Abstract: We present a Large-Eddy simulation of a vortex cell
with circular shaped. The results show that the flow field can be sub
divided into four important zones, the shear layer above the cavity,
the stagnation zone, the vortex core in the cavity and the boundary
layer along the wall of the cavity. It is shown that the vortex core
consits of solid body rotation without much turbulence activity. The
vortex is mainly driven by high energy packets that are driven into the
cavity from the stagnation point region and by entrainment of fluid
from the cavity into the shear layer. The physics in the boundary
layer along the cavity-s wall seems to be far from that of a canonical
boundary layer which might be a crucial point for modelling this
flow.
Abstract: The whole work is based on possibility to use Lego Mindstorms robotics systems to reduce costs. Lego Mindstorms consists of a wide variety of hardware components necessary to simulate, programme and test of robotics systems in practice. To programme algorithm, which simulates space using the ultrasonic sensor, was used development environment supplied with kit. Software Matlab was used to render values afterwards they were measured by ultrasonic sensor. The algorithm created for this paper uses theoretical knowledge from area of signal processing. Data being processed by algorithm are collected by ultrasonic sensor that scans 2D space in front of it. Ultrasonic sensor is placed on moving arm of robot which provides horizontal moving of sensor. Vertical movement of sensor is provided by wheel drive. The robot follows map in order to get correct positioning of measured data. Based on discovered facts it is possible to consider Lego Mindstorm for low-cost and capable kit for real-time modelling.
Abstract: In this paper, an extended method of the directionally constrained minimization of power (DCMP) algorithm for broadband signals is proposed. The DCMP algorithm is one of the useful techniques of extracting a target signal from observed signals of a microphone array system. In the DCMP algorithm, output power of the microphone array is minimized under a constraint of constant responses to directions of arrival (DOAs) of specific signals. In our algorithm, by limiting the directional constraint to the perpendicular direction to the sensor array system, the calculating time is reduced.
Abstract: The use of e-business in small and medium-sized
enterprises (SMEs) has been recently received an enormous attention
in information systems research by both academic and practitioners.
With the adoption of new and efficient technologies to enhance
businesses, Thai SMEs should be able to compete worldwide.
Unfortunately, most of the owners are not used to new technologies.
It is clear that most Thai SMEs prefer to work manually rather than
electronically. This paper aims to provide a fundamental conceptual
framework for E-business adoption by Thai SMEs. Rooted in
Knowledge transfer model, several factors are identified, which drive
and enable e-business adoption. By overlooking the benefits
associated with implementing new technologies, it is difficult for
Thai SMEs to perform well enough to compete globally. The paper
also helps Thai SMEs to understand factors related to E-business
adoption.
Abstract: We present a novel scheme to recognize isolated speech
signals using certain statistical parameters derived from those signals.
The determination of the statistical estimates is based on extracted
signal information rather than the original signal information in
order to reduce the computational complexity. Subtle details of
these estimates, after extracting the speech signal from ambience
noise, are first exploited to segregate the polysyllabic words from
the monosyllabic ones. Precise recognition of each distinct word is
then carried out by analyzing the histogram, obtained from these
information.
Abstract: The overriding goal of software engineering is to
provide a high quality system, application or a product. To achieve
this goal, software engineers must apply effective methods coupled
with modern tools within the context of a mature software process
[2]. In addition, it is also must to assure that high quality is realized.
Although many quality measures can be collected at the project
levels, the important measures are errors and defects. Deriving a
quality measure for reusable components has proven to be
challenging task now a days. The results obtained from the study are
based on the empirical evidence of reuse practices, as emerged from
the analysis of industrial projects. Both large and small companies,
working in a variety of business domains, and using object-oriented
and procedural development approaches contributed towards this
study. This paper proposes a quality metric that provides benefit at
both project and process level, namely defect removal efficiency
(DRE).
Abstract: Conventional industrial monitoring systems are
tedious, inefficient and the at times integrity of the data is
unreliable. The objective of this system is to monitor industrial
processes specifically the fluid level which will measure the
instantaneous fluid level parameter and respond by text
messaging the exact value of the parameter to the user when
being enquired by a privileged access user. The development of
the embedded program code and the circuit for fluid level
measuring are discussed as well. Suggestions for future
implementations and efficient remote monitoring works are
included.
