Abstract: The steady coupled dissipative layers, called
Marangoni mixed convection boundary layers, in the presence of a
magnetic field and solute concentration that are formed along the
surface of two immiscible fluids with uniform suction or injection
effects is examined. The similarity boundary layer equations are
solved numerically using the Runge-Kutta Fehlberg with shooting
technique. The Marangoni, buoyancy and external pressure gradient
effects that are generated in mixed convection boundary layer flow
are assessed. The velocity, temperature and concentration boundary
layers thickness decrease with the increase of the magnetic field
strength and the injection to suction. For buoyancy-opposed flow, the
Marangoni mixed convection parameter enhances the velocity
boundary layer but decreases the temperature and concentration
boundary layers. However, for the buoyancy-assisted flow, the
Marangoni mixed convection parameter decelerates the velocity but
increases the temperature and concentration boundary layers.
Abstract: In this paper the principle, basic torque theory and design optimisation of a six-phase reluctance dc machine are considered. A trapezoidal phase current waveform for the machine drive is proposed and evaluated to minimise ripple torque. Low cost normal laminated salient-pole rotors with and without slits and chamfered poles are investigated. The six-phase machine is optimised in multi-dimensions by linking the finite-element analysis method directly with an optimisation algorithm; the objective function is to maximise the torque per copper losses of the machine. The armature reaction effect is investigated in detail and found to be severe. The measured and calculated torque performances of a 35 kW optimum designed six-phase reluctance dc machine drive are presented.
Abstract: The goal of a network-based intrusion detection
system is to classify activities of network traffics into two major
categories: normal and attack (intrusive) activities. Nowadays, data
mining and machine learning plays an important role in many
sciences; including intrusion detection system (IDS) using both
supervised and unsupervised techniques. However, one of the
essential steps of data mining is feature selection that helps in
improving the efficiency, performance and prediction rate of
proposed approach. This paper applies unsupervised K-means
clustering algorithm with information gain (IG) for feature selection
and reduction to build a network intrusion detection system. For our
experimental analysis, we have used the new NSL-KDD dataset,
which is a modified dataset for KDDCup 1999 intrusion detection
benchmark dataset. With a split of 60.0% for the training set and the
remainder for the testing set, a 2 class classifications have been
implemented (Normal, Attack). Weka framework which is a java
based open source software consists of a collection of machine
learning algorithms for data mining tasks has been used in the testing
process. The experimental results show that the proposed approach is
very accurate with low false positive rate and high true positive rate
and it takes less learning time in comparison with using the full
features of the dataset with the same algorithm.
Abstract: This paper has, as its point of departure, the foundational
axiomatic theory of E. De Giorgi (1996, Scuola Normale
Superiore di Pisa, Preprints di Matematica 26, 1), based on two
primitive notions of quality and relation. With the introduction of
a unary relation, we develop a system totally based on the sole
primitive notion of relation. Such a modification enables a definition
of the concept of dynamic unary relation. In this way we construct a
simple language capable to express other well known theories such
as Robinson-s arithmetic or a piece of a theory of concatenation. A
key role in this system plays an abstract relation designated by “( )",
which can be interpreted in different ways, but in this paper we will
focus on the case when we can perform computations and obtain
results.
Abstract: The move from cash accounting to accrual accounting, or rule-based to principle-based accounting, by many governments is part of an ongoing efforts in promoting a more business-like and performance-focused public sector. Using questionnaire responses from preparers of financial statements of public universities in Malaysia, this study examines the implementation challenges and benefits of principle-based accounting. Results from these responses suggest that most respondents perceived significant costs would be incurred in relation to staff training and recruitment of staffs with relevant technical knowledge. In addition, most respondents also perceived that there will be significant changes in the current accounting system and structure in order to comply with the principle-based accounting requirements. However, most respondents perceived that these changes might not result in significant benefits for management purposes, for example, financial management, budgeting and allocation of resources. Nevertheless, most respondents perceived that principle-based accounting information would facilitate the monitoring function of the board. The general perception is that adoption of principle-based accounting information is not significantly useful than rule-based accounting information is expected to change over time as preparers of the financial statements gradually understand and appreciate the benefits of principle-based accounting information. This infers that the perceived usefulness of different accounting system is a function of familiarity by the preparers.
