Abstract: Intermittent aeration process can be easily applied on
the existing activated sludge system and is highly reliable against the loading changes. It can be operated in a relatively simple way as well.
Since the moving-bed biofilm reactor method processes pollutants by attaching and securing the microorganisms on the media, the process
efficiency can be higher compared to the suspended growth biological
treatment process, and can reduce the return of sludge. In this study,
the existing intermittent aeration process with alternating flow being
applied on the oxidation ditch is applied on the continuous flow stirred tank reactor with advantages from both processes, and we would like
to develop the process to significantly reduce the return of sludge in the clarifier and to secure the reliable quality of treated water by
adding the moving media. Corresponding process has the appropriate
form as an infrastructure based on u- environment in future u- City and
is expected to accelerate the implementation of u-Eco city in conjunction with city based services. The system being conducted in a
laboratory scale has been operated in HRT 8hours except for the final
clarifier and showed the removal efficiency of 97.7 %, 73.1 % and 9.4
% in organic matters, TN and TP, respectively with operating range of
4hour cycle on system SRT 10days. After adding the media, the removal efficiency of phosphorus showed a similar level compared to
that before the addition, but the removal efficiency of nitrogen was
improved by 7~10 %. In addition, the solids which were maintained in
MLSS 1200~1400 at 25 % of media packing were attached all onto the
media, which produced no sludge entering the clarifier. Therefore, the
return of sludge is not needed any longer.
Abstract: A method to determine experimentally the melting
rate, rm, and the heat transfer coefficients, αv (W/(m3K)), at
convective melting in a fixed bed of particles under adiabatic regime
is established in this paper. The method lies in the determining of the
melting rate by measuring the fixed bed height in time. Experimental
values of rm, α and α v were determined using cylindrical particles of
ice (d = 6.8 mm, h = 5.5 mm) and, as a melting agent, aqueous NaCl
solution with a temperature of 283 K at different values of the liquid
flow rate (11.63·10-6, 28.83·10-6, 38.83·10-6 m3/s).
Our experimental results were compared with those existing in
literature being noticed a good agreement for Re values higher than
50.
Abstract: Using steelmaking slag as a raw material, aragonite superstructure product had been synthesized via an indirect CO2 mineral sequestration rout. It mainly involved two separate steps, in which the element of calcium is first selectively leached from steelmaking slag by a novel leaching media consisting of organic solvent Tributyl phosphate (TBP), acetic acid, and ultra-purity water, followed by enhanced carbonation in a separate step for aragonite superstructure production as well as efficiency recovery of leaching media. Based on the different leaching medium employed in the steelmaking slag leaching process, two typical products were collected from the enhanced carbonation step. The products were characterized by X-ray powder diffraction (XRD) and scanning electron microscopy (SEM), respectively. It reveals that the needle-like aragonite crystals self-organized into aragonite superstructure particles including aragonite microspheres as well as dumbbell-like spherical particles, can be obtained from the steelmaking slag with the purity over 99%.
Abstract: this paper presented a survey analysis subjected on
network bandwidth management from published papers referred in
IEEE Explorer database in three years from 2009 to 2011. Network
Bandwidth Management is discussed in today-s issues for computer
engineering applications and systems. Detailed comparison is
presented between published papers to look further in the IP based
network critical research area for network bandwidth management.
Important information such as the network focus area, a few
modeling in the IP Based Network and filtering or scheduling used in
the network applications layer is presented. Many researches on
bandwidth management have been done in the broad network area
but fewer are done in IP Based network specifically at the
applications network layer. A few researches has contributed new
scheme or enhanced modeling but still the issue of bandwidth
management still arise at the applications network layer. This survey
is taken as a basic research towards implementations of network
bandwidth management technique, new framework model and
scheduling scheme or algorithm in an IP Based network which will
focus in a control bandwidth mechanism in prioritizing the network
traffic the applications layer.
Abstract: This paper investigates the performance of a speech
recognizer in an interactive voice response system for various coded
speech signals, coded by using a vector quantization technique namely
Multi Switched Split Vector Quantization Technique. The process of
recognizing the coded output can be used in Voice banking application.
The recognition technique used for the recognition of the coded speech
signals is the Hidden Markov Model technique. The spectral distortion
performance, computational complexity, and memory requirements of
Multi Switched Split Vector Quantization Technique and the
performance of the speech recognizer at various bit rates have been
computed. From results it is found that the speech recognizer is
showing better performance at 24 bits/frame and it is found that the
percentage of recognition is being varied from 100% to 93.33% for
various bit rates.
