Abstract: The control of commutation of switched reluctance
(SR) motor has nominally depended on a physical position detector.
The physical rotor position sensor limits robustness and increases
size and inertia of the SR drive system. The paper describes a method
to overcome these limitations by using magnetization characteristics
of the motor to indicate rotor and stator teeth overlap status. The
method is using active current probing pulses of same magnitude that
is used to simulate flux linkage in the winding being probed. A
microprocessor is used for processing magnetization data to deduce
rotor-stator teeth overlap status and hence rotor position. However,
the back-of-core saturation and mutual coupling introduces overlap
detection errors, hence that of commutation control. This paper
presents the concept of the detection scheme and the effects of backof
core saturation.
Abstract: In the project FleGSens, a wireless sensor network
(WSN) for the surveillance of critical areas and properties is currently developed which incorporates mechanisms to ensure information
security. The intended prototype consists of 200 sensor nodes for
monitoring a 500m long land strip. The system is focused on ensuring
integrity and authenticity of generated alarms and availability in the
presence of an attacker who may even compromise a limited number
of sensor nodes. In this paper, two of the main protocols developed
in the project are presented, a tracking protocol to provide secure
detection of trespasses within the monitored area and a protocol for secure detection of node failures. Simulation results of networks
containing 200 and 2000 nodes as well as the results of the first prototype comprising a network of 16 nodes are presented. The focus of the simulations and prototype are functional testing of the protocols
and particularly demonstrating the impact and cost of several attacks.
Abstract: Majority of Business Software Systems (BSS)
Development and Enhancement Projects (D&EP) fail to meet criteria
of their effectiveness, what leads to the considerable financial losses.
One of the fundamental reasons for such projects- exceptionally low
success rate are improperly derived estimates for their costs and time.
In the case of BSS D&EP these attributes are determined by the work
effort, meanwhile reliable and objective effort estimation still appears
to be a great challenge to the software engineering. Thus this paper is
aimed at presenting the most important synthetic conclusions coming
from the author-s own studies concerning the main factors of
effective BSS D&EP work effort estimation. Thanks to the rational
investment decisions made on the basis of reliable and objective
criteria it is possible to reduce losses caused not only by abandoned
projects but also by large scale of overrunning the time and costs of
BSS D&EP execution.
Abstract: The spectral action balance equation is an equation that
used to simulate short-crested wind-generated waves in shallow water
areas such as coastal regions and inland waters. This equation consists
of two spatial dimensions, wave direction, and wave frequency which
can be solved by finite difference method. When this equation with
dominating propagation velocity terms are discretized using central
differences, stability problems occur when the grid spacing is chosen
too coarse. In this paper, we introduce the splitting modified donorcell
scheme for avoiding stability problems and prove that it is
consistent to the modified donor-cell scheme with same accuracy. The
splitting modified donor-cell scheme was adopted to split the wave
spectral action balance equation into four one-dimensional problems,
which for each small problem obtains the independently tridiagonal
linear systems. For each smaller system can be solved by direct or
iterative methods at the same time which is very fast when performed
by a multi-cores computer.
Abstract: The Elliptic Curve Digital Signature Algorithm
(ECDSA) is the elliptic curve analogue of DSA, where it is a digital
signature scheme designed to provide a digital signature based on a
secret number known only to the signer and also on the actual
message being signed. These digital signatures are considered the
digital counterparts to handwritten signatures, and are the basis for
validating the authenticity of a connection. The security of these
schemes results from the infeasibility to compute the signature
without the private key. In this paper we introduce a proposed to
development the original ECDSA with more complexity.