Abstract: In this paper we propose a simple adaptive algorithm
iteratively solving the unit-norm constrained optimization problem.
Instead of conventional parameter norm based normalization,
the proposed algorithm incorporates scalar normalization which is
computationally much simpler. The analysis of stationary point is
presented to show that the proposed algorithm indeed solves the
constrained optimization problem. The simulation results illustrate
that the proposed algorithm performs as good as conventional ones
while being computationally simpler.
Abstract: The protection of groundwater resources is the great
important many semiarid and arid environments. Baghan watershed
is located in the north of Kangan in the Boshehr province in Iran. The
groundwater resources have a vital role in supplying agricultural,
drinking, domestic and industrial water demand in Baghan
watershed. For our investigation into the water quality we collected
30 samples to chemical and physical analysis. The result showed the
marl and evaporation deposits that contain anhydrite and gypsum is
the main source of groundwater pollution, and one part of the
groundwater was polluted by oil and gas industrial. Another part of
the groundwater was contaminated by urban waste water. The
electrical conductivity and captions and anions increased around of
towns and gas refinery. Although the negative impact of untreated
domestic wastewater is relatively low but the results showed strongly
the negative impact of wastewater refinery is very considerable. This
negative impact increased in downstream due to shallow aquifer.
Additionally, the agents that adversely affect the quality of
groundwater come from a variety of sources, including geology,
domestic wastewater and the Jam refinery in Baghan watershed.
Abstract: The ionization energy in semiconductor
systems in nano scale was investigated by using effective mass
approximation. By introducing the Hamiltonian of the system, the
variational technique was employed to calculate the ground state and
the ionization energy of a donor at the center and in the case that the
impurities are randomly distributed inside a cubic quantum well. The
numerical results for GaAs/GaAlAs show that the ionization energy
strongly depends on the well width for both cases and it decreases as
the well width increases. The ionization energy of a quantum wire
was also calculated and compared with the results for the well.
Abstract: The objective of this work was to examine the
changes in the microstructure and macro physical properties caused
by the carbonation of normalised CEM II mortar. Samples were
prepared and subjected to accelerated carbonation at 20°C, 65%
relative humidity and 20% CO2 concentration. On the microstructure
scale, the evolutions of the cumulative pore volume, pore size
distribution, and specific surface area during carbonation were
calculated from the adsorption desorption isotherms of nitrogen. We
also examined the evolution of macro physical properties such as the
porosity accessible to water, the gas permeability, and thermal
conductivity. The conflict between the results of nitrogen porosity
and water porosity indicated that the porous domains explored using
these two techniques are different and help to complementarily
evaluate the effects of carbonation. This is a multi-scale study where
results on microstructural changes can help to explain the evolution
of macro physical properties.
Abstract: Motion sensors have been commonly used as a valuable component in mechatronic systems, however, many mechatronic designs and applications that need motion sensors cost enormous amount of money, especially high-tech systems. Design of a software for communication protocol between data acquisition card and motion sensor is another issue that has to be solved. This study presents how to design a low cost motion data acquisition setup consisting of MPU 6050 motion sensor (gyro and accelerometer in 3 axes) and Arduino Mega2560 microcontroller. Design parameters are calibration of the sensor, identification and communication between sensor and data acquisition card, interpretation of data collected by the sensor.
Abstract: The stop watch is used to measure the time required
for a certain event. This is different from normal clocks in many
ways, one of which is the accuracy of time. The stop watch requires
much more accuracy than the normal clocks. In this paper, an
ATmega8535 microcontroller was used to control the stop watch, by
which perfect accuracy can be ensured. For compiling the C code and
for loading the compiled .hex file into the microcontroller, AVR
studio and PonyProg were used respectively. The stop watch is also
different from traditional stop watches, as it contains two different
timing modes namely 'Split timing' and 'Lap timing'.