Abstract: This paper proposes a VPN Accelerator Board
(VPN-AB), a virtual private network (VPN) protocol designed for
trust channel security system (TCSS). TCSS supports safety
communication channel between security nodes in internet. It
furnishes authentication, confidentiality, integrity, and access control
to security node to transmit data packets with IPsec protocol. TCSS
consists of internet key exchange block, security association block,
and IPsec engine block. The internet key exchange block negotiates
crypto algorithm and key used in IPsec engine block. Security
Association blocks setting-up and manages security association
information. IPsec engine block treats IPsec packets and consists of
networking functions for communication. The IPsec engine block
should be embodied by H/W and in-line mode transaction for high
speed IPsec processing. Our VPN-AB is implemented with high speed
security processor that supports many cryptographic algorithms and
in-line mode. We evaluate a small TCSS communication environment,
and measure a performance of VPN-AB in the environment. The
experiment results show that VPN-AB gets a performance throughput
of maximum 15.645Gbps when we set the IPsec protocol with
3DES-HMAC-MD5 tunnel mode.
Abstract: Any decision-making is based on certain theory. Taking
the public rental housing in Chongqing municipality as an example,
this essay states that the stakeholder theory can provide innovative
criteria and evaluation methods for Public Private Partnership (PPP)
projects. It gives an analysis of how to choose decision-making criteria
for different stakeholders in the PPP model and what measures to take
to meet the criteria to form “symbiotic" decision-making mode
through contracts and to boost the application of PPP model in
large-scale public programs in China.
Abstract: In this paper, we consider the problem of tracking
multiple maneuvering targets using switching multiple target motion
models. With this paper, we aim to contribute in solving the problem
of model-based body motion estimation by using data coming from
visual sensors. The Interacting Multiple Model (IMM) algorithm is
specially designed to track accurately targets whose state and/or
measurement (assumed to be linear) models changes during motion
transition. However, when these models are nonlinear, the IMM
algorithm must be modified in order to guarantee an accurate track.
In this paper we propose to avoid the Extended Kalman filter because
of its limitations and substitute it with the Unscented Kalman filter
which seems to be more efficient especially according to the
simulation results obtained with the nonlinear IMM algorithm (IMMUKF).
To resolve the problem of data association, the JPDA
approach is combined with the IMM-UKF algorithm, the derived
algorithm is noted JPDA-IMM-UKF.
Abstract: This paper describes the design and development of pico-hydro generation system using consuming water distributed to houses. Water flow in the domestic pipes has kinetic energy that potential to generate electricity for energy storage purposes in addition to the routine activities such as laundry, cook and bathe. The inherent water pressure and flow inside the pipe from utility-s main tank that used for those usual activities is also used to rotate small scale hydro turbine to drive a generator for electrical power generation. Hence, this project is conducted to develop a small scale hydro generation system using consuming water distributed to houses as an alternative electrical energy source for residential use.
Abstract: This study deals with the phenomena of reflection and transmission (refraction) of qSV-waves, for an incident of quasi transverse vertically waves, at a plane interface of two semi-infinite piezoelectric elastic media under the influence of the initial stresses. The relations governing the reflection and transmission coefficients of these reflected waves for various suitable boundary conditions are derived. We have shown analytically that reflection and transmission coefficients of (qP) and (qSV) waves depend upon the angle of incidence, the parameters of electric potential, the material constants of the medium as will as the initial stresses presented in the media. The numerical calculations of the reflection and transmission amplitude ratios for different values of initial stresses have been carried out by computer for different materials as examples and the results are given in the form of graphs. Finally, some of particular cases are considered.
Abstract: Utilizing echoic intension and distribution from different organs and local details of human body, ultrasonic image can catch important medical pathological changes, which unfortunately may be affected by ultrasonic speckle noise. A feature preserving ultrasonic image denoising and edge enhancement scheme is put forth, which includes two terms: anisotropic diffusion and edge enhancement, controlled by the optimum smoothing time. In this scheme, the anisotropic diffusion is governed by the local coordinate transformation and the first and the second order normal derivatives of the image, while the edge enhancement is done by the hyperbolic tangent function. Experiments on real ultrasonic images indicate effective preservation of edges, local details and ultrasonic echoic bright strips on denoising by our scheme.
Abstract: In designing river intakes and diversion structures, it is paramount that the sediments entering the intake are minimized or, if possible, completely separated. Due to high water velocity, sediments can significantly damage hydraulic structures especially when mechanical equipment like pumps and turbines are used. This subsequently results in wasting water, electricity and further costs. Therefore, it is prudent to investigate and analyze the performance of lateral intakes affected by sediment control structures. Laboratory experiments, despite their vast potential and benefits, can face certain limitations and challenges. Some of these include: limitations in equipment and facilities, space constraints, equipment errors including lack of adequate precision or mal-operation, and finally, human error. Research has shown that in order to achieve the ultimate goal of intake structure design – which is to design longlasting and proficient structures – the best combination of sediment control structures (such as sill and submerged vanes) along with parameters that increase their performance (such as diversion angle and location) should be determined. Cost, difficulty of execution and environmental impacts should also be included in evaluating the optimal design. This solution can then be applied to similar problems in the future. Subsequently, the model used to arrive at the optimal design requires high level of accuracy and precision in order to avoid improper design and execution of projects. Process of creating and executing the design should be as comprehensive and applicable as possible. Therefore, it is important that influential parameters and vital criteria is fully understood and applied at all stages of choosing the optimal design. In this article, influential parameters on optimal performance of the intake, advantages and disadvantages, and efficiency of a given design are studied. Then, a multi-criterion decision matrix is utilized to choose the optimal model that can be used to determine the proper parameters in constructing the intake.
