Abstract: This paper describes an automated event detection and location system for water distribution pipelines which is based upon low-cost sensor technology and signature analysis by an Artificial
Neural Network (ANN). The development of a low cost failure sensor which measures the opacity or cloudiness of the local water
flow has been designed, developed and validated, and an ANN based system is then described which uses time series data produced by
sensors to construct an empirical model for time series prediction and
classification of events. These two components have been installed,
tested and verified in an experimental site in a UK water distribution
system. Verification of the system has been achieved from a series of
simulated burst trials which have provided real data sets. It is concluded that the system has potential in water distribution network
management.
Abstract: In this paper we use quintic non-polynomial
spline functions to develop numerical methods for approximation
to the solution of a system of fourth-order boundaryvalue
problems associated with obstacle, unilateral and contact
problems. The convergence analysis of the methods has been
discussed and shown that the given approximations are better
than collocation and finite difference methods. Numerical
examples are presented to illustrate the applications of these
methods, and to compare the computed results with other
known methods.
Abstract: Electronic seal is an electronic device to check the
authenticity and integrity of freight containers at the point of arrival.
While RFID-based eSeals are gaining more acceptances and there are
also some standardization processes for these devices, a recent
research revealed that the current RFID-based eSeals are vulnerable to
various attacks. In this paper, we provide a feasible solution to
enhance the security of active RFID-based eSeals. Our approach is to
use an authentication and key agreement protocol between eSeal and
reader device, enabling data encryption and integrity check. Our
protocol is based on the use of block cipher AES, which is reasonable
since a block cipher can also be used for many other security purposes
including data encryption and pseudo-random number generation. Our
protocol is very simple, and it is applicable to low-end active RFID
eSeals.
Abstract: The present study has been taken to explore the
screening of in vitro antimicrobial activities of D-galactose-binding
sponge lectin (HOL-30). HOL-30 was purified from the marine
demosponge Halichondria okadai by affinity chromatography. The
molecular mass of the lectin was determined to be 30 kDa with a
single polypeptide by SDS-PAGE under non-reducing and reducing
conditions. HOL-30 agglutinated trypsinized and glutaraldehydefixed
rabbit and human erythrocytes with preference for type O
erythrocytes. The lectin was subjected to evaluation for inhibition of
microbial growth by the disc diffusion method against eleven human
pathogenic gram-positive and gram-negative bacteria. The lectin
exhibited strong antibacterial activity against gram-positive bacteria,
such as Bacillus megaterium and Bacillus subtilis. However, it did
not affect against gram-negative bacteria such as Salmonella typhi
and Escherichia coli. The largest zone of inhibition was recorded of
Bacillus megaterium (12 in diameter) and Bacillus subtilis (10 mm in
diameter) at a concentration of the lectin (250 μg/disc). On the other
hand, the antifungal activity of the lectin was investigated against six
phytopathogenic fungi based on food poisoning technique. The lectin
has shown maximum inhibition (22.83%) of mycelial growth of
Botrydiplodia theobromae at a concentration of 100 μg/mL media.
These findings indicate that the lectin may be of importance to
clinical microbiology and have therapeutic applications.
Abstract: This paper presents a system for tracking the movement of laparoscopic instruments which is based on an orthogonal system of webcams and video image processing. The movements are captured with two webcams placed orthogonally inside of the physical trainer. On the image, the instruments were detected by using color markers placed on the distal tip of each instrument. The 3D position of the tip of the instrument within the work space was obtained by linear triangulation method. Preliminary results showed linearity and repeatability in the motion tracking with a resolution of 0.616 mm in each axis; the accuracy of the system showed a 3D instrument positioning error of 1.009 ± 0.101 mm. This tool is a portable and low-cost alternative to traditional tracking devices and a trustable method for the objective evaluation of the surgeon’s surgical skills.
Abstract: REY area has been located in Tehran Province and several archaeological ruins of this area indicate that the settlement in this area has been started since several thousand years ago. In this paper, the main investigation items consist of analysis of oil components and groundwater quality inside the wells. By finding the contents of oil in the well, it is possible to find out the pollution source by comparing the oil contents of well with other oil products that are used inside and outside of the oil farm. Investigation items consist of analysis of BTEX (Benzene, Toluene, Ethyl-benzene, Xylene), Gas chromatographic distillation characteristics, Water content, Density, Sulfur content, Lead content, Atmospheric distillation, MTBE(Methyl tertiary butyl ether). Analysis of polluting oil components showed that except MW(Monitoring Well)10 and MW 15 that oil with slightly heavy components was detected in them; with a high possibility the polluting oil is light oil.
