Abstract: Mining tailings represent a generating source of rich heavy metal material with a potential danger the public health and the environment, since these metals, under certain conditions, can leach and contaminate aqueous systems that serve like supplying potable water sources. The strategy for this work is based on the observation, experimentation and the simulation that can be obtained by binding real answers of the hydrodynamic behavior of metals leached from mining tailings, and the applied mathematics that provides the logical structure to decipher the individual effects of the general physicochemical phenomenon. The case of study presented herein focuses on mining tailings deposits located in Monte San Nicolas, Guanajuato, Mexico, an abandoned mine. This was considered the contamination source that under certain physicochemical conditions can favor the metal leaching, and its transport towards aqueous systems. In addition, the cartography, meteorology, geology and the hydrodynamics and hydrological characteristics of the place, will be helpful in determining the way and the time in which these systems can interact. Preliminary results demonstrated that arsenic presents a great mobility, since this one was identified in several superficial aqueous systems of the micro watershed, as well as in sediments in concentrations that exceed the established maximum limits in the official norms. Also variations in pH and potential oxide-reduction were registered, conditions that favor the presence of different species from this element its solubility and therefore its mobility.
Abstract: In this paper, we are presenting a new type of pointing interface for computers which provides mouse functionalities with near surface haptic feedback. Further, it can be configured as a haptic display where users may feel the basic geometrical shapes in the GUI by moving the finger on top of the device surface. These functionalities are achieved by tracking three dimensional positions of the neodymium magnet using Hall Effect sensors grid and generating like polarity haptic feedback using an electromagnet array. This interface brings the haptic sensations to the 3D space where previously it is felt only on top of the buttons of the haptic mouse implementations.
Abstract: This paper proposes a modeling method of the laws controlling manufacturing systems with temporal and non temporal constraints. A methodology of robust control construction generating the margins of passive and active robustness is being elaborated. Indeed, two paramount models are presented in this paper. The first utilizes the P-time Petri Nets which is used to manage the flow type disturbances. The second, the quality model, exploits the Intervals Constrained Petri Nets (ICPN) tool which allows the system to preserve its quality specificities. The redundancy of the robustness of the elementary parameters between passive and active is also used. The final model built allows the correlation of temporal and non temporal criteria by putting two paramount models in interaction. To do so, a set of definitions and theorems are employed and affirmed by applicator examples.
Abstract: Multi-level voltage source inverters offer several
advantages such as; derivation of a refined output voltage with
reduced total harmonic distortion (THD), reduction of voltage ratings
of the power semiconductor switching devices and also the reduced
electro-magnetic-interference problems etc. In this paper, new
carrier-overlapped phase-disposition or sub-harmonic sinusoidal
pulse width modulation (CO-PD-SPWM) and also the carrieroverlapped
phase-disposition space vector modulation (CO-PDSVPWM)
schemes for a six-level diode-clamped inverter topology
are proposed. The principle of the proposed PWM schemes is similar
to the conventional PD-PWM with a little deviation from it in the
sense that the triangular carriers are all overlapped. The overlapping
of the triangular carriers on one hand results in an increased number
of switchings, on the other hand this facilitates an improved spectral
performance of the output voltage. It is demonstrated through
simulation studies that the six-level diode-clamped inverter with the
use of CO-PD-SPWM and CO-PD-SVPWM proposed in this paper is
capable of generating multiple levels in its output voltage. The
advantages of the proposed PWM schemes can be derived to benefit,
especially at lower modulation indices of the inverter and hence this
aspect of the proposed PWM schemes can be well exploited in high
power applications requiring low speeds of operation of the drive.
Abstract: Since communications between tag and reader in RFID
system are by radio, anyone can access the tag and obtain its any
information. And a tag always replies with the same ID so that it is
hard to distinguish between a real and a fake tag. Thus, there are many
security problems in today-s RFID System. Firstly, unauthorized
reader can easily read the ID information of any Tag. Secondly,
Adversary can easily cheat the legitimate reader using the collected
Tag ID information, such as the any legitimate Tag. These security
problems can be typically solved by encryption of messages
transmitted between Tag and Reader and by authentication for Tag.
In this paper, to solve these security problems on RFID system, we
propose the Tag Authentication Scheme based on self shrinking
generator (SSG). SSG Algorithm using in our scheme is proposed by
W.Meier and O.Staffelbach in EUROCRYPT-94. This Algorithm is
organized that only one LFSR and selection logic in order to generate
random stream. Thus it is optimized to implement the hardware logic
on devices with extremely limited resource, and the output generating
from SSG at each time do role as random stream so that it is allow our
to design the light-weight authentication scheme with security against
some network attacks. Therefore, we propose the novel tag
authentication scheme which use SSG to encrypt the Tag-ID
transmitted from tag to reader and achieve authentication of tag.
