Abstract: This paper presents a model for the evaluation of
energy performance and aerodynamic forces acting on a small
straight-bladed Darrieus-type vertical axis wind turbine depending on
blade geometrical section. It consists of an analytical code coupled to
a solid modeling software, capable of generating the desired blade
geometry based on the desired blade design geometric parameters.
Such module is then linked to a finite volume commercial CFD code
for the calculation of rotor performance by integration of the
aerodynamic forces along the perimeter of each blade for a full period
of revolution.After describing and validating the computational
model with experimental data, the results of numerical simulations
are proposed on the bases of two candidate airfoil sections, that is a
classical symmetrical NACA 0021 blade profile and the recently
developed DU 06-W-200 non-symmetric and laminar blade
profile.Through a full CFD campaign of analysis, the effects of blade
geometrical section on angle of attack are first investigated and then
the overall rotor torque and power are analyzed as a function of blade
azimuthal position, achieving a numerical quantification of the
influence of airfoil geometry on overall rotor performance.
Abstract: A good green building design project, designers should consider not only energy consumption, but also healthy and comfortable needs of inhabitants. In recent years, the Taiwan government paid attentions on both carbon reduction and indoor air quality issues, which be presented in the legislation of Building Codes and other regulations. Taiwan located in hot and humid climates, dampness in buildings leads to significant microbial pollution and building damage. This means that the high temperature and humidity present a serious indoor air quality issue. The interactions between vapor transfers and energy fluxes are essential for the whole building Heat Air and Moisture (HAM) response. However, a simulation tool with short calculation time, property accuracy and interface is needed for practical building design processes. In this research, we consider the vapor transfer phenomenon of building materials as well as temperature and humidity and energy consumption in a building space. The simulation bases on the EMPD method, which was performed by EnergyPlus, a simulation tool developed by DOE, to simulate the indoor moisture variation in a one-zone residential unit based on the Effective Moisture Penetration Depth Method, which is more suitable for practical building design processes.
Abstract: In this paper, the performance of three types of serial
concatenated convolutional codes (SCCC) is compared and analyzed
in additive white Gaussian noise (AWGN) channel. In Type I, only the
parity bits of outer encoder are passed to inner encoder. In Type II and
Type III, both the information bits and the parity bits of outer encoder
are transferred to inner encoder. As results of simulation, Type I shows
the best bit error rate (BER) performance at low signal-to-noise ratio
(SNR). On the other hand, Type III shows the best BER performance
at high SNR in AWGN channel. The simulation results are analyzed
using the distance spectrum.
Abstract: In recent past, the Unified Modeling Language (UML) has become the de facto industry standard for object-oriented modeling of the software systems. The syntax and semantics rich UML has encouraged industry to develop several supporting tools including those capable of generating deployable product (code) from the UML models. As a consequence, ensuring the correctness of the model/design has become challenging and extremely important task. In this paper, we present an approach for automatic verification of protocol model/design. As a case study, Session Initiation Protocol (SIP) design is verified for the property, “the CALLER will not converse with the CALLEE before the connection is established between them ". The SIP is modeled using UML statechart diagrams and the desired properties are expressed in temporal logic. Our prototype verifier “UML-SMV" is used to carry out the verification. We subjected an erroneous SIP model to the UML-SMV, the verifier could successfully detect the error (in 76.26ms) and generate the error trace.
Abstract: This research attempts to study the feasibility of
augmenting an augmented reality (AR) image card on a Quick
Response (QR) code. The authors have developed a new visual tag,
which contains a QR code and an augmented AR image card. The new
visual tag has features of reading both of the revealed data of the QR
code and the instant data from the AR image card. Furthermore, a
handheld communicating device is used to read and decode the new
visual tag, and then the concealed data of the new visual tag can be
revealed and read through its visual display. In general, the QR code is
designed to store the corresponding data or, as a key, to access the
corresponding data from the server through internet. Those reveled
data from the QR code are represented in text. Normally, the AR
image card is designed to store the corresponding data in
3-Dimensional or animation/video forms. By using QR code's
property of high fault tolerant rate, the new visual tag can access those
two different types of data by using a handheld communicating device.