Abstract: Natural gas is the most popular fossil fuel in the
current era and future as well. Natural gas is existed in underground
reservoirs so it may contain many of non-hydrocarbon components
for instance, hydrogen sulfide, nitrogen and water vapor. These
impurities are undesirable compounds and cause several technical
problems for example, corrosion and environment pollution.
Therefore, these impurities should be reduce or removed from natural
gas stream. Khurmala dome is located in southwest Erbil-Kurdistan
region. The Kurdistan region government has paid great attention for
this dome to provide the fuel for Kurdistan region. However, the
Khurmala associated natural gas is currently flaring at the field.
Moreover, nowadays there is a plan to recover and trade this gas and
to use it either as feedstock to power station or to sell it in global
market. However, the laboratory analysis has showed that the
Khurmala sour gas has huge quantities of H2S about (5.3%) and CO2
about (4.4%). Indeed, Khurmala gas sweetening process has been
removed in previous study by using Aspen HYSYS. However,
Khurmala sweet gas still contents some quintets of water about 23
ppm in sweet gas stream. This amount of water should be removed or
reduced. Indeed, water content in natural gas cause several technical
problems such as hydrates and corrosion. Therefore, this study aims
to simulate the prospective Khurmala gas dehydration process by
using Aspen HYSYS V. 7.3 program. Moreover, the simulation
process succeeded in reducing the water content to less than 0.1ppm.
In addition, the simulation work is also achieved process
optimization by using several desiccant types for example, TEG and
DEG and it also study the relationship between absorbents type and
its circulation rate with HCs losses from glycol regenerator tower.
Abstract: A design of communication area for infrared
electronic-toll-collection systems to provide an extended
communication interval in the vehicle traveling direction and
regular boundary between contiguous traffic lanes is proposed.
By utilizing two typical low-cost commercial infrared LEDs with
different half-intensity angles Φ1/2 = 22◦ and 10◦, the radiation
pattern of the emitter is designed to properly adjust the spatial
distribution of the signal power. The aforementioned purpose
can be achieved with an LED array in a three-piece structure
with appropriate mounting angles. With this emitter, the influence
of the mounting parameters, including the mounting height and
mounting angles of the on-board unit and road-side unit, on the
system performance in terms of the received signal strength and
communication area are investigated. The results reveal that, for
our emitter proposed in this paper, the ideal ”long-and-narrow”
characteristic of the communication area is very little affected by
these mounting parameters. An optimum mounting configuration is
also suggested.
Abstract: A two-dimensional numerical simulation of the contribution
of both inertial and aerodynamic forces on the blade loads of
a Vertical-Axis Wind Turbine (VAWT) is presented. After describing
the computational model and the relative validation procedure, a
complete campaign of simulations - based on full RANS unsteady
calculations - is proposed for a three-bladed rotor architecture characterized
by a NACA 0021 airfoil. For each analyzed angular velocity,
the combined effect of pressure and viscous forces acting on every
rotor blade are compared to the corresponding centrifugal forces,
due to the revolution of the turbine, thus achieving a preliminary
estimation of the correlation between overall rotor efficiency and
structural blade loads.
Abstract: In this paper, we provide complete end-to-end delay analyses including the relay nodes for instant messages. Message Session Relay Protocol (MSRP) is used to provide congestion control for large messages in the Instant Messaging (IM) service. Large messages are broken into several chunks. These chunks may traverse through a maximum number of two relay nodes before reaching destination according to the IETF specification of the MSRP relay extensions. We discuss the current solutions of sending large instant messages and introduce a proposal to reduce message flows in the IM service. We consider virtual traffic parameter i.e., the relay nodes are stateless non-blocking for scalability purpose. This type of relay node is also assumed to have input rate at constant bit rate. We provide a new scheduling policy that schedules chunks according to their previous node?s delivery time stamp tags. Validation and analysis is shown for such scheduling policy. The performance analysis with the model introduced in this paper is simple and straight forward, which lead to reduced message flows in the IM service.
Abstract: This article describes the aspects of the formation of
the national idea and national identity through the prism of gender
control and its contradistinction to the obsolete, Soviet component.
