Abstract: Numerical design optimization is a powerful tool that
can be used by engineers during any stage of the design process.
There are many different applications for structural optimization. A
specific application that will be discussed in the following paper is
experimental data matching. Data obtained through tests on a physical
structure will be matched with data from a numerical model of that
same structure. The data of interest will be the dynamic characteristics
of an antenna structure focusing on the mode shapes and modal
frequencies. The structure used was a scaled and simplified model of
the Karoo Array Telescope-7 (KAT-7) antenna structure.
This kind of data matching is a complex and difficult task. This
paper discusses how optimization can assist an engineer during the
process of correlating a finite element model with vibration test data.
Abstract: Signalized intersections on high-volume arterials are
often congested during peak hours, causing a decrease in through
movement efficiency on the arterial. Much of the vehicle delay
incurred at conventional intersections is caused by high left-turn
demand. Unconventional intersection designs attempt to reduce
intersection delay and travel time by rerouting left-turns away from
the main intersection and replacing it with right-turn followed by Uturn.
The proposed new type of U-turn intersection is geometrically
designed with a raised island which provides a protected U-turn
movement. In this study several scenarios based on different
distances between U-turn and main intersection, traffic volume of
major/minor approaches and percentage of left-turn volumes were
simulated by use of AIMSUN, a type of traffic microsimulation
software. Subsequently some models are proposed in order to
compute travel time of each movement. Eventually by correlating
these equations to some in-field collected data of some implemented
U-turn facilities, the reliability of the proposed models are approved.
With these models it would be possible to calculate travel time of
each movement under any kind of geometric and traffic condition. By
comparing travel time of a conventional signalized intersection with
U-turn intersection travel time, it would be possible to decide on
converting signalized intersections into this new kind of U-turn
facility or not. However comparison of travel time is not part of the
scope of this research. In this paper only travel time of this innovative
U-turn facility would be predicted. According to some before and
after study about the traffic performance of some executed U-turn
facilities, it is found that commonly, this new type of U-turn facility
produces lower travel time. Thus, evaluation of using this type of
unconventional intersection should be seriously considered.
Abstract: Crypto System Identification is one of the challenging tasks in Crypt analysis. The paper discusses the possibility of employing Neural Networks for identification of Cipher Systems from cipher texts. Cascade Correlation Neural Network and Back Propagation Network have been employed for identification of Cipher Systems. Very large collection of cipher texts were generated using a Block Cipher (Enhanced RC6) and a Stream Cipher (SEAL). Promising results were obtained in terms of accuracy using both the Neural Network models but it was observed that the Cascade Correlation Neural Network Model performed better compared to Back Propagation Network.
Abstract: In this manuscript, the LBM is applied for simulating of Mixed Convection in a Lid-Driven cavity with an open side. The cavity horizontal walls are insulated while the west Lid-driven wall is maintained at a uniform temperature higher than the ambient. Prandtl number (Pr) is fixed to 0.71 (air) while Reynolds number (Re) , Richardson number (Ri) and aspect ratio (A) of the cavity are changed in the range of 50-150 , of 0.1-10 and of 1-4 , respectively. The numerical code is validated for the standard square cavity, and then the results of an open ended cavity are presented. Result shows by increasing of aspect ratio, the average Nusselt number (Nu) on lid- driven wall decreases and with same Reynolds number (Re) by increasing of aspect ratio (A), Richardson number plays more important role in heat transfer rate.
Abstract: In this paper, algorithms for the automatic localisation
of two anatomical soft tissue landmarks of the head the medial
canthus (inner corner of the eye) and the tragus (a small, pointed,
cartilaginous flap of the ear), in CT images are describet. These
landmarks are to be used as a basis for an automated image-to-patient
registration system we are developing. The landmarks are localised
on a surface model extracted from CT images, based on surface
curvature and a rule based system that incorporates prior knowledge
of the landmark characteristics. The approach was tested on a dataset
of near isotropic CT images of 95 patients. The position of the
automatically localised landmarks was compared to the position of
the manually localised landmarks. The average difference was 1.5
mm and 0.8 mm for the medial canthus and tragus, with a maximum
difference of 4.5 mm and 2.6 mm respectively.The medial canthus
and tragus can be automatically localised in CT images, with
performance comparable to manual localisation
Abstract: China apparel industry, which is deeply embedded in
the global production network (GPN), faces the dual pressures of
social upgrading and economic upgrading. Based on the survey in
Ningbo apparel cluster, the paper shows the state of corporate social
responsibility (CSR) in China apparel industry is better than before.
And the investigation indicates that the firms who practice CSR
actively perform better both socially and economically than those who
inactively. The research demonstrates that CSR can be an initial
capital rather than cost, and “doing well by doing good" is also existed
in labor intensive industry.
