Statistical Evaluation of Nonlinear Distortion using the Multi-Canonical Monte Carlo Method and the Split Step Fourier Method

In high powered dense wavelength division multiplexed (WDM) systems with low chromatic dispersion, four-wave mixing (FWM) can prove to be a major source of noise. The MultiCanonical Monte Carlo Method (MCMC) and the Split Step Fourier Method (SSFM) are combined to accurately evaluate the probability density function of the decision variable of a receiver, limited by FWM. The combination of the two methods leads to more accurate results, and offers the possibility of adding other optical noises such as the Amplified Spontaneous Emission (ASE) noise.

Building Virtual Reality Environments for Distance Education on the Web: A Case Study in Medical Education

The paper presents an investigation into the role of virtual reality and web technologies in the field of distance education. Within this frame, special emphasis is given on the building of web-based virtual learning environments so as to successfully fulfill their educational objectives. In particular, basic pedagogical methods are studied, focusing mainly on the efficient preparation, approach and presentation of learning content, and specific designing rules are presented considering the hypermedia, virtual and educational nature of this kind of applications. The paper also aims to highlight the educational benefits arising from the use of virtual reality technology in medicine and study the emerging area of web-based medical simulations. Finally, an innovative virtual reality environment for distance education in medicine is demonstrated. The proposed environment reproduces conditions of the real learning process and enhances learning through a real-time interactive simulator.

Non-Isothermal Kinetics of Crystallization and Phase Transformation of SiO2-Al2O3-P2O5-CaO-CaF Glass

The crystallization kinetics and phase transformation of SiO2.Al2O3.0,56P2O5.1,8CaO.0,56CaF2 glass have been investigated using differential thermal analysis (DTA), x-ray diffraction (XRD), and scanning electron microscopy (SEM). Glass samples were obtained by melting the glass mixture at 14500С/120 min. in platinum crucibles. The mixture were prepared from chemically pure reagents: SiO2, Al(OH)3, H3PO4, CaCO3 and CaF2. The non-isothermal kinetics of crystallization was studied by applying the DTA measurements carried out at various heating rates. The activation energies of crystallization and viscous flow were measured as 348,4 kJ.mol–1 and 479,7 kJ.mol–1 respectively. Value of Avrami parameter n ≈ 3 correspond to a three dimensional of crystal growth mechanism. The major crystalline phase determined by XRD analysis was fluorapatite (Ca(PO4)3F) and as the minor phases – fluormargarite (CaAl2(Al2SiO2)10F2) and vitlokite (Ca9P6O24). The resulting glass-ceramic has a homogeneous microstructure, composed of prismatic crystals, evenly distributed in glass phase.

Simulation of an Auto-Tuning Bicycle Suspension Fork with Quick Releasing Valves

Bicycle configuration is not as large as those of motorcycles or automobiles, while it indeed composes a complicated dynamic system. People-s requirements on comfortability, controllability and safety grow higher as the research and development technologies improve. The shock absorber affects the vehicle suspension performances enormously. The absorber takes the vibration energy and releases it at a suitable time, keeping the wheel under a proper contact condition with road surface, maintaining the vehicle chassis stability. Suspension design for mountain bicycles is more difficult than that of city bikes since it encounters dynamic variations on road and loading conditions. Riders need a stiff damper as they exert to tread on the pedals when climbing, while a soft damper when they descend downhill. Various switchable shock absorbers are proposed in markets, however riders have to manually switch them among soft, hard and lock positions. This study proposes a novel design of the bicycle shock absorber, which provides automatic smooth tuning of the damping coefficient, from a predetermined lower bound to theoretically unlimited. An automatic quick releasing valve is involved in this design so that it can release the peak pressure when the suspension fork runs into a square-wave type obstacle and prevent the chassis from damage, avoiding the rider skeleton from injury. This design achieves the automatic tuning process by innovative plunger valve and fluidic passage arrangements without any electronic devices. Theoretical modelling of the damper and spring are established in this study. Design parameters of the valves and fluidic passages are determined. Relations between design parameters and shock absorber performances are discussed in this paper. The analytical results give directions to the shock absorber manufacture.

The Journey of a Malicious HTTP Request

SQL injection on web applications is a very popular kind of attack. There are mechanisms such as intrusion detection systems in order to detect this attack. These strategies often rely on techniques implemented at high layers of the application but do not consider the low level of system calls. The problem of only considering the high level perspective is that an attacker can circumvent the detection tools using certain techniques such as URL encoding. One technique currently used for detecting low-level attacks on privileged processes is the tracing of system calls. System calls act as a single gate to the Operating System (OS) kernel; they allow catching the critical data at an appropriate level of detail. Our basic assumption is that any type of application, be it a system service, utility program or Web application, “speaks” the language of system calls when having a conversation with the OS kernel. At this level we can see the actual attack while it is happening. We conduct an experiment in order to demonstrate the suitability of system call analysis for detecting SQL injection. We are able to detect the attack. Therefore we conclude that system calls are not only powerful in detecting low-level attacks but that they also enable us to detect highlevel attacks such as SQL injection.

