Abstract: This paper describes the speed sensorless vector control method of the parallel connected induction motor drive fed by a single inverter. Speed and rotor fluxes of the induction motor are estimated by natural observer with load torque adaptation and adaptive rotor flux observer. The performance parameters speed and rotor fluxes are estimated from the measured terminal voltages and currents. Fourth order induction motor model is used and speed is considered as a parameter. The performance of the natural observer is similar to the conventional observer. The speed of an induction motor is estimated by MATLAB simulation under different speed and load conditions. Estimated values along with other measured states are used for closed loop control. The simulation results show that the natural observer is also effective for parallel connected induction motor drive.
Abstract: This paper describes an automatic algorithm to restore
the shape of three-dimensional (3D) left ventricle (LV) models created
from magnetic resonance imaging (MRI) data using a geometry-driven
optimization approach. Our basic premise is to restore the LV shape
such that the LV epicardial surface is smooth after the restoration. A
geometrical measure known as the Minimum Principle Curvature (κ2)
is used to assess the smoothness of the LV. This measure is used to
construct the objective function of a two-step optimization process.
The objective of the optimization is to achieve a smooth epicardial
shape by iterative in-plane translation of the MRI slices.
Quantitatively, this yields a minimum sum in terms of the magnitude
of κ
2, when κ2 is negative. A limited memory quasi-Newton algorithm,
L-BFGS-B, is used to solve the optimization problem. We tested our
algorithm on an in vitro theoretical LV model and 10 in vivo
patient-specific models which contain significant motion artifacts. The
results show that our method is able to automatically restore the shape
of LV models back to smoothness without altering the general shape of
the model. The magnitudes of in-plane translations are also consistent
with existing registration techniques and experimental findings.
Abstract: Recently, various services such as television and the
Internet have come to be received through various terminals.
However, we could gain greater convenience by receiving these
services through cellular phone terminals when we go out and then
continuing to receive the same services through a large screen digital
television after we have come home. However, it is necessary to go
through the same authentication processing again when using TVs
after we have come home. In this study, we have developed an
authentication method that enables users to switch terminals in
environments in which the user receives service from a server through
a terminal. Specifically, the method simplifies the authentication of
the server side when switching from one terminal to another terminal
by using previously authenticated information.
Abstract: In this paper, we propose a fully-utilized, block-based 2D DWT (discrete wavelet transform) architecture, which consists of four 1D DWT filters with two-channel QMF lattice structure. The proposed architecture requires about 2MN-3N registers to save the intermediate results for higher level decomposition, where M and N stand for the filter length and the row width of the image respectively. Furthermore, the proposed 2D DWT processes in horizontal and vertical directions simultaneously without an idle period, so that it computes the DWT for an N×N image in a period of N2(1-2-2J)/3. Compared to the existing approaches, the proposed architecture shows 100% of hardware utilization and high throughput rates. To mitigate the long critical path delay due to the cascaded lattices, we can apply the pipeline technique with four stages, while retaining 100% of hardware utilization. The proposed architecture can be applied in real-time video signal processing.
Abstract: The condition of lightning surge causes the traveling waves and the temporary increase in voltage in the transmission line system. Lightning is the most harmful for destroying the transmission line and setting devices so it is necessary to study and analyze the temporary increase in voltage for designing and setting the surge arrester. This analysis describes the figure of the lightning wave in transmission line with 115 kV voltage level in Thailand by using ATP/EMTP program to create the model of the transmission line and lightning surge. Because of the limit of this program, it must be calculated for the geometry of the transmission line and surge parameter and calculation in the manual book for the closest value of the parameter. On the other hand, for the effects on surge protector when the lightning comes, the surge arrester model must be right and standardized as metropolitan electrical authority's standard. The candidate compared the real information to the result from calculation, also. The results of the analysis show that the temporary increase in voltage value will be rise to 326.59 kV at the line which is done by lightning when the surge arrester is not set in the system. On the other hand, the temporary increase in voltage value will be 182.83 kV at the line which is done by lightning when the surge arrester is set in the system and the period of the traveling wave is reduced, also. The distance for setting the surge arrester must be as near to the transformer as possible. Moreover, it is necessary to know the right distance for setting the surge arrester and the size of the surge arrester for preventing the temporary increase in voltage, effectively.
Abstract: A computer model of Quantum Theory (QT) has been
developed by the author. Major goal of the computer model was
support and demonstration of an as large as possible scope of QT.
This includes simulations for the major QT (Gedanken-) experiments
such as, for example, the famous double-slit experiment.
Besides the anticipated difficulties with (1) transforming exacting
mathematics into a computer program, two further types of problems
showed up, namely (2) areas where QT provides a complete mathematical
formalism, but when it comes to concrete applications the
equations are not solvable at all, or only with extremely high effort;
(3) QT rules which are formulated in natural language and which do
not seem to be translatable to precise mathematical expressions, nor
to a computer program.
The paper lists problems in all three categories and describes also
the possible solutions or circumventions developed for the computer
model.
