Abstract: Short message integrated distributed monitoring systems (SM-DMS) are growing rapidly in wireless communication applications in various areas, such as electromagnetic field (EMF) management, wastewater monitoring, and air pollution supervision, etc. However, delay in short messages often makes the data embedded in SM-DMS transmit unreliably. Moreover, there are few regulations dealing with this problem in SMS transmission protocols. In this study, based on the analysis of the command and data requirements in the SM-DMS, we developed a processing model for the control center to solve the delay problem in data transmission. Three components of the model: the data transmission protocol, the receiving buffer pool method, and the timer mechanism were described in detail. Discussions on adjusting the threshold parameter in the timer mechanism were presented for the adaptive performance during the runtime of the SM-DMS. This model optimized the data transmission reliability in SM-DMS, and provided a supplement to the data transmission reliability protocols at the application level.
Abstract: To investigate the applicability of the EDR-2 film for
clinical radiation dosimetry, percentage depth-doses, profiles and
distributions in open and dynamically wedged fields were measured
using film and compared with data from a Treatment Planning
system.The validity of the EDR2 film to measure dose in a plane
parallel to the beam was tested by irradiating 10 cm×10 cm and 4
cm×4 cm fields from a Siemens, primus linac with a 6MV beam and
a source-to-surface distance of 100 cm. The film was placed
Horizontally between solid water phantom blocks and marked
with pin holes at a depth of 10 cm from the incident beam surface.
The film measurement results, in absolute dose, were compared with
ion chamber measurements using a Welhoffer scanning water tank
system and Treatment Planning system. Our results indicate a
maximum underestimate of calculated dose of 8 % with Treatment
Planning system.
Abstract: Many electronic voting systems, classified mainly as homomorphic cryptography based, mix-net based and blind signature based, appear after the eighties when zero knowledge proofs were introduced. The common ground for all these three systems is that none of them works without real time cryptologic calculations that should be held on a server. As far as known, the agent-based approach has not been used in a secure electronic voting system. In this study, an agent-based electronic voting schema, which does not contain real time calculations on the server side, is proposed. Conventional cryptologic methods are used in the proposed schema and some of the requirements of an electronic voting system are constructed within the schema. The schema seems quite secure if the used cryptologic methods and agents are secure. In this paper, proposed schema will be explained and compared with already known electronic voting systems.
Abstract: The paper deals with an analysis of visibility records collected from 210 European airports to obtain a realistic estimation of the availability of Free Space Optical (FSO) data links. Commercially available optical links usually operate in the 850nm waveband. Thus the influence of the atmosphere on the optical beam and on the visible light is similar. Long-term visibility records represent an invaluable source of data for the estimation of the quality of service of FSO links. The model used characterizes both the statistical properties of fade depths and the statistical properties of individual fade durations. Results are presented for Italy, France, and Germany.
Abstract: Self-organizing map (SOM) is a well known data reduction technique used in data mining. Data visualization can reveal structure in data sets that is otherwise hard to detect from raw data alone. However, interpretation through visual inspection is prone to errors and can be very tedious. There are several techniques for the automatic detection of clusters of code vectors found by SOMs, but they generally do not take into account the distribution of code vectors; this may lead to unsatisfactory clustering and poor definition of cluster boundaries, particularly where the density of data points is low. In this paper, we propose the use of a generic particle swarm optimization (PSO) algorithm for finding cluster boundaries directly from the code vectors obtained from SOMs. The application of our method to unlabeled call data for a mobile phone operator demonstrates its feasibility. PSO algorithm utilizes U-matrix of SOMs to determine cluster boundaries; the results of this novel automatic method correspond well to boundary detection through visual inspection of code vectors and k-means algorithm.
Abstract: Particulate reinforced metal matrix composites
(MMCs) are potential materials for various applications due to their
advantageous of physical and mechanical properties. This paper
presents a study on the performance of stir cast Al2O3 SiC reinforced
metal matrix composite materials. The results indicate that the
composite materials exhibit improved physical and mechanical
properties, such as, low coefficient of thermal expansion, high
ultimate tensile strength, high impact strength, and hardness. It has
been found that with the increase of weight percentage of
reinforcement particles in the aluminium metal matrix, the new
material exhibits lower wear rate against abrasive wearing. Being
extremely lighter than the conventional gray cast iron material, the
Al-Al2O3 and Al-SiC composites could be potential green materials
for applications in the automobile industry, for instance, in making
car disc brake rotors.
Abstract: This paper presents an efficient algorithm for
optimization of radial distribution systems by a network
reconfiguration to balance feeder loads and eliminate overload
conditions. The system load-balancing index is used to determine the
loading conditions of the system and maximum system loading
capacity. The index value has to be minimum in the optimal network
reconfiguration of load balancing. A method based on Tabu search
algorithm, The Tabu search algorithm is employed to search for the
optimal network reconfiguration. The basic idea behind the search is
a move from a current solution to its neighborhood by effectively
utilizing a memory to provide an efficient search for optimality. It
presents low computational effort and is able to find good quality
configurations. Simulation results for a radial 69-bus system with
distributed generations and capacitors placement. The study results
show that the optimal on/off patterns of the switches can be identified
to give the best network reconfiguration involving balancing of
feeder loads while respecting all the constraints.