Abstract: In the meantime, there were lots of hardware solutions like products or urban facilities for crime prevention in the public design area. Meanwhile, people have growing interest in public design so by making a village; community design in public design is getting active by the society. The system for crime prevention is actively done by the citizens who created the community. Regarding the social situation, in this project, we saw it as a kind of community design practices and researched about 'how does community design influence Crime prevention?' The purpose of this study is to propose the community design as a way of preventing the crime in the city. First, we found out about the definition, elements and methods of community design by reviewing the theory. And then, this study analyzed the case that was enforced in Seoul and organize the elements and methods of community design. This study can be refer to Public Design based on civil participation and make the community design area contribute to expand the way of solving social problems.
Abstract: Laser Profiler (LP) data from aerial laser surveys have
been increasingly used as topographical inputs to numerical
simulations of flooding and inundation in river basins. LP data has
great potential for reproducing topography, but its effective usage has
not yet been fully established. In this study, flooding and inundation
are simulated numerically using LP data for the Jobaru River basin of
Japan’s Saga Plain. The analysis shows that the topography is
reproduced satisfactorily in the computational domain with urban and
agricultural areas requiring different grid sizes. A 2-D numerical
simulation shows that flood flow behavior changes as grid size is
varied.
Abstract: Regulatory relationships of 686 intronic miRNA and 784 intergenic miRNAs with mRNAs of 51 intronic miRNA coding genes were established. Interaction features of studied miRNAs with 5'UTR, CDS and 3'UTR of mRNA of each gene were revealed. Functional regions of mRNA were shown to be significantly heterogenous according to the number of binding sites of miRNA and to the location density of these sites.
Abstract: Using a texture database, a statistical estimation of
spring-back was conducted in this study on the basis of statistical
analysis. Both spring-back in bending deformation and experimental
data related to the crystal orientation show significant dispersion.
Therefore, a probabilistic statistical approach was established for the
proper quantification of these values. Correlation was examined
among the parameters F(x) of spring-back, F(x) of the buildup fraction
to three orientations after 92° bending, and F(x) at an as-received part
on the basis of the three-parameter Weibull distribution. Consequent
spring-back estimation using a texture database yielded excellent
estimates compared with experimental values.
Abstract: A new approach for timestamp ordering problem in
serializable schedules is presented. Since the number of users using
databases is increasing rapidly, the accuracy and needing high
throughput are main topics in database area. Strict 2PL does not
allow all possible serializable schedules and so does not result high
throughput. The main advantages of the approach are the ability to
enforce the execution of transaction to be recoverable and the high
achievable performance of concurrent execution in central databases.
Comparing to Strict 2PL, the general structure of the algorithm is
simple, free deadlock, and allows executing all possible serializable
schedules which results high throughput. Various examples which
include different orders of database operations are discussed.
Abstract: One of the most common practices for strengthening
the reinforced concrete structures is the application of FRP (Fiber
Reinforce Plastic) sheets to increase the flexural and shear strengths
of the member. The elastic modulus of FRP is considerably higher
than that of concrete. This will result in debonding between the FRP
sheets and concrete surface. With conventional surface preparation of
concrete, the ultimate capacity of the FRP sheets can hardly be
achieved. New methods for preparation of the bonding surface have
shown improvements in reducing the premature debonding of FRP
sheets from concrete surface. The present experimental study focuses
on the application of grooving method to postpone debonding of the
FRP sheets attached to the side faces of concrete beams for shear
strengthening. Comparison has also been made with conventional
surface preparation method. This study clearly shows the efficiency
of grooving method compared to surface preparation method, in
preventing the debonding phenomenon and in increasing the load
carrying capacity of FRP.
Abstract: This paper describes studies carried out to investigate
the viability of using wireless cameras as a tool in monitoring
changes in air quality. A camera is used to monitor the change in
colour of a chemically responsive polymer within view of the camera
as it is exposed to varying chemical species concentration levels. The
camera captures this image and the colour change is analyzed by
averaging the RGB values present. This novel chemical sensing
approach is compared with an established chemical sensing method
using the same chemically responsive polymer coated onto LEDs. In
this way, the concentration levels of acetic acid in the air can be
tracked using both approaches. These approaches to chemical plume
tracking have many applications for air quality monitoring.
Abstract: Years of extensive research in the field of speech
processing for compression and recognition in the last five decades,
resulted in a severe competition among the various methods and
paradigms introduced. In this paper we include the different representations
of speech in the time-frequency and time-scale domains
for the purpose of compression and recognition. The examination of
these representations in a variety of related work is accomplished.
In particular, we emphasize methods related to Fourier analysis
paradigms and wavelet based ones along with the advantages and
disadvantages of both approaches.
Abstract: The changes in quality properties and nutritional
components in two fermented mugworts (Artemisia capillaries
Thumberg, Artemisiaeasiaticae Nakai) were characterized followed
by the rapid pattern analysis of volatile flavor compounds by Electric
Nose based on SAW(Surface Acoustic Wave) sensor in GC system.
There were remarkable decreases in the pH and small changes in the
total soluble solids after fermentation. The L (lightness) and b
(yellowness) values in Hunter's color system were shown to be
decreased, whilst the a (redness) value was increased by fermentation.