Abstract: RFID system, in which we give identification number to each item and detect it with radio frequency, supports more variable service than barcode system can do. For example, a refrigerator with RFID reader and internet connection will automatically notify expiration of food validity to us. But, in spite of its convenience, RFID system has some security threats, because anybody can get ID information of item easily. One of most critical threats is privacy invasion. Existing privacy protection schemes or systems have been proposed, and these schemes or systems defend normal users from attempts that any attacker tries to get information using RFID tag value. But, these systems still have weakness that attacker can get information using analogous value instead of original tag value. In this paper, we mention this type of attack more precisely and suggest 'Tag Broker Model', which can defend it. Tag broker in this model translates original tag value to random value, and user can only get random value. Attacker can not use analogous tag value, because he/she is not able to know original one from it.
Abstract: This research is aimed at studying the nature of
problems and demands of the training for community leaders in the
upper northeastern region of Thailand. Population and group
samplings are based on 360 community leaders in the region who
have experienced prior training from the Udonthani Rajabhat
University. Stratified random samplings have been drawn upon 186
participants. The research tools is questionnaires. The frequency,
percentage and standard deviation are employed in data analysis. The
findings indicate that most of community leaders are males and
senior adults. The problems in training are associated with the
inconveniences of long-distance travelling to training locations,
inadequacy of learning centers and training sites and high training
costs. The demand of training is basically motivated by a desire for
self-development in modern knowledge in keeping up-to-date with
the changing world and the need for technological application and
facilitation in shortening the distance to training locations and in
limiting expensive training costs.
Abstract: In this paper we consider a nonlinear feedback control called augmented automatic choosing control (AACC) for nonlinear systems with constrained input. Constant terms which arise from section wise linearization of a given nonlinear system are treated as coefficients of a stable zero dynamics.Parameters included in the control are suboptimally selectedby extremizing a combination of Hamiltonian and Lyapunov functions with the aid of the genetic algorithm. This approach is applied to a field excitation control problem of power system to demonstrate the splendidness of the AACC. Simulation results show that the new controller can improve performance remarkably well.
Abstract: In this paper we study numerical methods for solving Sylvester matrix equations of the form AX +XBT +CDT = 0. A new projection method is proposed. The union of Krylov subspaces in A and its inverse and the union of Krylov subspaces in B and its inverse are used as the right and left projection subspaces, respectively. The Arnoldi-like process for constructing the orthonormal basis of the projection subspaces is outlined. We show that the approximate solution is an exact solution of a perturbed Sylvester matrix equation. Moreover, exact expression for the norm of residual is derived and results on finite termination and convergence are presented. Some numerical examples are presented to illustrate the effectiveness of the proposed method.
Abstract: In this paper, we validate crater detection in moon surface image using FLDA. This proposal assumes that it is applied to SLIM (Smart Lander for Investigating Moon) project aiming at the pin-point landing to the moon surface. The point where the lander should land is judged by the position relations of the craters obtained via camera, so the real-time image processing becomes important element. Besides, in the SLIM project, 400kg-class lander is assumed, therefore, high-performance computers for image processing cannot be equipped. We are studying various crater detection methods such as Haar-Like features, LBP, and PCA. And we think these methods are appropriate to the project, however, to identify the unlearned images obtained by actual is insufficient. In this paper, we examine the crater detection using FLDA, and compare with the conventional methods.