Abstract: Dichotomization of the outcome by a single cut-off point is an important part of various medical studies. Usually the relationship between the resulted dichotomized dependent variable and explanatory variables is analyzed with linear regression, probit regression or logistic regression. However, in many real-life situations, a certain cut-off point dividing the outcome into two groups is unknown and can be specified only approximately, i.e. surrounded by some (small) uncertainty. It means that in order to have any practical meaning the regression model must be robust to this uncertainty. In this paper, we show that neither the beta in the linear regression model, nor its significance level is robust to the small variations in the dichotomization cut-off point. As an alternative robust approach to the problem of uncertain medical categories, we propose to use the linear regression model with the fuzzy membership function as a dependent variable. This fuzzy membership function denotes to what degree the value of the underlying (continuous) outcome falls below or above the dichotomization cut-off point. In the paper, we demonstrate that the linear regression model of the fuzzy dependent variable can be insensitive against the uncertainty in the cut-off point location. In the paper we present the modeling results from the real study of low hemoglobin levels in infants. We systematically test the robustness of the binomial regression model and the linear regression model with the fuzzy dependent variable by changing the boundary for the category Anemia and show that the behavior of the latter model persists over a quite wide interval.
Abstract: The paper deals with a mathematical model for fluid dynamic flows on road networks which is based on conservation laws. This nonlinear framework is based on the conservation of cars. We focus on traffic circle, which is a finite number of roads that meet at some junctions. The traffic circle with junctions having either one incoming and two outgoing or two incoming and one outgoing roads. We describe the numerical schemes with the particular boundary conditions used to produce approximated solutions of the problem.
Abstract: In this paper after reviewing some previous studies, in
order to optimize the above knee prosthesis, beside the inertial
properties a new controlling parameter is informed. This controlling
parameter makes the prosthesis able to act as a multi behavior system
when the amputee is opposing to different environments. This active
prosthesis with the new controlling parameter can simplify the
control of prosthesis and reduce the rate of energy consumption in
comparison to recently presented similar prosthesis “Agonistantagonist
active knee prosthesis".
In this paper three models are generated, a passive, an active, and
an optimized active prosthesis. Second order Taylor series is the
numerical method in solution of the models equations and the
optimization procedure is genetic algorithm.
Modeling the prosthesis which comprises this new controlling
parameter (SEP) during the swing phase represents acceptable results
in comparison to natural behavior of shank. Reported results in this
paper represent 3.3 degrees as the maximum deviation of models
shank angle from the natural pattern. The natural gait pattern belongs
to walking at the speed of 81 m/min.
Abstract: Adaptive echo cancellers with two-path algorithm are
applied to avoid the false adaptation during the double-talk situation.
In the two-path algorithm, several transfer logic solutions have been
proposed to control the filter update. This paper presents an improved
transfer logic solution. It improves the convergence speed of the
two-path algorithm, and allows the reduction of the memory elements
and computational complexity. Results of simulations show the
improved performance of the proposed solution.
Abstract: Recent years have witnessed the rapid development of
the Internet and telecommunication techniques. Information security
is becoming more and more important. Applications such as covert
communication, copyright protection, etc, stimulate the research of
information hiding techniques. Traditionally, encryption is used to
realize the communication security. However, important information
is not protected once decoded. Steganography is the art and science
of communicating in a way which hides the existence of the communication.
Important information is firstly hidden in a host data, such
as digital image, video or audio, etc, and then transmitted secretly
to the receiver.In this paper a data hiding model with high security
features combining both cryptography using finite state sequential
machine and image based steganography technique for communicating
information more securely between two locations is proposed.
The authors incorporated the idea of secret key for authentication
at both ends in order to achieve high level of security. Before the
embedding operation the secret information has been encrypted with
the help of finite-state sequential machine and segmented in different
parts. The cover image is also segmented in different objects through
normalized cut.Each part of the encoded secret information has been
embedded with the help of a novel image steganographic method
(PMM) on different cuts of the cover image to form different stego
objects. Finally stego image is formed by combining different stego
objects and transmit to the receiver side. At the receiving end different
opposite processes should run to get the back the original secret
message.
Abstract: Ultrasonic machining (USM) is a non-traditional
machining process being widely used for commercial machining of
brittle and fragile materials such as glass, ceramics and
semiconductor materials. However, USM could be a viable
alternative for machining a tough material such as titanium; and this
aspect needs to be explored through experimental research. This
investigation is focused on exploring the use of ultrasonic machining
for commercial machining of pure titanium (ASTM Grade-I) and
evaluation of tool wear rate (TWR) under controlled experimental
conditions. The optimal settings of parameters are determined
through experiments planned, conducted and analyzed using Taguchi
method. In all, the paper focuses on parametric optimization of
ultrasonic machining of pure titanium metal with TWR as response,
and validation of the optimized value of TWR by conducting
confirmatory experiments.