Abstract: Wireless Sensor networks have a wide spectrum of civil and military applications that call for secure communication such as the terrorist tracking, target surveillance in hostile environments. For the secure communication in these application areas, we propose a method for generating a hierarchical key structure for the efficient group key management. In this paper, we apply A* algorithm in generating a hierarchical key structure by considering the history data of the ratio of addition and eviction of sensor nodes in a location where sensor nodes are deployed. Thus generated key tree structure provides an efficient way of managing the group key in terms of energy consumption when addition and eviction event occurs. A* algorithm tries to minimize the number of messages needed for group key management by the history data. The experimentation with the tree shows efficiency of the proposed method.
Abstract: Cryptography, Image watermarking and E-banking are
filled with apparent oxymora and paradoxes. Random sequences are
used as keys to encrypt information to be used as watermark during
embedding the watermark and also to extract the watermark during
detection. Also, the keys are very much utilized for 24x7x365
banking operations. Therefore a deterministic random sequence is
very much useful for online applications. In order to obtain the same
random sequence, we need to supply the same seed to the generator.
Many researchers have used Deterministic Random Number
Generators (DRNGs) for cryptographic applications and Pseudo
Noise Random sequences (PNs) for watermarking. Even though,
there are some weaknesses in PN due to attacks, the research
community used it mostly in digital watermarking. On the other hand,
DRNGs have not been widely used in online watermarking due to its
computational complexity and non-robustness. Therefore, we have
invented a new design of generating DRNG using Pi-series to make it
useful for online Cryptographic, Digital watermarking and Banking
applications.
Abstract: An application framework provides a reusable design
and implementation for a family of software systems. Frameworks
are introduced to reduce the cost of a product line (i.e., a family of
products that shares the common features). Software testing is a timeconsuming
and costly ongoing activity during the application
software development process. Generating reusable test cases for the
framework applications during the framework development stage,
and providing and using the test cases to test part of the framework
application whenever the framework is used reduces the application
development time and cost considerably. This paper introduces the
Framework Interface State Transition Tester (FIST2), a tool for
automated unit testing of Java framework applications. During the
framework development stage, given the formal descriptions of the
framework hooks, the specifications of the methods of the
framework-s extensible classes, and the illegal behavior description
of the Framework Interface Classes (FICs), FIST2 generates unitlevel
test cases for the classes. At the framework application
development stage, given the customized method specifications of
the implemented FICs, FIST2 automates the use, execution, and
evaluation of the already generated test cases to test the implemented
FICs. The paper illustrates the use of the FIST2 tool for testing
several applications that use the SalesPoint framework.
Abstract: Environmental awareness and the recent
environmental policies have forced many electric utilities to
restructure their operational practices to account for their emission
impacts. One way to accomplish this is by reformulating the
traditional economic dispatch problem such that emission effects are
included in the mathematical model. This paper presents a Particle
Swarm Optimization (PSO) algorithm to solve the Economic-
Emission Dispatch problem (EED) which gained recent attention due
to the deregulation of the power industry and strict environmental
regulations. The problem is formulated as a multi-objective one with
two competing functions, namely economic cost and emission
functions, subject to different constraints. The inequality constraints
considered are the generating unit capacity limits while the equality
constraint is generation-demand balance. A novel equality constraint
handling mechanism is proposed in this paper. PSO algorithm is
tested on a 30-bus standard test system. Results obtained show that
PSO algorithm has a great potential in handling multi-objective
optimization problems and is capable of capturing Pareto optimal
solution set under different loading conditions.
Abstract: BioEnergy is an archetypal appropriate technology
and alternate source of energy in rural areas of China, and can meet
the basic need for cooking fuel in rural areas. The paper introduces
with an alternate mean of research that can accelerate the biogas
energy production. Tithonia diversifolia or the Tree marigold can be
hailed as mesophillic anaerobic digestion to increase the production
of more Bioenergy. Tithonia diversifolia is very native to Mexico and
Central America, which can be served as ornamental plants- green
manure and can prevent soil erosion. Tithonia diversifolia is widely
grown and known to Asia, Africa, America and Australia as well.