The role of females in ethnic and national projects is considered from
the point of view of Dr. Nira Yuval-Davis: as biological reproducers
of the ethnic communities- members; as reproducers of the boarders
of ethnic/national groups; as central participants in the ideological
reproduction of community and transducers of its culture; as symbols
in ideology, reproduction and transformation of ethnic/national
categories; and as participants of national, economical, political and
military combats. The society of the transitional type uses the
symbolic resources of the formation of gender component in the
national project. The gender patterns act like cultural codes,
executing the important ideological function in formation of the
national female- image, i.e. the discussion on hijab - it-s not just the
discussion on control over the female body, it-s the discussion on the
metaphor of social order.
Abstract: A total of 33,680 nuclear power plants (NPPs) workers were monitored and recorded from 1990 to 2007. According to the record, the average individual radiation dose has been decreasing continually from it 3.20 mSv/man in 1990 to 1.12 mSv/man at the end of 2007. After the International Commission on Radiological Protection (ICRP) 60 recommendation was generalized in South Korea, no nuclear power plant workers received above 20 mSv radiation, and the numbers of relatively highly exposed workers have been decreasing continuously. The age distribution of radiation workers in nuclear power plants was composed of mainly 20-30- year-olds (83%) for 1990 ~ 1994 and 30-40-year-olds (75%) for 2003 ~ 2007. The difference in individual average dose by age was not significant. Most (77%) of NPP radiation exposures from 1990 to 2007 occurred mostly during the refueling period. With regard to exposure type, the majority of exposures were external exposures, representing 95% of the total exposures, while internal exposures represented only 5%. External effective dose was affected mainly by gamma radiation exposure, with an insignificant amount of neutron exposure. As for internal effective dose, tritium (3H) in the pressurized heavy water reactor (PHWR) was the biggest cause of exposure.
Abstract: Market based models are frequently used in the resource
allocation on the computational grid. However, as the size of
the grid grows, it becomes difficult for the customer to negotiate
directly with all the providers. Middle agents are introduced to
mediate between the providers and customers and facilitate the
resource allocation process. The most frequently deployed middle
agents are the matchmakers and the brokers. The matchmaking agent
finds possible candidate providers who can satisfy the requirements
of the consumers, after which the customer directly negotiates with
the candidates. The broker agents are mediating the negotiation with
the providers in real time.
In this paper we present a new type of middle agent, the marketmaker.
Its operation is based on two parallel operations - through
the investment process the marketmaker is acquiring resources and
resource reservations in large quantities, while through the resale process
it sells them to the customers. The operation of the marketmaker
is based on the fact that through its global view of the grid it can
perform a more efficient resource allocation than the one possible in
one-to-one negotiations between the customers and providers.
We present the operation and algorithms governing the operation
of the marketmaker agent, contrasting it with the matchmaker and
broker agents. Through a series of simulations in the task oriented
domain we compare the operation of the three agents types. We find
that the use of marketmaker agent leads to a better performance in the
allocation of large tasks and a significant reduction of the messaging
overhead.
Abstract: In this paper, genetic algorithm (GA) is proposed for
the design of an optimization algorithm to achieve the bandwidth
allocation of ATM network. In Broadband ISDN, the ATM is a highbandwidth;
fast packet switching and multiplexing technique. Using
ATM it can be flexibly reconfigure the network and reassign the
bandwidth to meet the requirements of all types of services. By
dynamically routing the traffic and adjusting the bandwidth
assignment, the average packet delay of the whole network can be
reduced to a minimum. M/M/1 model can be used to analyze the
performance.
Abstract: Space exploration is a highly visible endeavour of
humankind to seek profound answers to questions about the origins
of our solar system, whether life exists beyond Earth, and how we
could live on other worlds. Different platforms have been utilized in
planetary exploration missions, such as orbiters, landers, rovers, and
penetrators.
Having low mass, good mechanical contact with the surface,
ability to acquire high quality scientific subsurface data, and ability to
be deployed in areas that may not be conducive to landers or rovers,
Penetrators provide an alternative and complimentary solution that
makes possible scientific exploration of hardly accessible sites (icy
areas, gully sites, highlands etc.).
The Canadian Space Agency (CSA) has put space exploration as
one of the pillars of its space program, and established ExCo program
to prepare Canada for future international planetary exploration.
ExCo sets surface mobility as its focus and priority, and invests
mainly in the development of rovers because of Canada's niche space
robotics technology. Meanwhile, CSA is also investigating how
micro-penetrators can help Canada to fulfill its scientific objectives
for planetary exploration.