Speaker Identification Using Admissible Wavelet Packet Based Decomposition

Mel Frequency Cepstral Coefficient (MFCC) features are widely used as acoustic features for speech recognition as well as speaker recognition. In MFCC feature representation, the Mel frequency scale is used to get a high resolution in low frequency region, and a low resolution in high frequency region. This kind of processing is good for obtaining stable phonetic information, but not suitable for speaker features that are located in high frequency regions. The speaker individual information, which is non-uniformly distributed in the high frequencies, is equally important for speaker recognition. Based on this fact we proposed an admissible wavelet packet based filter structure for speaker identification. Multiresolution capabilities of wavelet packet transform are used to derive the new features. The proposed scheme differs from previous wavelet based works, mainly in designing the filter structure. Unlike others, the proposed filter structure does not follow Mel scale. The closed-set speaker identification experiments performed on the TIMIT database shows improved identification performance compared to other commonly used Mel scale based filter structures using wavelets.

Reciprocating Equipment Piston Rod Dynamic Elastic-Plastic Deformation Analysis

Analysis of reciprocating equipment piston rod leads to nonlinear elastic-plastic deformation analysis of rod with initial imperfection under axial dynamic load. In this paper a new and effective model and analytical formulations are presented to evaluate dynamic deformation and elastic-plastic stresses of reciprocating machine piston rod. This new method has capability to account for geometric nonlinearity, elastic-plastic deformation and dynamic effects. Proposed method can be used for evaluation of piston rod performance for various reciprocating machines under different operation situations. Rod load curves and maximum allowable rod load are calculated with presented method for a refinery type reciprocating compressor. Useful recommendations and guidelines for rod load, rod load reversal and rod drop monitoring are also addressed.

Design and Fabrication of a Column-Climber Robot (Koala Robot)

This paper proposes a robot able to climb Columns. This robot is not dependent on the diameter and material of the columns. Some climbing robots have been designed up to now but Koala robot was designed and fabricated for climbing columns exclusively. Simple kinematics of climbing in the nature inspired us to design this robot. We used two linear mechanisms to grip the column. The gripper consists of a DC motor and a power screw mechanism with a linear bushing as a guide. This mechanism provides enough force to grip the column. In addition we needed an actuator for climbing the column; hence, two pneumatic jacks were used. All the mechanical parts were designed according to the exerted forces and operational condition. The prototype can be simply installed and controlled on the column by an inexperienced operator. This robot is intended for inspection and surveillance of pipes in oil industries and power poles in electric industries.

Determination of Stress Concentration Factors of a Steam Turbine Rotor by FEA

Stress Concentration Factors are significant in machine design as it gives rise to localized stress when any change in the design of surface or abrupt change in the cross section occurs. Almost all machine components and structural members contain some form of geometrical or microstructural discontinuities. These discontinuities are very dangerous and lead to failure. So, it is very much essential to analyze the stress concentration factors for critical applications like Turbine Rotors. In this paper Finite Element Analysis (FEA) with extremely fine mesh in the vicinity of the blades of Steam Turbine Rotor is applied to determine stress concentration factors. A model of Steam Turbine Rotor is shown in Fig. 1.

2 – Block 3 - Point Modified Numerov Block Methods for Solving Ordinary Differential Equations

In this paper, linear multistep technique using power series as the basis function is used to develop the block methods which are suitable for generating direct solution of the special second order ordinary differential equations of the form y′′ = f(x,y), a < = x < = b with associated initial or boundary conditions. The continuaous hybrid formulations enable us to differentiate and evaluate at some grids and off – grid points to obtain two different three discrete schemes, each of order (4,4,4)T, which were used in block form for parallel or sequential solutions of the problems. The computational burden and computer time wastage involved in the usual reduction of second order problem into system of first order equations are avoided by this approach. Furthermore, a stability analysis and efficiency of the block method are tested on linear and non-linear ordinary differential equations whose solutions are oscillatory or nearly periodic in nature, and the results obtained compared favourably with the exact solution.

An SVM based Classification Method for Cancer Data using Minimum Microarray Gene Expressions

This paper gives a novel method for improving classification performance for cancer classification with very few microarray Gene expression data. The method employs classification with individual gene ranking and gene subset ranking. For selection and classification, the proposed method uses the same classifier. The method is applied to three publicly available cancer gene expression datasets from Lymphoma, Liver and Leukaemia datasets. Three different classifiers namely Support vector machines-one against all (SVM-OAA), K nearest neighbour (KNN) and Linear Discriminant analysis (LDA) were tested and the results indicate the improvement in performance of SVM-OAA classifier with satisfactory results on all the three datasets when compared with the other two classifiers.

A Novel Approach towards Segmentation of Breast Tumors from Screening Mammograms for Efficient Decision Support System

This paper presents a novel approach to finding a priori interesting regions in mammograms. In order to delineate those regions of interest (ROI-s) in mammograms, which appear to be prominent, a topographic representation called the iso-level contour map consisting of iso-level contours at multiple intensity levels and region segmentation based-thresholding have been proposed. The simulation results indicate that the computed boundary gives the detection rate of 99.5% accuracy.

