Abstract: This paper deals with the simulation of a Boost Power Factor Correction (PFC) Converter with Electro Magnetic Interference (EMI) Filter. The diode rectifier with output capacitor gives poor power factor. The Boost Converter of PFC Circuit is analyzed and then simulated with diode rectifier. The Boost PFC Converter with EMI Filter is simulated for resistive load. The power factor is improved using the proposed converter.
Abstract: The present contribution deals with the
thermophoretic deposition of nanoparticles over a rapidly rotating
permeable disk in the presence of partial slip, magnetic field, thermal
radiation, thermal-diffusion, and diffusion-thermo effects. The
governing nonlinear partial differential equations such as continuity,
momentum, energy and concentration are transformed into nonlinear
ordinary differential equations using similarity analysis, and the
solutions are obtained through the very efficient computer algebra
software MATLAB. Graphical results for non-dimensional
concentration and temperature profiles including thermophoretic
deposition velocity and Stanton number (thermophoretic deposition
flux) in tabular forms are presented for a range of values of the
parameters characterizing the flow field. It is observed that slip
mechanism, thermal-diffusion, diffusion-thermo, magnetic field and
radiation significantly control the thermophoretic particles deposition
rate. The obtained results may be useful to many industrial and
engineering applications.
Abstract: The aged are faced with increasing risk for falls. The
aged have the easily fragile bones than others. When falls have
occurred, it is important to detect this emergency state because such
events often lead to more serious illness or even death. A
implementation of PDA system, for detection of emergency situation,
was developed using 3-axis accelerometer in this paper as follows.
The signals were acquired from the 3-axis accelerometer, and then
transmitted to the PDA through Bluetooth module. This system can
classify the human activity, and also detect the emergency state like
falls. When the fall occurs, the system generates the alarm on the
PDA. If a subject does not respond to the alarm, the system determines
whether the current situation is an emergency state or not, and then
sends some information to the emergency center in the case of urgent
situation. Three different studies were conducted on 12 experimental
subjects, with results indicating a good accuracy. The first study was
performed to detect the posture change of human daily activity. The
second study was performed to detect the correct direction of fall. The
third study was conducted to check the classification of the daily
physical activity. Each test was lasted at least 1 min. in third study.
The output of acceleration signal was compared and evaluated by
changing a various posture after attaching a 3-axis accelerometer
module on the chest. The newly developed system has some important
features such as portability, convenience and low cost. One of the
main advantages of this system is that it is available at home
healthcare environment. Another important feature lies in low cost to
manufacture device. The implemented system can detect the fall
accurately, so will be widely used in emergency situation.
Abstract: Following harvest, fresh produce needs to be cooled
immediately in a room where the air temperature and the relative air
humidity are controlled to maintain the produce quality. In this paper,
an experimental study for forced air cooling of fresh produce
(cauliflower) is performed using a pilot developed within our
laboratory. Furthermore, a numerical simulation of spherical
produces, taking into account the aerodynamic aspect and also the
heat transfer in the produce and in the air, was carried out using a
finite element method. At the end of this communication,
experimental results are presented and compared with the simulation.
Abstract: This paper examines the depiction of Muslim militants in Thai newspapers in 2004. Stuart Hall-s “representation" and “public idioms" are used as theoretical frameworks. Critical Discourse Analysis is employed as a methodology to examine 240 news articles from two leading Thai language newspapers. The results show that the militants are usually labeled as “southern bandits." This suggests that they are just a culprit of the violence in the deep south of Thailand. They are usually described as people who cause turbulence. Consequently, the military have to get rid of them. However, other aspects of the groups such as their political agenda or the failures of the Thai state in dealing with the Malay Muslims were not mention in the news stories. In the time of violence, the researcher argues that this kind of newspaper coverage may help perpetuate the discourse of Malay Muslim, instead of providing fuller picture of the ongoing conflicts.
Abstract: This paper deals with rheological behavior of tomato
paste from the view point of time independent properties inclusive of
processing variables such as sample temperature which influence on
rheological properties as well as breaking temperature and
concentration which beside the rheological properties, influence on
the quality of final product. With this aim 10 tomato paste samples at
various concentrations (17-25%) and breaking temperatures (65-
85 C o ) have been produced. The experimental results showed tomato
paste behaves as a non-Newtonian semi-fluid which follows power
law model that consistency coefficient (K) is supposed function of
breaking temperature, concentration and sample temperature with
consideration to superimpose function.
Abstract: A New features are extracted and compared to
improve the prediction of protein-protein interactions. The basic idea
is to select and use the best set of features from the Tensor matrices
that are produced by the frequency vectors of the protein sequences.
Three set of features are compared, the first set is based on the
indices that are the most common in the interacting proteins, the
second set is based on the indices that tend to be common in the
interacting and non-interacting proteins, and the third set is
constructed by using random indices. Moreover, three encoding
strategies are compared; that are based on the amino asides polarity,
structure, and chemical properties. The experimental results indicate
that the highest accuracy can be obtained by using random indices
with chemical properties encoding strategy and support vector
machine.