Abstract: Ecological ponds can be a good teaching tool for
science teachers, but they must be built and maintained properly to
provide students with a safe and suitable learning environment.
Hence, many schools do not have the ability to build an ecological
pond. This study used virtual reality technology to develop a webbased
virtual ecological pond. Supported by situated learning theory
and the instructional design of “Aquatic Life" learning unit,
elementary school students can actively explore in the virtual
ecological pond to observe aquatic animals and plants and learn
about the concept of ecological conservation. A teaching experiment
was conducted to investigate the learning effectiveness and
practicability of this instructional design, and the results showed that
students improved a great deal in learning about aquatic life. They
found the virtual ecological pond interesting, easy to operate and
helpful to understanding the aquatic ecological system. Therefore, it
is useful in elementary science education.
Abstract: A data warehouse (DW) is a system which has value and role for decision-making by querying. Queries to DW are critical regarding to their complexity and length. They often access millions of tuples, and involve joins between relations and aggregations. Materialized views are able to provide the better performance for DW queries. However, these views have maintenance cost, so materialization of all views is not possible. An important challenge of DW environment is materialized view selection because we have to realize the trade-off between performance and view maintenance. Therefore, in this paper, we introduce a new approach aimed to solve this challenge based on Two-Phase Optimization (2PO), which is a combination of Simulated Annealing (SA) and Iterative Improvement (II), with the use of Multiple View Processing Plan (MVPP). Our experiments show that 2PO outperform the original algorithms in terms of query processing cost and view maintenance cost.
Abstract: In a pilot plant scale of a fluidized bed reactor, a
reduction reaction of sodium sulfate by natural gas has been
investigated. Natural gas is applied in this study as a reductant. Feed
density, feed mass flow rate, natural gas and air flow rate
(independent parameters)and temperature of bed and CO
concentration in inlet and outlet of reactor (dependent parameters)
were monitored and recorded at steady state. The residence time was
adjusted close to value of traditional reaction [1]. An artificial neural
network (ANN) was established to study dependency of yield and
carbon gradient on operating parameters. Resultant 97% accuracy of
applied ANN is a good prove that natural gas can be used as a
reducing agent. Predicted ANN model for relation between other
sources carbon gradient (accuracy 74%) indicates there is not a
meaningful relation between other sources carbon variation and
reduction process which means carbon in granule does not have
significant effect on the reaction yield.
Abstract: A rare phenomenon of SDS-induced activation of a latent protease activity associated with the purified silkworm excretory red fluorescent protein (SE-RFP) was noticed. SE-RFP aliquots incubated with SDS for different time intervals indicated that the protein undergoes an obligatory breakdown into a number of subunits which exhibit autoproteolytic (acting upon themselves) and/or heteroproteolytic (acting on other proteins) activities. A strong serine protease activity of SE-RFP subunits on Bombyx mori nucleopolyhedrovirus (BmNPV) polyhedral protein was detected by zymography technique. A complete inhibition of BmNPV infection to silkworms was observed by the oral administration assay of the SE-RFP. Here, it is proposed that the SE-RFP prevents the initial infection of BmNPV to silkworms by obliterating the polyhedral protein. This is the first report on a silkworm red fluorescent protein that exhibits a protease activity on exposure to SDS. The present studies would help in understanding the antiviral mechanism of silkworm red fluorescent proteins.
Abstract: Developments in communication technologies
especially in wireless have enabled the progress of low-cost and lowpower
wireless sensor networks (WSNs). The features of such WSN
are holding minimal energy, weak computational capabilities,
wireless communication and an open-medium nature where sensors
are deployed. WSN is underpinned by application driven such as
military applications, the health sector, etc. Due to the intrinsic nature
of the network and application scenario, WSNs are vulnerable to
many attacks externally and internally. In this paper we have focused
on the types of internal attacks of WSNs based on OSI model and
discussed some security requirements, characterizers and challenges
of WSNs, by which to contribute to the WSN-s security research.
Abstract: This paper explores transformation of higher
education system in Kazakhstan since 1991. The research unravels
successful experience in the field and challenges. It covers issues of institutional change, faculty, research, university, funding, standards
and leadership. The paper offers recommendations in improving state of art in higher educational institutions of Kazakhstan based on
international approaches and local realities.
Abstract: Game theory could be used to analyze the conflicted
issues in the field of information hiding. In this paper, 2-phase game
can be used to build the embedder-attacker system to analyze the
limits of hiding capacity of embedding algorithms: the embedder
minimizes the expected damage and the attacker maximizes it. In the
system, the embedder first consumes its resource to build embedded
units (EU) and insert the secret information into EU. Then the attacker
distributes its resource evenly to the attacked EU. The expected
equilibrium damage, which is maximum damage in value from the
point of view of the attacker and minimum from the embedder against
the attacker, is evaluated by the case when the attacker attacks a
subset from all the EU. Furthermore, the optimal equilibrium capacity
of hiding information is calculated through the optimal number of EU
with the embedded secret information. Finally, illustrative examples
of the optimal equilibrium capacity are presented.