Abstract: Crystallization has been used for the separation of
chloronitrobenzene or CNBs, which are isomeric substances (o-, mand
p-CNB) and important intermediates in chemical productions. Effects of feed composition on the crystallization of m- and p-CNB was first studied. The results conform to the binary phase diagram of
m- and p-CNB. After that, effects of FAU zeolites (NaX, CaX, BaX, NaY and CaY) above the eutectic composition (63.5 and 65.0 wt% m-CNB in the feed) was also investigated. The results showed that
the FAU zeolites significantly affected the precipitates, the
composition of which was shifted from being rich in m-CNB to rich
in p-CNB. Effects of the number of FAU zeolites on the precipitate composition was then studied. The results revealed that the
precipitates from the lower number of the zeolites had higher p-CNB purity than those from the higher number of zeolite.
Abstract: This paper presents an integrated knowledge-based
approach to multi-scale modeling of aquatic systems, with a view to
enhancing predictive power and aiding environmental management
and policy-making. The basic phases of this approach have been
exemplified in the case of a bay in Saronicos Gulf (Attiki, Greece).
The results showed a significant problem with rising phytoplankton
blooms linked to excessive microbial growth, arisen mostly due to
increased nitrogen inflows; therefore, the nitrification/denitrification
processes of the benthic and water column sub-systems have
provided the quality variables to be monitored for assessing
environmental status. It is thereby demonstrated that the proposed
approach facilitates modeling choices and implementation option
decisions, while it provides substantial support for knowledge and
experience capitalization in long-term water management.
Abstract: Team distillation assisted by microwave extraction
(SDAM) considered as accelerated technique extraction is a
combination of microwave heating and steam distillation, performed
at atmospheric pressure. SDAM has been compared with the same
technique coupled with the cryogrinding of seeds (SDAM -CG).
Isolation and concentration of volatile compounds are performed by a
single stage for the extraction of essential oil from Cuminum
cyminum seeds. The essential oils extracted by these two methods for
5 min were quantitatively (yield) and qualitatively (aromatic profile)
no similar. These methods yield an essential oil with higher amounts
of more valuable oxygenated compounds, and allow substantial
savings of costs, in terms of time, energy and plant material. SDAM
and SDAM-CG is a green technology and appears as a good
alternative for the extraction of essential oils from aromatic plants.
Abstract: In this paper in consideration of each available
techniques deficiencies for speech recognition, an advanced method
is presented that-s able to classify speech signals with the high
accuracy (98%) at the minimum time. In the presented method, first,
the recorded signal is preprocessed that this section includes
denoising with Mels Frequency Cepstral Analysis and feature
extraction using discrete wavelet transform (DWT) coefficients; Then
these features are fed to Multilayer Perceptron (MLP) network for
classification. Finally, after training of neural network effective
features are selected with UTA algorithm.
Abstract: In this paper, real-coded genetic algorithm (RCGA) optimization technique has been applied for large-scale linear dynamic multi-input-multi-output (MIMO) system. The method is based on error minimization technique where the integral square error between the transient responses of original and reduced order models has been minimized by RCGA. The reduction procedure is simple computer oriented and the approach is comparable in quality with the other well-known reduction techniques. Also, the proposed method guarantees stability of the reduced model if the original high-order MIMO system is stable. The proposed approach of MIMO system order reduction is illustrated with the help of an example and the results are compared with the recently published other well-known reduction techniques to show its superiority.
Abstract: Isobaric vapor-liquid equilibrium measurements are reported for the binary mixtures of Mesitylene + 1-Heptanol and Mesitylene + 1-Octanol at 97.3 kPa. The measurements have been performed using a vapor recirculating type (modified Othmer's) equilibrium still. Both the mixtures show positive deviation from ideality. The Mesitylene + 1-Heptanol mixture forms an azeotrope whereas Mesitylene + 1- Octanol form a non – azeotropic mixture. The activity coefficients have been calculated taking into consideration the vapor phase nonideality. The data satisfy the thermodynamic consistency tests of Herington, and Hirata. The activity coefficients have been satisfactorily correlated by means of the Margules, Redlich-Kister, Wilson, Black, and NRTL equations. The activity coefficient values have also been obtained by UNIFAC method.