The HPLC analysis demonstrated that total amino acids were
increased in quantity and the essential amino acids were contained
higher in A. asiaticaeNakai than in A. capillaries Thumberg. While
the total polyphenol contents were not affected by fermentation, the
total sugar contents were dramatically decreased. Scopoletinwere
highly abundant in A. capillarisThumberg, however, it was not
detected in A. asiaticaeNakai. Volatile flavor compounds by Electric
Nose showed that the intensity of several peaks were increased much
and seven additional flavor peaks were newly produced after
fermentation. The flavor differences of two mugworts were clearly
distinguished from the image patterns of VaporPrintTM which indicate
that the fermentation enables the two mugworts to have subtle flavor
differences.
Abstract: A research effort to find the reality of the business of Japan-s software globalization of enterprise-level business software systems has found that while the number of Japan-made enterpriselevel software systems is comparable with those of the other G7 countries, the business is limited to the East and Southeast Asian markets. This indicates that this business has a problem in the European and USA markets. Based on the knowledge that the research has established, the research concludes that the communication problems arise from the lack of individualists' communication styles and foreign language skills in Japan's software globalization is compensated by similarities in certain Japanese cultural factors and Japan's cultural power in the East and Southeast Asian markets and that this business does not have this compensation factor in the European and American markets due to dissimilarities and no cultural power.
Abstract: There are very complex communication systems, as
the multifunction radar, MFAR (Multi-Function Array Radar), where
functions are integrated all together, and simultaneously are
performed the classic functions of tracking and surveillance, as all
the functions related to the communication, countermeasures, and
calibration. All these functions are divided into the tasks to execute.
The task scheduler is a key element of the radar, since it does the
planning and distribution of energy and time resources to be shared
and used by all tasks. This paper presents schedulers based on the use
of multiple queue. Several schedulers have been designed and
studied, and it has been made a comparative analysis of different
performed schedulers. The tests and experiments have been done by
means of system software simulation. Finally a suitable set of radar
characteristics has been selected to evaluate the behavior of the task
scheduler working.
Abstract: Today, numerical simulation is a powerful tool to
solve various hydraulic engineering problems. The aim of this
research is numerical solutions of shallow water equations using
finite volume method for Simulations of dam break over wet and dry
bed. In order to solve Riemann problem, Roe-s approximate solver is
used. To evaluate numerical model, simulation was done in 1D and
2D states. In 1D state, two dam break test over dry bed (with and
without friction) were studied. The results showed that Structural
failure around the dam and damage to the downstream constructions
in bed without friction is more than friction bed. In 2D state, two
tests for wet and dry beds were done. Generally in wet bed case,
waves are propagated to canal sides but in dry bed it is not
significant. Therefore, damage to the storage facilities and
agricultural lands in wet bed case is more than in dry bed.
Abstract: European Union candidate status provides a
strong motivation for decision-making in the candidate
countries in shaping the regional development policy where
there is an envisioned transfer of power from center to the
periphery. The process of Europeanization anticipates the
candidate countries configure their regional institutional
templates in the context of the requirements of the European
Union policies and introduces new instruments of incentive
framework of enlargement to be employed in regional
development schemes. It is observed that the contribution of
the local actors to the decision making in the design of the
allocation architectures enhances the efficiency of the funds
and increases the positive effects of the projects funded under
the regional development objectives. This study aims at
exploring the performances of the three regional development
grant schemes in Turkey, established and allocated under the
pre-accession process with a special emphasis given to the
roles of the national and local actors in decision-making for
regional development. Efficiency analyses have been
conducted using the DEA methodology which has proved to
be a superior method in comparative efficiency and
benchmarking measurements. The findings of this study as
parallel to similar international studies, provides that the
participation of the local actors to the decision-making in
funding contributes both to the quality and the efficiency of
the projects funded under the EU schemes.
Abstract: In this note, some properties of potentially powerpositive sign patterns are established, and all the potentially powerpositive sign patterns of order ≤ 3 are classified completely.
Abstract: Phishing, or stealing of sensitive information on the
web, has dealt a major blow to Internet Security in recent times. Most
of the existing anti-phishing solutions fail to handle the fuzziness
involved in phish detection, thus leading to a large number of false
positives. This fuzziness is attributed to the use of highly flexible and
at the same time, highly ambiguous HTML language. We introduce a
new perspective against phishing, that tries to systematically prove,
whether a given page is phished or not, using the corresponding
original page as the basis of the comparison. It analyzes the layout of
the pages under consideration to determine the percentage distortion
between them, indicative of any form of malicious alteration. The
system design represents an intelligent system, employing dynamic
assessment which accurately identifies brand new phishing attacks
and will prove effective in reducing the number of false positives.
This framework could potentially be used as a knowledge base, in
educating the internet users against phishing.