Abstract: Today-s economy is in a permanent change, causing
merger and acquisitions and co operations between enterprises. As a
consequence, process adaptations and realignments result in systems
integration and software development projects. Processes and
procedures to execute such projects are still reliant on craftsman-ship
of highly skilled workers. A generally accepted, industrialized
production, characterized by high efficiency and quality, seems
inevitable.
In spite of this, current concepts of software industrialization are
aimed at traditional software engineering and do not consider the
characteristics of systems integration. The present work points out
these particularities and discusses the applicability of existing
industrial concepts in the systems integration domain. Consequently
it defines further areas of research necessary to bring the field of
systems integration closer to an industrialized production, allowing a
higher efficiency, quality and return on investment.
Abstract: The transient analysis of a queuing system with fixed-size batch Poisson arrivals and a single server with exponential service times is presented. The focus of the paper is on the use of the functions that arise in the analysis of the transient behaviour of the queuing system. These functions are shown to be a generalization of the modified Bessel functions of the first kind, with the batch size B as the generalizing parameter. Results for the case of single-packet arrivals are obtained first. The similarities between the two families of functions are then used to obtain results for the general case of batch arrival queue with a batch size larger than one.
Abstract: The purpose of this study was to suggest some optimal
waterfront scales around small rivers by reviewing domestic and
foreign survey reports about concept and relevant systems of the
ecological cities, analyzing the data collected from a survey about
scales and facilities of waterfront green zones around small rivers. The
questionnaire survey was conducted by sampling professional
designers, developers, the citizens living in the GunpoSanbon district
covered by no river system and the citizens living in such districts
covered by a river system. The question items were about need, uses,
scale and facilities of waterfront in common, and about satisfaction
with waterfront in case of citizen groups. In short, most of the subjects
in 5 groups preferred 10~20 wide waterfront green zone. And it is
judged that the results of this study about uses and facilities of the
waterfront green zone and its scales would provide for some basic data
useful to future waterfront green zone and urban development plans.
Abstract: We employ the idea of Hirota-s bilinear method, to obtain some new exact soliton solutions for high nonlinear form of (2+1)-dimensional potential Kadomtsev-Petviashvili equation. Multiple singular soliton solutions were obtained by this method. Moreover, multiple singular soliton solutions were also derived.
Abstract: Loop detectors report traffic characteristics in real
time. They are at the core of traffic control process. Intuitively,
one would expect that as density of detection increases, so would
the quality of estimates derived from detector data. However, as
detector deployment increases, the associated operating and
maintenance cost increases. Thus, traffic agencies often need to
decide where to add new detectors and which detectors should
continue receiving maintenance, given their resource constraints.
This paper evaluates the effect of detector spacing on freeway
travel time estimation. A freeway section (Interstate-15) in Salt
Lake City metropolitan region is examined. The research reveals
that travel time accuracy does not necessarily deteriorate with
increased detector spacing. Rather, the actual location of detectors
has far greater influence on the quality of travel time estimates.
The study presents an innovative computational approach that
delivers optimal detector locations through a process that relies on
Genetic Algorithm formulation.
Abstract: As a matter of the fact that online social networks like
Twitter, Facebook and MySpace have experienced an extensive
growth in recent years. Social media offers individuals with a tool for
communicating and interacting with one another. These social
networks enable people to stay in touch with other people and
express themselves. This process makes the users of online social
networks active creators of content rather than being only consumers
of traditional media. That’s why millions of people show strong
desire to learn the methods and tools of digital content production
and necessary communication skills. However, the booming interest
in communication and interaction through online social networks and
high level of eagerness to invent and implement the ways to
participate in content production raise some privacy and security
concerns.
This presentation aims to open the assumed revolutionary,
democratic and liberating nature of the online social media up for
discussion by reviewing some recent political developments in
Turkey. Firstly, the role of Internet and online social networks in
mobilizing collective movements through social interactions and
communications will be questioned. Secondly, some cases from Gezi
and Okmeydanı Protests and also December 17-25 period will be
presented in order to illustrate misinformation and manipulation in
social media and violation of individual privacy through online social
networks in order to damage social unity and stability contradictory
to democratic nature of online social networking.