Abstract: We present a preliminary x-ray study on human-hair
microstructures for a health-state indicator, in particular a cancer
case. As an uncomplicated and low-cost method of x-ray technique,
the human-hair microstructure was analyzed by wide-angle x-ray
diffractions (XRD) and small-angle x-ray scattering (SAXS). The
XRD measurements exhibited the simply reflections at the d-spacing
of 28 Å, 9.4 Å and 4.4 Å representing to the periodic distance of the
protein matrix of the human-hair macrofibrous and the diameter and
the repeated spacing of the polypeptide alpha helixes of the
photofibrils of the human-hair microfibrous, respectively. When
compared to the normal cases, the unhealthy cases including to the
breast- and ovarian-cancer cases obtained higher normalized ratios of
the x-ray diffracting peaks of 9.4 Å and 4.4 Å. This likely resulted
from the varied distributions of microstructures by a molecular
alteration. As an elemental analysis by x-ray fluorescence (XRF), the
normalized quantitative ratios of zinc(Zn)/calcium(Ca) and
iron(Fe)/calcium(Ca) were determined. Analogously, both Zn/Ca and
Fe/Ca ratios of the unhealthy cases were obtained higher than both of
the normal cases were. Combining the structural analysis by XRD
measurements and the elemental analysis by XRF measurements
exhibited that the modified fibrous microstructures of hair samples
were in relation to their altered elemental compositions. Therefore,
these microstructural and elemental analyses of hair samples will be
benefit to associate with a diagnosis of cancer and genetic diseases.
This functional method would lower a risk of such diseases by the
early diagnosis. However, the high-intensity x-ray source, the highresolution
x-ray detector, and more hair samples are necessarily
desired to develop this x-ray technique and the efficiency would be
enhanced by including the skin and fingernail samples with the
human-hair analysis.
Abstract: The unanticipated destruct of more of the steel moment frames in Northridge earthquake, altered class of regard to the beamto- column connections in moment frames. Panel zone is one the significant part of joints which, it-s stiffness and rigidity has an important effect on the behavior and ductility of the frame. Specifically that behavior of panel zone has a very significant effect on the special moment frames. In this paper , meanwhile the relations for modeling of panel zone in frames are expressed , special moment frames with different spans and stories were studied in the way of performance-based design. The frames designed in according with Iranian steel building code. The effect of panel zone is also considered and in the case of non-existence of performance level, by changing in intimacies and parameter of panel zone, performance level is considered.
Abstract: Descriptive statistics was performed with the aim to achieve research objective of to investigate lecturers- usage of the mobile technology for teaching. A representative sample of 20 lecturers from the Faculty of Industrial Art & Design Technology of Universiti Industri Selangor (UNISEL), Malaysia was selected as the respondents. The result attested that lecturers fully accept the concept of mobility in learning and game play is appealing concept to support classroom learning. Subsequently, analogous experience on small size of keypad, screen resolution, and navigation could be the major problematic factors to students and affect their mobile learning process. Recommendation for future research is also presented.
Abstract: This work presents a theoretical investigation of the
simultaneous absorption of CO2 and H2S into aqueous solutions of
MDEA and DEA. In this process the acid components react
with the basic alkanolamine solution via an exothermic,
reversible reaction in a gas/liquid absorber. The use of amine
solvents for gas sweetening has been investigated using
process simulation programs called HYSYS and ASPEN. We
use Electrolyte NRTL and Amine Package and Amines
(experimental) equation of state. The effects of temperature and
circulation rate and amine concentration and packed column and
murphree efficiency on the rate of absorption were studied.
When lean amine flow and concentration increase, CO2 and H2S
absorption increase too. With the improvement of inlet amine
temperature in absorber, CO2 and H2S penetrate to upper stages of
absorber and absorption of acid gases in absorber decreases. The CO2
concentration in the clean gas can be greatly influenced by the
packing height, whereas for the H2S concentration in the clean gas the
packing height plays a minor role. HYSYS software can not
estimate murphree efficiency correctly and it applies the same
contributions in all diagrams for HYSYS software. By
improvement in murphree efficiency, maximum temperature
of absorber decrease and the location of reaction transfer to the
stages of bottoms absorber and the absorption of acid gases
increase.