Abstract: Information and communication technology (ICT) has
become, within a very short time, one of the basic building blocks of
modern society. Many countries now understanding the importance
of ICT and mastering the basic skills and concepts of it as part of the
core of education. Organizations, experts and practitioners in the
education sector increasingly recognizing the importance of ICT in
supporting educational improvement and reform. This paper
addresses the convergence of ICT and education. When two
technologies are converging to each other, together they will generate
some great opportunities and challenges. This paper focuses on these
issues. In introduction section, it explains the ICT, education, and
ICT-enhanced education. In next section it describes need of ICT in
education, relationship between ICT skills and education, and stages
of teaching learning process. The next two sections describe
opportunities and challenges in integrating ICT in education. Finally
the concluding section summaries the idea and its usefulness.
Abstract: Dense slurry flow through centrifugal pump casing
has been modeled using the Eulerian-Eulerian approach with
Eulerian multiphase model in FLUENT 6.1®. First order upwinding
is considered for the discretization of momentum, k and ε terms.
SIMPLE algorithm has been applied for dealing with pressurevelocity
coupling. A mixture property based k-ε turbulence model
has been used for modeling turbulence. Results are validated first
against mesh independence and experiments for a particular set of
operational and geometric conditions. Parametric analysis is then
performed to determine the effect on important physical quantities
viz. solid velocities, solid concentration and solid stresses near the
wall with various operational geometric conditions of the pump.
Abstract: A new approach for timestamp ordering problem in
serializable schedules is presented. Since the number of users using
databases is increasing rapidly, the accuracy and needing high
throughput are main topics in database area. Strict 2PL does not
allow all possible serializable schedules and so does not result high
throughput. The main advantages of the approach are the ability to
enforce the execution of transaction to be recoverable and the high
achievable performance of concurrent execution in central databases.
Comparing to Strict 2PL, the general structure of the algorithm is
simple, free deadlock, and allows executing all possible serializable
schedules which results high throughput. Various examples which
include different orders of database operations are discussed.
Abstract: The service sector continues to grow and the percentage
of GDP accounted for by service industries keeps increasing. The
growth and importance of service to an economy is not just a
phenomenon of advanced economies, service is now a majority of the
world gross domestic products. However, the performance evaluation
process of new service development problems generally involves
uncertain and imprecise data. This paper presents a 2-tuple fuzzy
linguistic computing approach to dealing with heterogeneous
information and information loss problems while the processes of
subjective evaluation integration. The proposed method based on group
decision-making scenario to assist business managers in measuring
performance of new service development manipulates the
heterogeneity integration processes and avoids the information loss
effectively.
Abstract: The original idea for a feature film may come from a
writer, director or a producer. Director is the person responsible for
the creative aspects, both interpretive and technical, of a motion
picture production in a film. Director may be shot discussing his
project with his or her cowriters, members of production staff, and
producer, and director may be shown selecting locales or
constructing sets. All these activities provide, of course, ways of
externalizing director-s ideas about the film. A director sometimes
pushes both the film image and techniques of narration to new artistic
limits, but main responsibility of director is take the spectator to an
original opinion in his philosophical approach. Director tries to find
an artistic angle in every scene and change screenplay into an
effective story and sets his film on a spiritual and philosophical base.
Abstract: European Union candidate status provides a
strong motivation for decision-making in the candidate
countries in shaping the regional development policy where
there is an envisioned transfer of power from center to the
periphery. The process of Europeanization anticipates the
candidate countries configure their regional institutional
templates in the context of the requirements of the European
Union policies and introduces new instruments of incentive
framework of enlargement to be employed in regional
development schemes. It is observed that the contribution of
the local actors to the decision making in the design of the
allocation architectures enhances the efficiency of the funds
and increases the positive effects of the projects funded under
the regional development objectives. This study aims at
exploring the performances of the three regional development
grant schemes in Turkey, established and allocated under the
pre-accession process with a special emphasis given to the
roles of the national and local actors in decision-making for
regional development. Efficiency analyses have been
conducted using the DEA methodology which has proved to
be a superior method in comparative efficiency and
benchmarking measurements. The findings of this study as
parallel to similar international studies, provides that the
participation of the local actors to the decision-making in
funding contributes both to the quality and the efficiency of
the projects funded under the EU schemes.
Abstract: This research contribution is drafted to present the
orbit design, orbit propagator and geomagnetic field estimator for the
nanosatellites specifically for the upcoming CUBESAT, ICUBE-1 of
the Institute of Space Technology (IST), Islamabad, Pakistan. The
ICUBE mission is designed for the low earth orbit at the approximate
height of 700KM. The presented research endeavor designs the
Keplarian elements for ICUBE-1 orbit while incorporating the
mission requirements and propagates the orbit using J2 perturbations,
The attitude determination system of the ICUBE-1 consists of
attitude determination sensors like magnetometer and sun sensor. The
Geomagnetic field estimator is developed according to the model of
International Geomagnetic Reference Field (IGRF) for comparing the
magnetic field measurements by the magnetometer for attitude
determination. The output of the propagator namely the Keplarians
position and velocity vectors and the magnetic field vectors are
compared and verified with the same scenario generated in the
Satellite Tool Kit (STK).