This paper presents a review of the micro-penetrator technologies,
past missions, and lessons learned. It gives a detailed analysis of the
technical challenges of micro-penetrators, such as high impact
survivability, high precision guidance navigation and control, thermal
protection, communications, and etc. Then, a Canadian perspective of
a possible micro-penetrator mission is given, including Canadian
scientific objectives and priorities, potential instruments, and flight
opportunities.
Abstract: This paper describes new computer vision algorithms
that have been developed to track moving objects as part of a
long-term study into the design of (semi-)autonomous vehicles. We
present the results of a study to exploit variable kernels for tracking in
video sequences. The basis of our work is the mean shift
object-tracking algorithm; for a moving target, it is usual to define a
rectangular target window in an initial frame, and then process the data
within that window to separate the tracked object from the background
by the mean shift segmentation algorithm. Rather than use the
standard, Epanechnikov kernel, we have used a kernel weighted by the
Chamfer distance transform to improve the accuracy of target
representation and localization, minimising the distance between the
two distributions in RGB color space using the Bhattacharyya
coefficient. Experimental results show the improved tracking
capability and versatility of the algorithm in comparison with results
using the standard kernel. These algorithms are incorporated as part of
a robot test-bed architecture which has been used to demonstrate their
effectiveness.
Abstract: Model-based approaches have been applied successfully
to a wide range of tasks such as specification, simulation, testing, and
diagnosis. But one bottleneck often prevents the introduction of these
ideas: Manual modeling is a non-trivial, time-consuming task.
Automatically deriving models by observing and analyzing running
systems is one possible way to amend this bottleneck. To
derive a model automatically, some a-priori knowledge about the
model structure–i.e. about the system–must exist. Such a model
formalism would be used as follows: (i) By observing the network
traffic, a model of the long-term system behavior could be generated
automatically, (ii) Test vectors can be generated from the model,
(iii) While the system is running, the model could be used to diagnose
non-normal system behavior.
The main contribution of this paper is the introduction of a model
formalism called 'probabilistic regression automaton' suitable for the
tasks mentioned above.
Abstract: Bioinformatics and computational biology involve
the use of techniques including applied mathematics,
informatics, statistics, computer science, artificial intelligence,
chemistry, and biochemistry to solve biological problems
usually on the molecular level. Research in computational
biology often overlaps with systems biology. Major research
efforts in the field include sequence alignment, gene finding,
genome assembly, protein structure alignment, protein structure
prediction, prediction of gene expression and proteinprotein
interactions, and the modeling of evolution. Various
global rearrangements of permutations, such as reversals and
transpositions,have recently become of interest because of their
applications in computational molecular biology. A reversal is
an operation that reverses the order of a substring of a permutation.
A transposition is an operation that swaps two adjacent
substrings of a permutation. The problem of determining the
smallest number of reversals required to transform a given
permutation into the identity permutation is called sorting by
reversals. Similar problems can be defined for transpositions
and other global rearrangements. In this work we perform a
study about some genome rearrangement primitives. We show
how a genome is modelled by a permutation, introduce some
of the existing primitives and the lower and upper bounds
on them. We then provide a comparison of the introduced
primitives.
Abstract: Support vector machines (SVMs) have shown
superior performance compared to other machine learning techniques,
especially in classification problems. Yet one limitation of SVMs is
the lack of an explanation capability which is crucial in some
applications, e.g. in the medical and security domains. In this paper, a
novel approach for eclectic rule-extraction from support vector
machines is presented. This approach utilizes the knowledge acquired
by the SVM and represented in its support vectors as well as the
parameters associated with them. The approach includes three stages;
training, propositional rule-extraction and rule quality evaluation.
Results from four different experiments have demonstrated the value
of the approach for extracting comprehensible rules of high accuracy
and fidelity.
Abstract: During recent years wind turbine technology has
undergone rapid developments. Growth in size and the optimization
of wind turbines has enabled wind energy to become increasingly
competitive with conventional energy sources. As a result today-s
wind turbines participate actively in the power production of several
countries around the world. These developments raise a number of
challenges to be dealt with now and in the future. The penetration of
wind energy in the grid raises questions about the compatibility of the
wind turbine power production with the grid. In particular, the
contribution to grid stability, power quality and behavior during fault
situations plays therefore as important a role as the reliability. In the
present work, we addressed two fault situations that have shown their
influence on the generator and the behavior of the wind over the
defects which are briefly discussed based on simulation results.