Abstract: CloudSim is a useful tool to simulate the cloud
environment. It shows the service availability, the power consumption,
and the network traffic of services on the cloud environment.
Moreover, it supports to calculate a network communication delay
through a network topology data easily. CloudSim allows inputting a
file of topology data, but it does not provide any generating process.
Thus, it needs the file of topology data generated from some other
tools. The BRITE is typical network topology generator. Also, it
supports various type of topology generating algorithms. If CloudSim
can include the BRITE, network simulation for clouds is easier than
existing version. This paper shows the potential of connection between
BRITE and CloudSim. Also, it proposes the direction to link between
them.
Abstract: This work involved the use of phytoremediation to
remediate an aged soil contaminated with polychlorinated biphenyls
(PCBs). At microcosm scale, tests were prepared using soil samples
that have been collected in an industrial area with a total PCBs
concentration of about 250 μg kg-1. Medicago sativa and Lolium
italicum were the species selected in this study that is used as
“feasibility test" for full scale remediation. The experiment was
carried out with the addition of a mixture of randomly methylatedbeta-
cyclodextrins (RAMEB). At the end of the experiment analysis
of soil samples showed that in general the presence of plants has led
to a higher degradation of most congeners with respect to not
vegetated soil. The two plant species efficiencies were comparable
and improved by RAMEB addition with a final reduction of total
PCBs near to 50%. With increasing the chlorination of the congeners
the removal percentage of PCBs progressively decreased.
Abstract: This paper presents a new hardware interface using a
microcontroller which processes audio music signals to standard
MIDI data. A technique for processing music signals by extracting
note parameters from music signals is described. An algorithm to
convert the voice samples for real-time processing without complex
calculations is proposed. A high frequency microcontroller as the
main processor is deployed to execute the outlined algorithm. The
MIDI data generated is transmitted using the EIA-232 protocol. The
analyses of data generated show the feasibility of using
microcontrollers for real-time MIDI generation hardware interface.
Abstract: Avalanche release of snow has been modeled in the present studies. Snow is assumed to be represented by semi-solid and the governing equations have been studied from the concept of continuum approach. The dynamical equations have been solved for two different zones [starting zone and track zone] by using appropriate initial and boundary conditions. Effect of density (ρ), Eddy viscosity (η), Slope angle (θ), Slab depth (R) on the flow parameters have been observed in the present studies. Numerical methods have been employed for computing the non linear differential equations. One of the most interesting and fundamental innovation in the present studies is getting initial condition for the computation of velocity by numerical approach. This information of the velocity has obtained through the concept of fracture mechanics applicable to snow. The results on the flow parameters have found to be in qualitative agreement with the published results.
Abstract: Agriculture products are being more demanding in
market today. To increase its productivity, automation to produce
these products will be very helpful. The purpose of this work is to
measure and determine the ripeness and quality of watermelon. The
textures on watermelon skin will be captured using digital camera.
These images will be filtered using image processing technique. All
these information gathered will be trained using ANN to determine
the watermelon ripeness accuracy. Initial results showed that the best
model has produced percentage accuracy of 86.51%, when measured
at 32 hidden units with a balanced percentage rate of training dataset.
Abstract: fibers of pure cellulose can be made from some bacteria such as acetobacter xylinum. Bacterial cellulose fibers are very pure, tens of nm across and about 0.5 micron long. The fibers are very stiff and, although nobody seems to have measured the strength of individual fibers. Their stiffness up to 70 GPa. Fundamental strengths should be at least greater than those of the best commercial polymers, but best bulk strength seems to about the same as that of steel. They can potentially be produced in industrial quantities at greatly lowered cost and water content, and with triple the yield, by a new process. This article presents a critical review of the available information on the bacterial cellulose as a biological nonwoven fabric with special emphasis on its fermentative production and applications. Characteristics of bacterial cellulose biofabric with respect to its structure and physicochemical properties are discussed. Current and potential applications of bacterial cellulose in textile, nonwoven cloth, paper, films synthetic fiber coating, food, pharmaceutical and other industries are also presented.
Abstract: Task of object localization is one of the major
challenges in creating intelligent transportation. Unfortunately, in
densely built-up urban areas, localization based on GPS only
produces a large error, or simply becomes impossible. New
opportunities arise for the localization due to the rapidly emerging
concept of a wireless ad-hoc network. Such network, allows
estimating potential distance between these objects measuring
received signal level and construct a graph of distances in which
nodes are the localization objects, and edges - estimates of the
distances between pairs of nodes. Due to the known coordinates of
individual nodes (anchors), it is possible to determine the location of
all (or part) of the remaining nodes of the graph. Moreover, road
map, available in digital format can provide localization routines
with valuable additional information to narrow node location search.