The new visual tag has an advantage of carrying much more data than
independent QR code or AR image card. The major findings of this
research are: 1) the most efficient area for the designed augmented AR
card augmenting on the QR code is 9% coverage area out of the total
new visual tag-s area, and 2) the best location for the augmented AR
image card augmenting on the QR code is located in the bottom-right
corner of the new visual tag.
Abstract: In this paper we present a novel technique for data
hiding in binary document images. We use the concept of entropy in
order to identify document specific least distortive areas throughout
the binary document image. The document image is treated as any
other image and the proposed method utilizes the standard document
characteristics for the embedding process. Proposed method
minimizes perceptual distortion due to embedding and allows
watermark extraction without the requirement of any side information
at the decoder end.
Abstract: Sustainable energy usage has been recognized as one
of the important measure to increase the competitiveness of the
nation globally. Many strong emphases were given in the Ninth
Malaysia Plan (RMK9) to improve energy efficient especially to
government buildings. With this in view, a project to investigate the
potential of energy saving in selected building in Universiti Tun
Hussein Onn Malaysia (UTHM) was carried out. In this project, a
case study involving electric energy consumption of the academic
staff office building was conducted. The scope of the study include to
identify energy consumption in a selected building, to study energy
saving opportunities, to analyse cost investment in term of economic
and to identify users attitude with respect to energy usage. The
MS1525:2001, Malaysian Standard -Code of practice on energy
efficiency and use of renewable energy for non-residential buildings
was used as reference. Several energy efficient measures were
considered and their merits and priority were compared. Improving
human behavior can reduce energy consumption by 6% while
technical measure can reduce energy consumption by 44%. Two
economic analysis evaluation methods were applied; they are the
payback period method and net present value method.
Abstract: The present paper deals with the experimental and
computational study of axial collapse of the aluminum metallic shells
having combined tube-frusta geometry between two parallel plates.
Shells were having bottom two third lengths as frusta and remaining
top one third lengths as tube. Shells were compressed to recognize
their modes of collapse and associated energy absorption capability.
An axisymmetric Finite Element computational model of collapse
process is presented and analysed, using a non-linear FE code
FORGE2. Six noded isoparametric triangular elements were used to
discretize the deforming shell. The material of the shells was
idealized as rigid visco-plastic. To validate the computational model
experimental and computed results of the deformed shapes and their
corresponding load-compression and energy-compression curves
were compared. With the help of the obtained results progress of the
axisymmetric mode of collapse has been presented, analysed and
discussed.
Abstract: Power system stability enhancement by simultaneous tuning of a Power System Stabilizer (PSS) and a Static Var Compensator (SVC)-based controller is thoroughly investigated in this paper. The coordination among the proposed damping stabilizers and the SVC internal voltage regulators has also been taken into consideration. The design problem is formulated as an optimization problem with a time-domain simulation-based objective function and Real-Coded Genetic Algorithm (RCGA) is employed to search for optimal controller parameters. The proposed stabilizers are tested on a weakly connected power system with different disturbances and loading conditions. The nonlinear simulation results are presented to show the effectiveness and robustness of the proposed control schemes over a wide range of loading conditions and disturbances. Further, the proposed design approach is found to be robust and improves stability effectively even under small disturbance and unbalanced fault conditions.
Abstract: Static analysis of source code is used for auditing web
applications to detect the vulnerabilities. In this paper, we propose a
new algorithm to analyze the PHP source code for detecting LFI and
RFI potential vulnerabilities. In our approach, we first define some
patterns for finding some functions which have potential to be abused
because of unhandled user inputs. More precisely, we use regular
expression as a fast and simple method to define some patterns for
detection of vulnerabilities. As inclusion functions could be also used
in a safe way, there could occur many false positives (FP). The first
cause of these FP-s could be that the function does not use a usersupplied
variable as an argument. So, we extract a list of usersupplied
variables to be used for detecting vulnerable lines of code.