Nowadays, Considering China’s geographical condition it is found
that Tithonia diversifolia is widely growing plant in the many tropical
and subtropical regions of southern Yunnan- which can have great
usage in accelerating and increasing the Bioenergy production
technology. The paper discussed aiming at proving possibility that
Tithonia diversifolia can be applied in biogas fermentation and its
biogas production potential, the research carried experiment on
Tithonia diversifolia biogas fermentation under the mesophilic
condition (35 Celsius Degree). The result revealed that Tithonia
diversifolia can be used as biogas fermentative material, and 6%
concentration can get the best biogas production, with the TS biogas
production rate 656mL/g and VS biogas production rate 801mL/g. It
is well addressed that Tithonia diversifolia grows wildly in 53
Counties and 9 cities of Yunnan Province, which mainly grows in
form of the road side plants, the edge of the field, countryside, forest
edge, open space; of which demersum-natures can form dense
monospecific beds -causing serious harm to agricultural production
landforms threatening the ecological system as a potentially harmful
exotic plant. There are also found the three types of invasive daisy
alien plants -Eupatorium adenophorum, Eupatorium Odorata and
Tithonia diversifolia in Yunnan Province of China-among them the
Tithonia diversifolia is responsible for causing serious harm to
agricultural production. In this paper we have designed the
experimental explanation of Biogas energy production that requires
anaerobic environment and some microbes; Tithonia diversifolia
plant has been taken into consideration while carrying experiments
and with successful resulting of generating more BioEnergy
emphasizing on the practical applications of Tithonia diversifolia.
This paper aims at- to find a new mechanism to provide a more
scientific basis for the development of this plant herbicides in Biogas
energy and to improve the utilization throughout the world as well.
Abstract: Batteries and fuel cells contain a great potential to back up severe photovoltaic power fluctuations under inclement weather conditions. In this paper comparison between batteries and fuel cells is carried out in detail only for their PV power backup options, so their common attributes and different attributes is discussed. Then, the common and different attributes are compared; accordingly, the fuel cell is selected as the backup of Photovoltaic system. Finally, environmental evaluation of the selected hybrid plant was made in terms of plant-s land requirement and lifetime CO2 emissions, and then compared with that of the conventional fossilfuel power generating forms.
Abstract: Modular fixtures (MFs) are very important tools in
manufacturing processes in terms of reduction the cost and the
production time. This paper introduces an automated approach for
assembling MFs elements by employing SolidWorks as a powerful
3D CAD software. Visual Basic (VB) programming language was
applied integrating with SolidWorks API (Application programming
interface) functions. This integration allowed creating plug-in file and
generating new menus in the SolidWorks environment. The menus
allow the user to select, insert, and assemble MFs elements.
Abstract: This paper presents a compact thermoelectric power generator system based on temperature difference across the element. The system can transfer the burning heat energy to electric energy directly. The proposed system has a thermoelectric generator and a power control box. In the generator, there are 4 thermoelectric modules (TEMs), each of which uses 2 thermoelectric chips (TEs) and 2 cold sinks, 1 thermal absorber, and 1 thermal conduction flat board. In the power control box, there are 1 storing energy device, 1 converter, and 1 inverter. The total net generating power is about 11W. This system uses commercial portable gas stoves or burns timber or the coal as the heat source, which is easily obtained. It adopts solid-state thermoelectric chips as heat inverter parts. The system has the advantages of being light-weight, quite, and mobile, requiring no maintenance, and havng easily-supplied heat source. The system can be used a as long as burning is allowed. This system works well for highly-mobilized outdoors situations by providing a power for illumination, entertainment equipment or the wireless equipment at refuge. Under heavy storms such as typhoon, when the solar panels become ineffective and the wind-powered machines malfunction, the thermoelectric power generator can continue providing the vital power.
Abstract: Star graphs are Cayley graphs of symmetric groups of permutations, with transpositions as the generating sets. A star graph is a preferred interconnection network topology to a hypercube for its ability to connect a greater number of nodes with lower degree. However, an attractive property of the hypercube is that it has a Hamiltonian decomposition, i.e. its edges can be partitioned into disjoint Hamiltonian cycles, and therefore a simple routing can be found in the case of an edge failure. The existence of Hamiltonian cycles in Cayley graphs has been known for some time. So far, there are no published results on the much stronger condition of the existence of Hamiltonian decompositions. In this paper, we give a construction of a Hamiltonian decomposition of the star graph 5-star of degree 4, by defining an automorphism for 5-star and a Hamiltonian cycle which is edge-disjoint with its image under the automorphism.
Abstract: It is important to predict yield in semiconductor test process in order to increase yield. In this study, yield prediction means finding out defective die, wafer or lot effectively. Semiconductor test process consists of some test steps and each test includes various test items. In other world, test data has a big and complicated characteristic. It also is disproportionably distributed as the number of data belonging to FAIL class is extremely low. For yield prediction, general data mining techniques have a limitation without any data preprocessing due to eigen properties of test data. Therefore, this study proposes an under-sampling method using support vector machine (SVM) to eliminate an imbalanced characteristic. For evaluating a performance, randomly under-sampling method is compared with the proposed method using actual semiconductor test data. As a result, sampling method using SVM is effective in generating robust model for yield prediction.