A Survey: Bandwidth Management in an IP Based Network

this paper presented a survey analysis subjected on network bandwidth management from published papers referred in IEEE Explorer database in three years from 2009 to 2011. Network Bandwidth Management is discussed in today-s issues for computer engineering applications and systems. Detailed comparison is presented between published papers to look further in the IP based network critical research area for network bandwidth management. Important information such as the network focus area, a few modeling in the IP Based Network and filtering or scheduling used in the network applications layer is presented. Many researches on bandwidth management have been done in the broad network area but fewer are done in IP Based network specifically at the applications network layer. A few researches has contributed new scheme or enhanced modeling but still the issue of bandwidth management still arise at the applications network layer. This survey is taken as a basic research towards implementations of network bandwidth management technique, new framework model and scheduling scheme or algorithm in an IP Based network which will focus in a control bandwidth mechanism in prioritizing the network traffic the applications layer.

Intrusion Detection System Based On The Integrity of TCP Packet

A common way to elude the signature-based Network Intrusion Detection System is based upon changing a recognizable attack to an unrecognizable one via the IDS. For example, in order to evade sign accommodation with intrusion detection system markers, a hacker spilt the payload packet into many small pieces or hides them within messages. In this paper we try to model the main fragmentation attack and create a new module in the intrusion detection architecture system which recognizes the main fragmentation attacks through verification of integrity checking of TCP packet in order to prevent elusion of the system and also to announce the necessary alert to the system administrator.

Translator Design to Model Cpp Files

The most reliable and accurate description of the actual behavior of a software system is its source code. However, not all questions about the system can be answered directly by resorting to this repository of information. What the reverse engineering methodology aims at is the extraction of abstract, goal-oriented “views" of the system, able to summarize relevant properties of the computation performed by the program. While concentrating on reverse engineering we had modeled the C++ files by designing the translator.

Experimental Studies of Position Control of Linkage based Robotic Finger

The experimental study of position control of a light weight and small size robotic finger during non-contact motion is presented in this paper. The finger possesses fingertip pinching and self adaptive grasping capabilities, and is made of a seven bar linkage mechanism with a slider in the middle phalanx. The control system is tested under the Proportional Integral Derivative (PID) control algorithm and Recursive Least Square (RLS) based Feedback Error Learning (FEL) control scheme to overcome the uncertainties present in the plant. The experiments conducted in Matlab Simulink and xPC Target environments show that the overall control strategy is efficient in controlling the finger movement.

Optimization of Transmitter Aperture by Genetic Algorithm in Optical Satellite

To establish optical communication between any two satellites, the transmitter satellite must track the beacon of the receiver satellite and point the information optical beam in its direction. Optical tracking and pointing systems for free space suffer during tracking from high-amplitude vibration because of background radiation from interstellar objects such as the Sun, Moon, Earth, and stars in the tracking field of view or the mechanical impact from satellite internal and external sources. The vibrations of beam pointing increase the bit error rate and jam communication between the two satellites. One way to overcome this problem is the use of very small transmitter beam divergence angles of too narrow divergence angle is that the transmitter beam may sometimes miss the receiver satellite, due to pointing vibrations. In this paper we propose the use of genetic algorithm to optimize the BER as function of transmitter optics aperture.

Integration and Selectivity in Open Innovation:An Empirical Analysis in SMEs

The company-s ability to draw on a range of external sources to meet their needs for innovation, has been termed 'open innovation' (OI). Very few empirical analyses have been conducted on Small and Medium Enterprises (SMEs) to the extent that they describe and understand the characteristics and implications of this new paradigm. The study's objective is to identify and characterize different modes of OI, (considering innovation process phases and the variety and breadth of the collaboration), determinants, barriers and motivations in SMEs. Therefore a survey was carried out among Italian manufacturing firms and a database of 105 companies was obtained. With regard to data elaboration, a factorial and cluster analysis has been conducted and three different OI modes have emerged: selective low open, unselective open upstream, and mid- partners integrated open. The different behaviours of the three clusters in terms of determinants factors, performance, firm-s technology intensity, barriers and motivations have been analyzed and discussed.

Order Penetration Point Location using Fuzzy Quadratic Programming

This paper addresses one of the most important issues have been considered in hybrid MTS/MTO production environments. To cope with the problem, a mathematical programming model is applied from a tactical point of view. The model is converted to a fuzzy goal programming model, because a degree of uncertainty is involved in hybrid MTS/MTO context. Finally, application of the proposed model in an industrial center is reported and the results prove the validity of the model.

Speech Coding and Recognition

This paper investigates the performance of a speech recognizer in an interactive voice response system for various coded speech signals, coded by using a vector quantization technique namely Multi Switched Split Vector Quantization Technique. The process of recognizing the coded output can be used in Voice banking application. The recognition technique used for the recognition of the coded speech signals is the Hidden Markov Model technique. The spectral distortion performance, computational complexity, and memory requirements of Multi Switched Split Vector Quantization Technique and the performance of the speech recognizer at various bit rates have been computed. From results it is found that the speech recognizer is showing better performance at 24 bits/frame and it is found that the percentage of recognition is being varied from 100% to 93.33% for various bit rates.