Abstract: Face recognition is a technique to automatically
identify or verify individuals. It receives great attention in
identification, authentication, security and many more applications.
Diverse methods had been proposed for this purpose and also a lot of
comparative studies were performed. However, researchers could not
reach unified conclusion. In this paper, we are reporting an extensive
quantitative accuracy analysis of four most widely used face
recognition algorithms: Principal Component Analysis (PCA),
Independent Component Analysis (ICA), Linear Discriminant
Analysis (LDA) and Support Vector Machine (SVM) using AT&T,
Sheffield and Bangladeshi people face databases under diverse
situations such as illumination, alignment and pose variations.
Abstract: This paper analysed the food security situation among
Nigerian rural farmers. Data collected on 202 rural farmers from
Benue State were analysed using descriptive and inferential statistics.
The study revealed that majority of the respondents (60.83%) had
medium dietary diversity. Furthermore, household daily calorie
requirement for the food secure households was 10,723 and the
household daily calorie consumption was 12,598, with a surplus
index of 0.04. The food security index was 1.16. The Household
daily per capita calorie consumption was 3,221.2. For the food
insecure households, the household daily calorie requirement was
20,213 and the household daily calorie consumption was 17,393. The
shortfall index was 0.14. The food security index was 0.88. The
Household daily per capita calorie consumption was 2,432.8. The
most commonly used coping strategies during food stress included
intercropping (99.2%), reliance on less preferred food (98.1%),
limiting portion size at meal times (85.8%) and crop diversification
(70.8%).
Abstract: Testable software has two inherent properties – observability and controllability. Observability facilitates observation of internal behavior of software to required degree of detail. Controllability allows creation of difficult-to-achieve states prior to execution of various tests. In this paper, we describe COTT, a Controllability and Observability Testing Tool, to create testable object-oriented software. COTT provides a framework that helps the user to instrument object-oriented software to build the required controllability and observability. During testing, the tool facilitates creation of difficult-to-achieve states required for testing of difficultto- test conditions and observation of internal details of execution at unit, integration and system levels. The execution observations are logged in a test log file, which are used for post analysis and to generate test coverage reports.
Abstract: The paper is intended to declare and apply ethics, i. e.
moral principles, rules in marketing environment. Ethical behavior of
selected pharmaceutical companies in the Slovak Republic is the
object of our research. The aim of our research is to determine
perception of ethical behavior of the pharmaceutical industry in
Slovakia by the medicine representatives in comparison with the
assessment of doctors and patients. The experimental sample
included 90 participants who were divided into three groups:
medicine representatives of the pharmaceutical companies (N=30),
doctors (N=30) and patients (N=30). The research method was a
Questionnaire of ethical behavior, created by us, that describes
individual areas included in the Code of ethics of the pharmaceutical
industry in Slovakia. The results showed influence of professional
status on ethical behavior perception, not gender. Higher perception
was indicated at patients rather than doctors and medicine
representatives.
Abstract: In this paper we describe a hybrid technique of Minimax search and aggregate Mahalanobis distance function synthesis to evolve Awale game player. The hybrid technique helps to suggest a move in a short amount of time without looking into endgame database. However, the effectiveness of the technique is heavily dependent on the training dataset of the Awale strategies utilized. The evolved player was tested against Awale shareware program and the result is appealing.
Abstract: In this paper, the effects of thermodynamic,
hydrodynamic and geometric of an air cooled condenser on COP of
vapor compression cycle are investigated for a fixed condenser facing
surface area. The system is utilized with a scroll compressor,
modeled based on thermodynamic and heat transfer equations
employing Matlab software. The working refrigerant is R134a whose
thermodynamic properties are called from Engineering Equation
Software. This simulation shows that vapor compression cycle can
be designed by different configurations and COPs, economical and
optimum working condition can be obtained via considering these
parameters.
Abstract: One way for optimum loading of overdimensioning
conveyers is speed (capacity) decrement, with attention for
production capabilities and demands. At conveyers which drives with
three phase slip-ring induction motor, technically reasonable solution
for conveyer (driving motors) speed regulation is using constant
torque subsynchronous cascade with static semiconductor converter
and transformer for energy reversion to the power network. In the
paper is described mathematical model for parameter calculation of
two-motors 6 kV subsynchronous cascade. It is also demonstrated
that applying of this cascade gave several good properties, foremost
in electrical energy saving, also in improving of other energy
indexes, and finally that results in cost reduction of complete
electrical motor drive.
Abstract: Failure modes and effects analysis (FMEA) is an effective technique for preventing potential problems and actions needed to error cause removal. On the other hand, the oil producing companies paly a critical role in the oil industry of Iran as a developing country out of which, Sepahan Oil Co. has a considerable contribution. The aim of this research is to show how FMEA could be applied and improve the quality of products at Sepahan Oil Co. For this purpose, the four liter production line of the company has been selected for investigation. The findings imply that the application of FMEA has reduced the scraps from 50000 ppm to 5000 ppm and has resulted in a 0.92 percent decrease of the oil waste.