Abstract: Rockfall is a kind of irregular geological disaster. Its
destruction time, space and movements are highly random. The impact
force is determined by the way and velocity rocks move. The
movement velocity of a rockfall depends on slope gradient of its
moving paths, height, slope surface roughness and rock shapes. For
effectively mitigate and prevent disasters brought by rockfalls, it is
required to precisely calculate the moving paths of a rockfall so as to
provide the best protective design. This paper applies Colorado
Rockfall Simulation Program (CRSP) as our study tool to discuss the
impact of slope shape and surface roughness on the moving paths of a
single rockfall. The analytical results showed that the slope, m=1:1,
acted as the threshold for rockfall bounce height on a monoclinal slight
slope. When JRC ´╝£ 1.2, movement velocity reduced and bounce
height increased as JCR increased. If slope fixed and JRC increased,
the bounce height of rocks increased gradually with reducing
movement velocity. Therefore, the analysis on the moving paths of
rockfalls with CRSP could simulate bouncing of falling rocks. By
analyzing moving paths, velocity, and bounce height of falling rocks,
we could effectively locate impact points of falling rocks on a slope.
Such analysis can be served as a reference for future disaster
prevention and control.
Abstract: In this work a novel approach for color image
segmentation using higher order entropy as a textural feature for
determination of thresholds over a two dimensional image histogram
is discussed. A similar approach is applied to achieve multi-level
thresholding in both grayscale and color images. The paper discusses
two methods of color image segmentation using RGB space as the
standard processing space. The threshold for segmentation is decided
by the maximization of conditional entropy in the two dimensional
histogram of the color image separated into three grayscale images of
R, G and B. The features are first developed independently for the
three ( R, G, B ) spaces, and combined to get different color
component segmentation. By considering local maxima instead of the
maximum of conditional entropy yields multiple thresholds for the
same image which forms the basis for multilevel thresholding.
Abstract: The aim of this paper is to explore the security issues
that significantly affect the performance of Mobile Adhoc Networks
(MANET)and limit the services provided to their intended users. The
MANETs are more vulnerable to Distributed Denial of Service
attacks (DDoS) because of their properties like shared medium,
dynamic topologies etc. A DDoS attack is a coordinated attempt
made by malicious users to flood the victim network with the large
amount of data such that the resources of the victim network are
exhausted resulting in the deterioration of the network performance.
This paper highlights the effects of different types of DDoS attacks
in MANETs and categorizes them according to their behavior.
Abstract: Recently, a growing interest has emerged on the
development of new and efficient energy sources, due to the inevitable extinction of the nonrenewable energy reserves. One of
these alternative sources which has a great potential and sustainability to meet up the energy demand is biomass energy. This
significant energy source can be utilized with various energy
conversion technologies, one of which is biomass gasification in
supercritical water.
Water, being the most important solvent in nature, has very important characteristics as a reaction solvent under supercritical
circumstances. At temperatures above its critical point (374.8oC and
22.1 MPa), water becomes more acidic and its diffusivity increases.
Working with water at high temperatures increases the thermal
reaction rate, which in consequence leads to a better dissolving of the
organic matters and a fast reaction with oxygen. Hence, supercritical water offers a control mechanism depending on solubility, excellent
transport properties based on its high diffusion ability and new reaction possibilities for hydrolysis or oxidation.
In this study the gasification of a real biomass, namely olive mill
wastewater (OMW), in supercritical water is investigated with the
use of Pt/Al2O3 and Ni/Al2O3 catalysts. OMW is a by-product
obtained during olive oil production, which has a complex nature
characterized by a high content of organic compounds and
polyphenols. These properties impose OMW a significant pollution
potential, but at the same time, the high content of organics makes
OMW a desirable biomass candidate for energy production.