Abstract: This paper describes the pipeline architecture of
high-speed modified Booth multipliers. The proposed multiplier
circuits are based on the modified Booth algorithm and the pipeline
technique which are the most widely used to accelerate the
multiplication speed. In order to implement the optimally pipelined
multipliers, many kinds of experiments have been conducted. The
speed of the multipliers is greatly improved by properly deciding the
number of pipeline stages and the positions for the pipeline registers to
be inserted. We described the proposed modified Booth multiplier
circuits in Verilog HDL and synthesized the gate-level circuits using
0.13um standard cell library. The resultant multiplier circuits show
better performance than others. Since the proposed multipliers operate
at GHz ranges, they can be used in the systems requiring very high
performance.
Abstract: Tourism researchers have recently focused on repeat visitation as a part of destination loyalty. Different models have also considered satisfaction as the main determinant of revisit intention, while findings in many studies show it as a continuous issue. This conceptual paper attempts at evaluating recent empirical studies on satisfaction and revisit intention. Based on limitations and gaps in recent studies, the current paper suggests a new model that would be more comprehensive than those in previous studies. The new model offers new relationships between antecedents (destination image, perceived value, specific novelty seeking, and distance to destination) and both of satisfaction and revisit intention. Revisit intention in turn is suggested to be measured in a temporal approach.
Abstract: A new estimator for evolutionary spectrum (ES) based
on short time Fourier transform (STFT) and modified group delay
function (MGDF) by signal decomposition (SD) is proposed. The
STFT due to its built-in averaging, suppresses the cross terms and the
MGDF preserves the frequency resolution of the rectangular window
with the reduction in the Gibbs ripple. The present work overcomes
the magnitude distortion observed in multi-component non-stationary
signals with STFT and MGDF estimation of ES using SD. The SD is
achieved either through discrete cosine transform based harmonic
wavelet transform (DCTHWT) or perfect reconstruction filter banks
(PRFB). The MGDF also improves the signal to noise ratio by
removing associated noise. The performance of the present method is
illustrated for cross chirp and frequency shift keying (FSK) signals,
which indicates that its performance is better than STFT-MGDF
(STFT-GD) alone. Further its noise immunity is better than STFT.
The SD based methods, however cannot bring out the frequency
transition path from band to band clearly, as there will be gap in the
contour plot at the transition. The PRFB based STFT-SD shows good
performance than DCTHWT decomposition method for STFT-GD.
Abstract: This paper presents the results of corrosion fatigue
crack growth behaviour of a Ni-Cr-Mn steel commonly used in
marine applications. The effect of mechanical variables such as
frequency and load ratio on fatigue crack growth rate at various
stages has been studied using compact tension (C(T)) specimens
along the rolling direction of steel plate under 3.5% saturated NaCl
aqueous environment. The significance of crack closure on corrosion
fatigue, and the validity of Elber-s empirical linear crack closure
model with the ASTM compliance offset method have been
examined.
Fatigue crack growth rate is higher and threshold stress intensities
are lower in aqueous environment compared to the lab air conditions.
It is also observed that the crack growth rate increases at lower
frequencies. The higher stress ratio promotes the crack growth. The
effect of oxidization and corrosion pit formation is very less as the
stress ratio is increased. It is observed that as stress ratios are
increased, the Elber-s crack closure model agrees well with the crack
closure estimated by the ASTM compliance offset method for tests
conducted at 5Hz frequency compared to tests conducted at 1Hz in
corrosive environment.
Abstract: The optimization and control problem for 4D trajectories
is a subject rarely addressed in literature. In the 4D navigation
problem we define waypoints, for each mission, where the arrival
time is specified in each of them. One way to design trajectories for
achieving this kind of mission is to use the trajectory optimization
concepts. To solve a trajectory optimization problem we can use
the indirect or direct methods. The indirect methods are based on
maximum principle of Pontryagin, on the other hand, in the direct
methods it is necessary to transform into a nonlinear programming
problem. We propose an approach based on direct methods with a
pseudospectral integration scheme built on Chebyshev polynomials.
Abstract: Matching algorithms have significant importance in
speaker recognition. Feature vectors of the unknown utterance are
compared to feature vectors of the modeled speakers as a last step in
speaker recognition. A similarity score is found for every model in
the speaker database. Depending on the type of speaker recognition,
these scores are used to determine the author of unknown speech
samples. For speaker verification, similarity score is tested against a
predefined threshold and either acceptance or rejection result is
obtained. In the case of speaker identification, the result depends on
whether the identification is open set or closed set. In closed set
identification, the model that yields the best similarity score is
accepted. In open set identification, the best score is tested against a
threshold, so there is one more possible output satisfying the
condition that the speaker is not one of the registered speakers in
existing database. This paper focuses on closed set speaker
identification using a modified version of a well known matching
algorithm. The results of new matching algorithm indicated better
performance on YOHO international speaker recognition database.