Abstract: Phishing, or stealing of sensitive information on the
web, has dealt a major blow to Internet Security in recent times. Most
of the existing anti-phishing solutions fail to handle the fuzziness
involved in phish detection, thus leading to a large number of false
positives. This fuzziness is attributed to the use of highly flexible and
at the same time, highly ambiguous HTML language. We introduce a
new perspective against phishing, that tries to systematically prove,
whether a given page is phished or not, using the corresponding
original page as the basis of the comparison. It analyzes the layout of
the pages under consideration to determine the percentage distortion
between them, indicative of any form of malicious alteration. The
system design represents an intelligent system, employing dynamic
assessment which accurately identifies brand new phishing attacks
and will prove effective in reducing the number of false positives.
This framework could potentially be used as a knowledge base, in
educating the internet users against phishing.
Abstract: This paper presents an effective framework for Chinesesyntactic parsing, which includes two parts. The first one is a parsing framework, which is based on an improved bottom-up chart parsingalgorithm, and integrates the idea of the beam search strategy of N bestalgorithm and heuristic function of A* algorithm for pruning, then get multiple parsing trees. The second is a novel evaluation model, which integrates contextual and partial lexical information into traditional PCFG model and defines a new score function. Using this model, the tree with the highest score is found out as the best parsing tree. Finally,the contrasting experiment results are given. Keywords?syntactic parsing, PCFG, pruning, evaluation model.
Abstract: Octree compression techniques have been used
for several years for compressing large three dimensional data
sets into homogeneous regions. This compression technique
is ideally suited to datasets which have similar values in
clusters. Oil engineers represent reservoirs as a three dimensional
grid where hydrocarbons occur naturally in clusters. This
research looks at the efficiency of storing these grids using
octree compression techniques where grid cells are broken
into active and inactive regions. Initial experiments yielded
high compression ratios as only active leaf nodes and their
ancestor, header nodes are stored as a bitstream to file on
disk. Savings in computational time and memory were possible
at decompression, as only active leaf nodes are sent to the
graphics card eliminating the need of reconstructing the original
matrix. This results in a more compact vertex table, which can
be loaded into the graphics card quicker and generating shorter
refresh delay times.
Abstract: An innovative tri-axes micro-power receiver is
proposed. The tri-axes micro-power receiver consists of two sets 3-D
micro-solenoids and one set planar micro-coils in which iron core is
embedded. The three sets of micro-coils are designed to be orthogonal
to each other. Therefore, no matter which direction the flux is present
along, the magnetic energy can be harvested and transformed into
electric power. Not only dead space of receiving power is mostly
reduced, but also transformation efficiency of electromagnetic energy
to electric power can be efficiently raised. By employing commercial
software, Ansoft Maxwell, the preliminary simulation results verify
that the proposed micro-power receiver can efficiently pick up the
energy transmitted by magnetic power source.
As to the fabrication process, the isotropic etching technique is
employed to micro-machine the inverse-trapezoid fillister so that the
copper wire can be successfully electroplated. The adhesion between
micro-coils and fillister is much enhanced.
Abstract: Medical negligence disputes in Malaysia are mainly resolved through litigation by using the tort system. The tort system, being adversarial in nature has subjected parties to litigation hazards such as delay, excessive costs and uncertainty of outcome. The dissatisfaction of the tort system in compensating medically injured victims has created various alternatives to litigation. Amongst them is the implementation of a no-fault compensation system which would allow compensation to be given without the need of proving fault on the medical personnel. Instead, the community now bears the burden of compensating and at the end, promotes collective responsibility. For Malaysia, introducing a no-fault system would provide a tempting solution and may ultimately, achieve justice for the medical injured victims. Nevertheless, such drastic change requires a great deal of consideration to determine the suitability of the system and whether or not it will eventually cater for the needs of the Malaysian population
Abstract: This paper focuses on wormhole attacks detection in wireless sensor networks. The wormhole attack is particularly challenging to deal with since the adversary does not need to compromise any nodes and can use laptops or other wireless devices to send the packets on a low latency channel. This paper introduces an easy and effective method to detect and locate the wormholes: Since beacon nodes are assumed to know their coordinates, the straight line distance between each pair of them can be calculated and then compared with the corresponding hop distance, which in this paper equals hop counts × node-s transmission range R. Dramatic difference may emerge because of an existing wormhole. Our detection mechanism is based on this. The approximate location of the wormhole can also be derived in further steps based on this information. To the best of our knowledge, our method is much easier than other wormhole detecting schemes which also use beacon nodes, and to those have special requirements on each nodes (e.g., GPS receivers or tightly synchronized clocks or directional antennas), ours is more economical. Simulation results show that the algorithm is successful in detecting and locating wormholes when the density of beacon nodes reaches 0.008 per m2.