Abstract: We provide a maximum norm analysis of a finite
element Schwarz alternating method for a nonlinear elliptic boundary
value problem of the form -Δu = f(u), on two overlapping sub
domains with non matching grids. We consider a domain which is
the union of two overlapping sub domains where each sub domain
has its own independently generated grid. The two meshes being
mutually independent on the overlap region, a triangle belonging to
one triangulation does not necessarily belong to the other one. Under
a Lipschitz assumption on the nonlinearity, we establish, on each sub
domain, an optimal L∞ error estimate between the discrete Schwarz
sequence and the exact solution of the boundary value problem.
Abstract: This paper focuses on sovereign credit risk meaning a
hot topic related to the current Eurozone crisis. In the light of the
recent financial crisis, market perception of the creditworthiness of
individual sovereigns has changed significantly. Before the outbreak
of the financial crisis, market participants did not differentiate
between credit risk born by individual states despite different levels
of public indebtedness. In the proceeding of the financial crisis, the
market participants became aware of the worsening fiscal situation in
the European countries and started to discriminate among
government issuers. Concerns about the increasing sovereign risk
were reflected in surging sovereign risk premium. The main of this
paper is to shed light on the characteristics of the sovereign risk with
the special attention paid to the mutual relation between credit spread
and the CDS premium as the main measures of the sovereign risk
premium.
Abstract: Atlantic herring (Clupea harengus) is an important
commercial fish and shows to be more and more demanded for
human consumption. Therefore, it is very important to find good
methods for monitoring the freshness of the fish in order to keep it in
the best quality for human consumption. In this study, the fish was
stored in ice up to 2 weeks. Quality changes during storage were
assessed by the Quality Index Method (QIM), quantitative
descriptive analysis (QDA) and Torry scheme, by texture
measurements: puncture tests and Texture Profile Analysis (TPA)
tests on texture analyzer TA.XT2i, and by electronic nose (e-nose)
measurements using FreshSense instrument. Storage time of herring
in ice could be estimated by QIM with ± 2 days using 5 herring per
lot. No correlation between instrumental texture parameters and
storage time or between sensory and instrumental texture variables
was found. E-nose measurements could be use to detect the onset of
spoilage.
Abstract: The value of overall oxygen transfer Coefficient
(KLa), which is the best measure of oxygen transfer in water through
aeration, is obtained by a simple approach, which sufficiently
explains the utility of the method to eliminate the discrepancies due
to inaccurate assumption of saturation dissolved oxygen
concentration. The rate of oxygen transfer depends on number of
factors like intensity of turbulence, which in turns depends on the
speed of rotation, size, and number of blades, diameter and
immersion depth of the rotor, and size and shape of aeration tank, as
well as on physical, chemical, and biological characteristic of water.
An attempt is made in this paper to correlate the overall oxygen
transfer Coefficient (KLa), as an independent parameter with other
influencing parameters mentioned above. It has been estimated that
the simulation equation developed predicts the values of KLa and
power with an average standard error of estimation of 0.0164 and
7.66 respectively and with R2 values of 0.979 and 0.989 respectively,
when compared with experimentally determined values. The
comparison of this model is done with the model generated using
Computational fluid dynamics (CFD) and both the models were
found to be in good agreement with each other.
Abstract: Cell phone forensics to acquire and analyze data in the
cellular phone is nowadays being used in a national investigation
organization and a private company. In order to collect cellular phone
flash memory data, we have two methods. Firstly, it is a logical
method which acquires files and directories from the file system of the
cell phone flash memory. Secondly, we can get all data from bit-by-bit
copy of entire physical memory using a low level access method. In
this paper, we describe a forensic tool to acquire cell phone flash
memory data using a logical level approach. By our tool, we can get
EFS file system and peek memory data with an arbitrary region from
Korea CDMA cell phone.
Abstract: As an adult man and woman love each other and come to have faith in each other as their spouse, they marry each other. Recently people-s economic life has become individualized and women are enjoying a high education level and increased participation in social activities, and these changes are creating environment favorable for single life. Thus, an increasing number of people are choosing celibacy, and many people prefer cohabitation to marriage. Nevertheless, marriage is still regarded as a must-to-do in our thought. Most of people throughout the world admit marriage as one of natural processes of life, and is an important passage rite in life that all people experience as we can see everywhere in the world despite the diversity of lifestyles. With regard to wedding ceremony, however, each country and culture has its own unique tradition and style of festival. It is not just a congratulatory ceremony but contains multiple concepts representing the age, country or culture. Moreover, the form and contents of wedding ceremony changes over time, and such features of wedding ceremony are well represented in films. This study took note of the fact that films reflect and reproduce each country-s historicity, culturality and analyzed four films, which are believed to show differences between Eastern and Western wedding ceremonies. The selected films are: A Perfect Match (2002), Marriage Is a Crazy Thing (2001), Bride Wars (2009) and 27 Dresses (2008). The author attempted to examine wedding ceremonies described in the four films, differences between the East and the West suggested by the films, and changes in their societies.