However, despite abundance of well-known algorithms for solving
the problem of localization and significant research efforts, there are
still many issues that currently are addressed only partially. In this
paper, we propose localization approach based on the graph mapped
distances on the digital road map data basis. In fact, problem is
reduced to distance graph embedding into the graph representing area
geo location data. It makes possible to localize objects, in some cases
even if only one reference point is available. We propose simple
embedding algorithm and sample implementation as spatial queries
over sensor network data stored in spatial database, allowing
employing effectively spatial indexing, optimized spatial search
routines and geometry functions.
Abstract: This paper may be considered as combination of both pervasive computing and Differential GPS (global positioning satellite) which relates to control automatic traffic signals in such a
way as to pre-empt normal signal operation and permit lifesaving vehicles. Before knowing the arrival of the lifesaving vehicles from
the signal there is a chance of clearing the traffic. Traffic signal
preemption system includes a vehicle equipped with onboard computer system capable of capturing diagnostic information and
estimated location of the lifesaving vehicle using the information provided by GPS receiver connected to the onboard computer system
and transmitting the information-s using a wireless transmitter via a
wireless network. The fleet management system connected to a
wireless receiver is capable of receiving the information transmitted
by the lifesaving vehicle .A computer is also located at the
intersection uses corrected vehicle position, speed & direction
measurements, in conjunction with previously recorded data defining
approach routes to the intersection, to determine the optimum time to
switch a traffic light controller to preemption mode so that lifesaving
vehicles can pass safely. In case when the ambulance need to take a
“U" turn in a heavy traffic area we suggest a solution. Now we are
going to make use of computerized median which uses LINKED
BLOCKS (removable) to solve the above problem.
Abstract: The Sphere Method is a flexible interior point algorithm for linear programming problems. This was developed mainly by Professor Katta G. Murty. It consists of two steps, the centering step and the descent step. The centering step is the most expensive part of the algorithm. In this centering step we proposed some improvements such as introducing two or more initial feasible solutions as we solve for the more favorable new solution by objective value while working with the rigorous updates of the feasible region along with some ideas integrated in the descent step. An illustration is given confirming the advantage of using the proposed procedure.
Abstract: In this study arsenate [As(V)] removal from drinking water by coagulation process was investigated. Ferric chloride (FeCl3.6H2O) and ferrous sulfate (FeSO4.7H2O) were used as coagulant. The effects of major operating variables such as coagulant dose (1–30 mg/L) and pH (5.5–9.5) were investigated. Ferric chloride and ferrous sulfate were found as effective and reliable coagulant due to required dose, residual arsenate and coagulant concentration. Optimum pH values for maximum arsenate removal for ferrous sulfate and ferric chloride were found as 8 and 7.5. The arsenate removal efficiency decreased at neutral and acidic pH values for Fe(II) and at the high acidic and high alkaline pH for Fe(III). It was found that the increase of coagulant dose caused a substantial increase in the arsenate removal. But above a certain ferric chloride and ferrous sulfate dosage, the increase in arsenate removal was not significant. Ferric chloride and ferrous sulfate dose above 8 mg/L slightly increased arsenate removal.
Abstract: Architecture as a form of art, whilst actively
developing, finds new methods and conceptions. Currently,
architectural animation is actively developing as a step, successive to
architectural visualization. Interesting vistas of architectural ideas
were discovered by artists of Japanese animation, in which there are
traditional spirits, kami, and imaginary spaces relating to them.
Anime art should be considered abstract painting, another kind of an
architectural workshop, where new architectural ideas are generated.
Abstract: Due to increased number of terrorist attacks in recent years, loads induced by explosions need to be incorporated in building designs. For safer performance of a structure, its foundation should have sufficient strength and stability. Therefore, prior to any reconstruction or rehabilitation of a building subjected to blast, it is important to examine adverse effects on the foundation caused by blast induced ground shocks. This paper evaluates the effects of a buried explosion on a pile foundation. It treats the dynamic response of the pile in saturated sand, using explicit dynamic nonlinear finite element software LS-DYNA. The blast induced wave propagation in the soil and the horizontal deformation of pile are presented and the results are discussed. Further, a parametric study is carried out to evaluate the effect of varying the explosive shape on the pile response. This information can be used to evaluate the vulnerability of piled foundations to credible blast events as well as develop guidance for their design.
Abstract: This paper investigates the structure and content of the
wine lists in upscale restaurants in Portugal (N=61). The respondents
considered that a wine list should be easy to use and to modify, welldesigned,
modern and varied. Respondents also stated that they
perform on average 6 revisions to the wine list per year. The
restaurant owner, the restaurant manager and the sommelier were the
main persons in charge of the wine list design. One of the most
important reasons for selecting wines across most restaurants was to
‘complement the menu’ and ‘pairing food with wine’. Restaurants
also reported to be relatively independent from suppliers and
magazine evaluations. Moreover, this work revealed that the
restaurant wine list is considered by restaurateurs as a strategic tool to
sell wine as a complement to the menu, to improve customer
satisfaction and loyalty, to increase restaurant value and to enhance a
successful positioning.