All of the catalytic gasification experiments were made with five
different reaction temperatures (400, 450, 500, 550 and 600°C),
under a constant pressure of 25 MPa. For the experiments conducted
with Ni/Al2O3 catalyst, the effect of five reaction times (30, 60, 90,
120 and 150 s) was investigated. However, procuring that similar
gasification efficiencies could be obtained at shorter times, the experiments were made by using different reaction times (10, 15, 20,
25 and 30 s) for the case of Pt/Al2O3 catalyst. Through these experiments, the effects of temperature, time and catalyst type on the
gasification yields and treatment efficiencies were investigated.
Abstract: This paper proposes a technique to protect against
email bombing. The technique employs a statistical approach, Naïve
Bayes (NB), and Neural Networks to show that it is possible to
differentiate between good and bad traffic to protect against email
bombing attacks. Neural networks and Naïve Bayes can be trained
by utilizing many email messages that include both input and output
data for legitimate and non-legitimate emails. The input to the model
includes the contents of the body of the messages, the subject, and
the headers. This information will be used to determine if the email
is normal or an attack email. Preliminary tests suggest that Naïve
Bayes can be trained to produce an accurate response to confirm
which email represents an attack.
Abstract: The Linear discriminant analysis (LDA) can be
generalized into a nonlinear form - kernel LDA (KLDA) expediently
by using the kernel functions. But KLDA is often referred to a general
eigenvalue problem in singular case. To avoid this complication, this
paper proposes an iterative algorithm for the two-class KLDA. The
proposed KLDA is used as a nonlinear discriminant classifier, and the
experiments show that it has a comparable performance with SVM.
Abstract: With the rapid expansion of city scale and the
excessive concentration of population, achieving relative equality of
extracurricular education resources and improving spatial service
performance of relevant facilities become necessary arduous tasks. In
urban space, extracurricular education facilities should offer better
service to its targeted area and promote the equality and efficiency of
education, which is accomplished by the allocation of facilities. Based
on questionnaire and survey for local students in Hangzhou City in
2009, this study classifies extracurricular education facilities in
meg-city and defines the equalization of these facilities. Then it is
suggested to establish extracurricular education facilities system
according to the development level of city and demands of local
students, and to introduce a spatial analysis method into urban
planning through the aspects of spatial distribution, travel cost and
spatial service scope. Finally, the practice of nine sub-districts of
Hangzhou is studied.
Abstract: Nowadays over-consumption of fossil energy in
buildings especially in residential buildings and also considering the
increase in populations, the crisis of energy shortage in a near future
is predictable. The recent performance of developed countries in
construction with the aim of decreasing fossil energies shows that
these countries have understood the incoming crisis and has taken
reasonable and basic actions in this regard. However, Iranian
architecture, with several thousands years of history, has acquired
and executed invaluable experiences in designing, adapting and
coordinating with the nature.
Architectural studies during the recent decades show that imitating
modern western architecture results in high energy wastage beside
the fact that it not reasonably adaptable and corresponded with the
habits and customs of people unlike the architecture in the past which
was compatible and adaptable with the climatic conditions and this
necessitates optimal using of renewable energies more than ever. This
paper studies problems of design, execution and living in today's
houses and reviews the characteristics of climatic elements paying
special attention to the performance of trombe wall and solar
greenhouse in traditional houses and offers some suggestions for
combining these two elements and a climatic strategy.
Abstract: Lurking behavior is common in information-seeking oriented communities. Transferring users with lurking behavior to be contributors can assist virtual communities to obtain competitive advantages. Based on the ecological cognition framework, this study proposes a model to examine the antecedents of lurking behavior in information-seeking oriented virtual communities. This study argues desire for emotional support, desire for information support, desire for performance-approach, desire for performance -avoidance, desire for mastery-approach, desire for mastery-avoidance, desire for ability trust, desire for benevolence trust, and desire for integrity trust effect on lurking behavior. This study offers an approach to understanding the determinants of lurking behavior in online contexts.