Abstract: Several works regarding facial recognition have dealt with methods which identify isolated characteristics of the face or with templates which encompass several regions of it. In this paper a new technique which approaches the problem holistically dispensing with the need to identify geometrical characteristics or regions of the face is introduced. The characterization of a face is achieved by randomly sampling selected attributes of the pixels of its image. From this information we construct a set of data, which correspond to the values of low frequencies, gradient, entropy and another several characteristics of pixel of the image. Generating a set of “p" variables. The multivariate data set with different polynomials minimizing the data fitness error in the minimax sense (L∞ - Norm) is approximated. With the use of a Genetic Algorithm (GA) it is able to circumvent the problem of dimensionality inherent to higher degree polynomial approximations. The GA yields the degree and values of a set of coefficients of the polynomials approximating of the image of a face. By finding a family of characteristic polynomials from several variables (pixel characteristics) for each face (say Fi ) in the data base through a resampling process the system in use, is trained. A face (say F ) is recognized by finding its characteristic polynomials and using an AdaBoost Classifier from F -s polynomials to each of the Fi -s polynomials. The winner is the polynomial family closer to F -s corresponding to target face in data base.
Abstract: This study aims at investigating factors in research
and development (R&D) growth and exploring the role of R&D
management in enhancing social innovation and productivity
improvement in Iran-s industrial sector. It basically explores the
common types of R&D activities and the industries which benefited
the most from active R&D units in Iran. The researchers generated
qualitative analyses obtained from primary and secondary data.
The primary data have been retrieved through interviews with five
key players (Managing Director, Internal Manager, General Manager,
Executive Manager, and Project Manager) in the industrial sector.
The secondary data acquired from an investigation on Mazandaran, a
province of northern Iran. The findings highlight Iran-s focuses of R
& D on cost reduction and upgrading productivity. Industries that
have benefited the most from active R&D units are metallic,
machinery and equipment design, and automotive.
We rank order the primary effects of R&D on productivity
improvement as follows, industry improvement, economic growth,
using professional human resources, generating productivity and
creativity culture, creating a competitive and innovative environment,
and increasing people-s knowledge.
Generally, low budget dedication and insufficient supply of highly
skilled scientists and engineers are two important obstacles for R&D
in Iran. Whereas, R&D has resulted in improvement in Iranian
society, transfer of contemporary knowledge into the international
market is still lacking.
Abstract: In this paper, a new algorithm for generating codebook is proposed for vector quantization (VQ) in image coding. The significant features of the training image vectors are extracted by using the proposed Orthogonal Polynomials based transformation. We propose to generate the codebook by partitioning these feature vectors into a binary tree. Each feature vector at a non-terminal node of the binary tree is directed to one of the two descendants by comparing a single feature associated with that node to a threshold. The binary tree codebook is used for encoding and decoding the feature vectors. In the decoding process the feature vectors are subjected to inverse transformation with the help of basis functions of the proposed Orthogonal Polynomials based transformation to get back the approximated input image training vectors. The results of the proposed coding are compared with the VQ using Discrete Cosine Transform (DCT) and Pairwise Nearest Neighbor (PNN) algorithm. The new algorithm results in a considerable reduction in computation time and provides better reconstructed picture quality.
Abstract: This paper presents a model for the evaluation of
energy performance and aerodynamic forces acting on a small
straight-bladed Darrieus-type vertical axis wind turbine depending on
blade geometrical section. It consists of an analytical code coupled to
a solid modeling software, capable of generating the desired blade
geometry based on the desired blade design geometric parameters.
Such module is then linked to a finite volume commercial CFD code
for the calculation of rotor performance by integration of the
aerodynamic forces along the perimeter of each blade for a full period
of revolution.After describing and validating the computational
model with experimental data, the results of numerical simulations
are proposed on the bases of two candidate airfoil sections, that is a
classical symmetrical NACA 0021 blade profile and the recently
developed DU 06-W-200 non-symmetric and laminar blade
profile.Through a full CFD campaign of analysis, the effects of blade
geometrical section on angle of attack are first investigated and then
the overall rotor torque and power are analyzed as a function of blade
azimuthal position, achieving a numerical quantification of the
influence of airfoil geometry on overall rotor performance.
Abstract: In recent past, the Unified Modeling Language (UML) has become the de facto industry standard for object-oriented modeling of the software systems. The syntax and semantics rich UML has encouraged industry to develop several supporting tools including those capable of generating deployable product (code) from the UML models. As a consequence, ensuring the correctness of the model/design has become challenging and extremely important task. In this paper, we present an approach for automatic verification of protocol model/design. As a case study, Session Initiation Protocol (SIP) design is verified for the property, “the CALLER will not converse with the CALLEE before the connection is established between them ". The SIP is modeled using UML statechart diagrams and the desired properties are expressed in temporal logic. Our prototype verifier “UML-SMV" is used to carry out the verification. We subjected an erroneous SIP model to the UML-SMV, the verifier could successfully detect the error (in 76.26ms) and generate the error trace.