect and avoid this problem, spammers employing
new tricks to bypass those techniques, as a result those techniques are
inefficient to detect the spam mails. In this paper we have proposed a
new method to detect the image spam. Here the image features are
extracted by using RGB histogram, HSV histogram and combination
of both RGB and HSV histogram. Based on the optimized image
feature set classification is done by using k- Nearest Neighbor(k-NN)
algorithm. Experimental result shows that our method has achieved
better accuracy. From the result it is known that combination of RGB
and HSV histogram with k-NN algorithm gives the best accuracy in
spam detection.