Abstract: The present experimental investigation brings about
a comparative study of lactic acid production by pure strains of
Lactobacilli (1) L. delbreuckii (NCIM2025), (2) L. pentosus (NCIM
2912), (3) Lactobacillus sp.(NCIM 2734, (4) Lactobacillus sp.
(NCIM2084) and coculture of strain-1 and Stain-2 in solid bed of
wheat bran, under the influence of different nitrogen sources such as
baker-s yeast, meat extract and proteose peptone. Among the pure
cultures, strain-3 attained lowest pH value of 3.44, hence highest acid
formation 46.41 g/L, while the coculture attained an overall
maximum value 47.56 g/L lactic acid (pH 3.38) at 15 g/L and 20 g/L
level of baker-s yeast, respectively.
Abstract: The current methods of predictive controllers are
utilized for those processes in which the rate of output variations is
not high. For such processes, therefore, stability can be achieved by
implementing the constrained predictive controller or applying
infinite prediction horizon. When the rate of the output growth is
high (e.g. for unstable nonminimum phase process) the stabilization
seems to be problematic. In order to avoid this, it is suggested to
change the method in the way that: first, the prediction error growth
should be decreased at the early stage of the prediction horizon, and
second, the rate of the error variation should be penalized. The
growth of the error is decreased through adjusting its weighting
coefficients in the cost function. Reduction in the error variation is
possible by adding the first order derivate of the error into the cost
function. By studying different examples it is shown that using these
two remedies together, the closed-loop stability of unstable
nonminimum phase process can be achieved.
Abstract: The boundary layer flow and heat transfer on a
stretched surface moving with prescribed skin friction is studied for
permeable surface. The surface temperature is assumed to vary
inversely with the vertical direction x for n = -1. The skin friction at
the surface scales as (x-1/2) at m = 0. The constants m and n are the
indices of the power law velocity and temperature exponent
respectively. Similarity solutions are obtained for the boundary layer
equations subject to power law temperature and velocity variation.
The effect of various governing parameters, such as the buoyancy
parameter λ and the suction/injection parameter fw for air (Pr = 0.72)
are studied. The choice of n and m ensures that the used similarity
solutions are x independent. The results show that, assisting flow (λ >
0) enhancing the heat transfer coefficient along the surface for any
constant value of fw. Furthermore, injection increases the heat
transfer coefficient but suction reduces it at constant λ.
Abstract: This paper proposes a novel architecture for developing decision support systems. Unlike conventional decision support systems, the proposed architecture endeavors to reveal the decision-making process such that humans' subjectivity can be incorporated into a computerized system and, at the same time, to preserve the capability of the computerized system in processing information objectively. A number of techniques used in developing the decision support system are elaborated to make the decisionmarking process transparent. These include procedures for high dimensional data visualization, pattern classification, prediction, and evolutionary computational search. An artificial data set is first employed to compare the proposed approach with other methods. A simulated handwritten data set and a real data set on liver disease diagnosis are then employed to evaluate the efficacy of the proposed approach. The results are analyzed and discussed. The potentials of the proposed architecture as a useful decision support system are demonstrated.
Abstract: In most rule-induction algorithms, the only operator used against nominal attributes is the equality operator =. In this paper, we first propose the use of the inequality operator, ≠, in addition to the equality operator, to increase the expressiveness of induced rules. Then, we present a new method, Binary Coding, which can be used along with an arbitrary rule-induction algorithm to make use of the inequality operator without any need to change the algorithm. Experimental results suggest that the Binary Coding method is promising enough for further investigation, especially in cases where the minimum number of rules is desirable.
Abstract: The Bangnanglee Sub-district Administrative Office,
Thailand had initiated a policy to environmental protection with
encouraging household waste management in order to promote civil
responsibility for domestic hygienic. This research studied the
household behaviors on solid waste and wastewater management. A
sample population of 306 families answered a questionnaire. The
study showed that, on average, domestic activities had produced 1.93
kilograms of waste per household per day. It has been found that 79%
of the households made several attempts to reduce their own amount
of waste. 80% of the households stationed their own garbage bins.
71% managed their waste by selling recyclable products. As for the
rest of the waste, 51% burned them, while 29% disposed their waste
in the nearby public trashcans and other 13% have them buried. As
for wastewater, 60% of the households disposed it into the sewage,
whereas 30% disposed them right from their elevated house.
Abstract: Keystroke authentication is a new access control system
to identify legitimate users via their typing behavior. In this paper,
machine learning techniques are adapted for keystroke authentication.
Seven learning methods are used to build models to differentiate user
keystroke patterns. The selected classification methods are Decision
Tree, Naive Bayesian, Instance Based Learning, Decision Table, One
Rule, Random Tree and K-star. Among these methods, three of them
are studied in more details. The results show that machine learning
is a feasible alternative for keystroke authentication. Compared to
the conventional Nearest Neighbour method in the recent research,
learning methods especially Decision Tree can be more accurate. In
addition, the experiment results reveal that 3-Grams is more accurate
than 2-Grams and 4-Grams for feature extraction. Also, combination
of attributes tend to result higher accuracy.