On the other side, as vulnerability could spread among the variables
like by multi-level assignment, we also try to extract the hidden usersupplied
variables. We use the resulted list to decrease the false
positives of our method. Finally, as there exist some ways to prevent
the vulnerability of inclusion functions, we define also some patterns
to detect them and decrease our false positives.
Abstract: Stochastic models of biological networks are well established in systems biology, where the computational treatment of such models is often focused on the solution of the so-called chemical master equation via stochastic simulation algorithms. In contrast to this, the development of storage-efficient model representations that are directly suitable for computer implementation has received significantly less attention. Instead, a model is usually described in terms of a stochastic process or a "higher-level paradigm" with graphical representation such as e.g. a stochastic Petri net. A serious problem then arises due to the exponential growth of the model-s state space which is in fact a main reason for the popularity of stochastic simulation since simulation suffers less from the state space explosion than non-simulative numerical solution techniques. In this paper we present transition class models for the representation of biological network models, a compact mathematical formalism that circumvents state space explosion. Transition class models can also serve as an interface between different higher level modeling paradigms, stochastic processes and the implementation coded in a programming language. Besides, the compact model representation provides the opportunity to apply non-simulative solution techniques thereby preserving the possible use of stochastic simulation. Illustrative examples of transition class representations are given for an enzyme-catalyzed substrate conversion and a part of the bacteriophage λ lysis/lysogeny pathway.
Abstract: The full length mitochondrial small subunit ribosomal
(mt-rns) gene has been characterized for Ophiostoma novo-ulmi
subspecies americana. The gene was also characterized for
Ophiostoma ulmi and a group II intron was noted in the mt-rns gene
of O. ulmi. The insertion in the mt-rns gene is at position S952 and it
is a group IIB1 intron that encodes a double motif LAGLIDADG
homing endonuclease from an open reading frame located within a
loop of domain III. Secondary structure models for the mt-rns RNA
of O. novo-ulmi subsp. americana and O. ulmi were generated to
place the intron within the context of the ribosomal RNA. The in vivo
splicing of the O.ul-mS952 group II intron was confirmed with
reverse transcription-PCR. A survey of 182 strains of Dutch Elm
Diseases causing agents showed that the mS952 intron was absent in
what is considered to be the more aggressive species O. novo-ulmi
but present in strains of the less aggressive O. ulmi. This observation
suggests that the O.ul-mS952 intron can be used as a PCR-based
molecular marker to discriminate between O. ulmi and O. novo-ulmi
subsp. americana.
Abstract: Though nonlinear dynamic analysis using a specialized
hydro-code such as AUTODYN is accurate and useful tool for
progressive collapse assessment of a multi-story building subjected to
blast load, it takes too much time to be applied to a practical simulation
of progressive collapse of a tall building. In this paper, blast analysis of
a RC frame structure using a simplified model with Reinforcement
Contact technique provided in Ansys Workbench was introduced and
investigated on its accuracy. Even though the simplified model has a
fraction of elements of the detailed model, the simplified model with
this modeling technique shows similar structural behavior under the
blast load to the detailed model. The proposed modeling method can
be effectively applied to blast loading progressive collapse analysis of
a RC frame structure.
Abstract: In the paper, the performance of quasi-synchronous
CDMA (QS-CDMA) system, which can allow an increased timing
error in synchronized access, is discussed. Average BER performance
of the system is analyzed in the condition of different access timing
error and different asynchronous users by simulation in AWGN
channel. The results show that QS-CDMA system is shown to have
great performance gain over the asynchronous system when access
timing error is within a few chips and asynchronous users is tolerable.
However, with access timing error increasing and asynchronous users
increasing, the performance of QS-CDMA will degrade. Also, we can
determine the number of tolerable asynchronous users for different
access timing error by simulation figures.