Abstract: Our aim in this piece of work is to demonstrate the
power of the Laplace Adomian decomposition method (LADM) in
approximating the solutions of nonlinear differential equations
governing the two-dimensional viscous flow induced by a shrinking
sheet.
Abstract: In this paper, the authors examine whether or not there Institute for Information and Communications Policy shows are differences of Japanese Internet users awareness to information security based on individual attributes by using analysis of variance based on non-parametric method. As a result, generally speaking, it is found that Japanese Internet users' awareness to information security is different by individual attributes. Especially, the authors verify that the users who received the information security education would have rather higher recognition concerning countermeasures than other users including self-educated users. It is suggested that the information security education should be enhanced so that the users may appropriately take the information security countermeasures. In addition, the information security policy such as carrying out "e- net caravan" and "information security seminars" are effective in improving the users' awareness on the information security in Japan.
Abstract: This paper proposes a direct power control for
doubly-fed induction machine for variable speed wind power
generation. It provides decoupled regulation of the primary side
active and reactive power and it is suitable for both electric energy
generation and drive applications. In order to control the power
flowing between the stator of the DFIG and the network, a decoupled
control of active and reactive power is synthesized using PI
controllers.The obtained simulation results show the feasibility
and the effectiveness of the suggested method
Abstract: An integrated vehicle dynamics control system is developed in this paper by a combination of active front steering (AFS) and direct yaw-moment control (DYC) based on fuzzy logic control. The control system has a hierarchical structure consisting of two layers. A fuzzy logic controller is used in the upper layer (yaw rate controller) to keep the yaw rate in its desired value. The yaw rate error and its rate of change are applied to the upper controlling layer as inputs, where the direct yaw moment control signal and the steering angle correction of the front wheels are the outputs. In the lower layer (fuzzy integrator), a fuzzy logic controller is designed based on the working region of the lateral tire forces. Depending on the directions of the lateral forces at the front wheels, a switching function is activated to adjust the scaling factor of the fuzzy logic controller. Using a nonlinear seven degrees of freedom vehicle model, the simulation results illustrate considerable improvements which are achieved in vehicle handling through the integrated AFS/DYC control system in comparison with the individual AFS or DYC controllers.
Abstract: Normally business changes are made in order to
change a level of activity in some way, whether it is sales, cash flow,
productivity, or product portfolio. When attempts are made to make
such changes, too often the business reverts to the old levels of
activity as soon as management attention is diverted. Risk
management is a field of growing interest to project managers as well
as in general business and organizational management. There are
several approaches used to manage risk in projects and this paper is a
brief outline of some that you might encounter, with an indication of
their strengths and weaknesses.
Abstract: There is wide range of scientific workflow systems
today, each one designed to resolve problems at a specific level. In
large collaborative projects, it is often necessary to recognize the
heterogeneous workflow systems already in use by various partners
and any potential collaboration between these systems requires
workflow interoperability. Publish/Subscribe Scientific Workflow
Interoperability Framework (PS-SWIF) approach was proposed to
achieve workflow interoperability among workflow systems. This
paper evaluates the PS-SWIF approach and its system to achieve
workflow interoperability using Web Services with asynchronous
notification messages represented by WS-Eventing standard. This
experiment covers different types of communication models provided
by Workflow Management Coalition (WfMC). These models are:
Chained processes, Nested synchronous sub-processes, Event
synchronous sub-processes, and Nested sub-processes
(Polling/Deferred Synchronous). Also, this experiment shows the
flexibility and simplicity of the PS-SWIF approach when applied to a
variety of workflow systems (Triana, Taverna, Kepler) in local and
remote environments.
Abstract: In this paper, we investigate the problem of the existence, uniqueness and global asymptotic stability of the equilibrium point for a class of neural networks, the neutral system has mixed time delays and parameter uncertainties. Under the assumption that the activation functions are globally Lipschitz continuous, we drive a new criterion for the robust stability of a class of neural networks with time delays by utilizing the Lyapunov stability theorems and the Homomorphic mapping theorem. Numerical examples are given to illustrate the effectiveness and the advantage of the proposed main results.
Abstract: Soft topological spaces are considered as mathematical tools for dealing with uncertainties, and a fuzzy topological space
is a special case of the soft topological space. The purpose of this paper is to study soft topological spaces. We introduce some new concepts in soft topological spaces such as soft closed mapping, soft open mappings, soft connected spaces and soft paracompact spaces. We also redefine the concept of soft points such that it is reasonable in soft topological spaces. Moreover, some basic properties of these concepts are explored.