Abstract: A 3D simulation study for an incompressible
slip flow around a spherical aerosol particle was performed.
The full Navier-Stokes equations were solved and the velocity
jump at the gas-particle interface was treated numerically by
imposition of the slip boundary condition. Analytical solution
to the Stokesian slip flow past a spherical particle was used as
a benchmark for code verification, and excellent agreement
was achieved. The Simulation results showed that in addition
to the Knudsen number, the Reynolds number affects the slip
correction factor. Thus, the Cunningham-based slip corrections
must be augmented by the inclusion of the effect of
Reynolds number for application to Lagrangian tracking of
fine particles. A new expression for the slip correction factor
as a function of both Knudsen number and Reynolds number
was developed.
Abstract: This paper presents the H-ARQ techniques comparison for OFDM systems with a new family of non-binary LDPC codes which has been developed within the EU FP7 DAVINCI project. The punctured NB-LDPC codes have been used in a simulated model of the transmission system. The link level performance has been evaluated in terms of spectral efficiency, codeword error rate and average number of retransmissions. The NB-LDPC codes can be easily and effective implemented with different methods of the retransmission needed if correct decoding of a codeword failed. Here the Optimal Symbol Selection method is proposed as a Chase Combining technique.
Abstract: Two-dimensional (2D) bar codes were designed to
carry significantly more data with higher information density and
robustness than its 1D counterpart. Thanks to the popular
combination of cameras and mobile phones, it will naturally bring
great commercial value to use the camera phone for 2D bar code
reading. This paper addresses the problem of specific 2D bar code
design for mobile phones and introduces a low-level encoding
method of matrix codes. At the same time, we propose an efficient
scheme for 2D bar codes decoding, of which the effort is put on
solutions of the difficulties introduced by low image quality that is
very common in bar code images taken by a phone camera.
Abstract: The radio frequency identification (RFID) is a
technology for automatic identification of items, particularly in
supply chain, but it is becoming increasingly important for industrial
applications. Unlike barcode technology that detects the optical
signals reflected from barcode labels, RFID uses radio waves to
transmit the information from an RFID tag affixed to the physical
object. In contrast to today most often use of this technology in
warehouse inventory and supply chain, the focus of this paper is an
overview of the structure of RFID systems used by RFID technology
and it also presents a solution based on the application of RFID for
brand authentication, traceability and tracking, by implementing a
production management system and extending its use to traders.
Abstract: A new method for low complexity image coding is presented, that permits different settings and great scalability in the generation of the final bit stream. This coding presents a continuoustone still image compression system that groups loss and lossless compression making use of finite arithmetic reversible transforms. Both transformation in the space of color and wavelet transformation are reversible. The transformed coefficients are coded by means of a coding system in depending on a subdivision into smaller components (CFDS) similar to the bit importance codification. The subcomponents so obtained are reordered by means of a highly configure alignment system depending on the application that makes possible the re-configure of the elements of the image and obtaining different levels of importance from which the bit stream will be generated. The subcomponents of each level of importance are coded using a variable length entropy coding system (VBLm) that permits the generation of an embedded bit stream. This bit stream supposes itself a bit stream that codes a compressed still image. However, the use of a packing system on the bit stream after the VBLm allows the realization of a final highly scalable bit stream from a basic image level and one or several enhance levels.
Abstract: This paper presents a vocoder to obtain high quality synthetic speech at 600 bps. To reduce the bit rate, the algorithm is based on a sinusoidally excited linear prediction model which extracts few coding parameters, and three consecutive frames are grouped into a superframe and jointly vector quantization is used to obtain high coding efficiency. The inter-frame redundancy is exploited with distinct quantization schemes for different unvoiced/voiced frame combinations in the superframe. Experimental results show that the quality of the proposed coder is better than that of 2.4kbps LPC10e and achieves approximately the same as that of 2.4kbps MELP and with high robustness.