Abstract: The construction of a civil structure inside a urban
area inevitably modifies the outdoor microclimate at the building
site. Wind speed, wind direction, air pollution, driving rain, radiation
and daylight are some of the main physical aspects that are subjected
to the major changes. The quantitative amount of these modifications
depends on the shape, size and orientation of the building and on its
interaction with the surrounding environment.The flow field over a
flat roof model building has been numerically investigated in order to
determine two-dimensional CFD guidelines for the calculation of the
turbulent flow over a structure immersed in an atmospheric boundary
layer. To this purpose, a complete validation campaign has been
performed through a systematic comparison of numerical simulations
with wind tunnel experimental data.Several turbulence models and
spatial node distributions have been tested for five different vertical
positions, respectively from the upstream leading edge to the
downstream bottom edge of the analyzed model. Flow field
characteristics in the neighborhood of the building model have been
numerically investigated, allowing a quantification of the capabilities
of the CFD code to predict the flow separation and the extension of
the recirculation regions.The proposed calculations have allowed the
development of a preliminary procedure to be used as a guidance in
selecting the appropriate grid configuration and corresponding
turbulence model for the prediction of the flow field over a twodimensional
roof architecture dominated by flow separation.
Abstract: The intrusion detection problem has been frequently studied, but intrusion detection methods are often based on a single point of view, which always limits the results. In this paper, we introduce a new intrusion detection model based on the combination of different current methods. First we use a notion of distance to unify the different methods. Second we combine these methods using the Pearson correlation coefficients, which measure the relationship between two methods, and we obtain a combined distance. If the combined distance is greater than a predetermined threshold, an intrusion is detected. We have implemented and tested the combination model with two different public data sets: the data set of masquerade detection collected by Schonlau & al., and the data set of program behaviors from the University of New Mexico. The results of the experiments prove that the combination model has better performances.
Abstract: Fuzzy C-means Clustering algorithm (FCM) is a
method that is frequently used in pattern recognition. It has the
advantage of giving good modeling results in many cases, although,
it is not capable of specifying the number of clusters by itself. In
FCM algorithm most researchers fix weighting exponent (m) to a
conventional value of 2 which might not be the appropriate for all
applications. Consequently, the main objective of this paper is to use
the subtractive clustering algorithm to provide the optimal number of
clusters needed by FCM algorithm by optimizing the parameters of
the subtractive clustering algorithm by an iterative search approach
and then to find an optimal weighting exponent (m) for the FCM
algorithm. In order to get an optimal number of clusters, the iterative
search approach is used to find the optimal single-output Sugenotype
Fuzzy Inference System (FIS) model by optimizing the
parameters of the subtractive clustering algorithm that give minimum
least square error between the actual data and the Sugeno fuzzy
model. Once the number of clusters is optimized, then two
approaches are proposed to optimize the weighting exponent (m) in
the FCM algorithm, namely, the iterative search approach and the
genetic algorithms. The above mentioned approach is tested on the
generated data from the original function and optimal fuzzy models
are obtained with minimum error between the real data and the
obtained fuzzy models.
Abstract: The cables in a nuclear power plant are designed to be
used for about 40 years in safe operation environment. However, the
heat and radiation in the nuclear power plant causes the rapid
performance deterioration of cables in nuclear vessels and heat
exchangers, which requires cable lifetime estimation. The most
accurate method of estimating the cable lifetime is to evaluate the
cables in a laboratory. However, removing cables while the plant is
operating is not allowed because of its safety and cost. In this paper, a
robot system to estimate the cable lifetime in nuclear power plants is
developed and tested. The developed robot system can calculate a
modulus value to estimate the cable lifetime even when the nuclear
power plant is in operation.
Abstract: Network security attacks are the violation of
information security policy that received much attention to the
computational intelligence society in the last decades. Data mining
has become a very useful technique for detecting network intrusions
by extracting useful knowledge from large number of network data
or logs. Naïve Bayesian classifier is one of the most popular data
mining algorithm for classification, which provides an optimal way
to predict the class of an unknown example. It has been tested that
one set of probability derived from data is not good enough to have
good classification rate. In this paper, we proposed a new learning
algorithm for mining network logs to detect network intrusions
through naïve Bayesian classifier, which first clusters the network
logs into several groups based on similarity of logs, and then
calculates the prior and conditional probabilities for each group of
logs. For classifying a new log, the algorithm checks in which cluster
the log belongs and then use that cluster-s probability set to classify
the new log. We tested the performance of our proposed algorithm by
employing KDD99 benchmark network intrusion detection dataset,
and the experimental results proved that it improves detection rates
as well as reduces false positives for different types of network
intrusions.
Abstract: This paper deals with efficient computation of
probability coefficients which offers computational simplicity as
compared to spectral coefficients. It eliminates the need of inner
product evaluations in determination of signature of a combinational
circuit realizing given Boolean function. The method for computation
of probability coefficients using transform matrix, fast transform
method and using BDD is given. Theoretical relations for achievable
computational advantage in terms of required additions in computing
all 2n probability coefficients of n variable function have been
developed. It is shown that for n ≥ 5, only 50% additions are needed
to compute all probability coefficients as compared to spectral
coefficients. The fault detection techniques based on spectral
signature can be used with probability signature also to offer
computational advantage.
Abstract: The article presents test results on the changes
occurring in sewage sludge during the process of its storage. Tests
were conducted on mechanically dehydrated sewage sludge derived
from large municipal sewage treatment plants equipped with
biological sewage treatment systems. In testing presented in the paper
the focus was on the basic fuel properties of sewage sludge: moisture
content, heat of combustion, carbon share. In the first part of the
article the overview of the issues concerning the sewage sludge
management is presented and the genesis of tests is explained.
Further in the paper, selected results of conducted tests are discussed.
Changes in tested parameters were determined in the period of a 10-
month sewage storage.
Abstract: In this paper, we propose a novel algorithm for
delineating the endocardial wall from a human heart ultrasound scan.
We assume that the gray levels in the ultrasound images are
independent and identically distributed random variables with
different Rician Inverse Gaussian (RiIG) distributions. Both synthetic
and real clinical data will be used for testing the algorithm. Algorithm
performance will be evaluated using the expert radiologist evaluation
of a soft copy of an ultrasound scan during the scanning process and
secondly, doctor’s conclusion after going through a printed copy of
the same scan. Successful implementation of this algorithm should
make it possible to differentiate normal from abnormal soft tissue and
help disease identification, what stage the disease is in and how best
to treat the patient. We hope that an automated system that uses this
algorithm will be useful in public hospitals especially in Third World
countries where problems such as shortage of skilled radiologists and
shortage of ultrasound machines are common. These public hospitals
are usually the first and last stop for most patients in these countries.
Abstract: This paper analyzed the perception of e-commerce
application services by construction material traders in Malaysia.
Five attributes were tested: usability, reputation, trust, privacy and
familiarity. Study methodology consists of survey questionnaire and
statistical analysis that includes reliability analysis, factor analysis,
ANOVA and regression analysis. The respondents were construction
material traders, including hardware stores in Klang Valley, Kuala
Lumpur.
Findings support that usability and familiarity with e-commerce
services in Malaysia have insignificant influence on the acceptance of
e-commerce application. However, reputation, trust and privacy
attributes have significant influence on the choice of e-commerce
acceptance by construction material traders. E-commerce
applications studied included customer database, e-selling, emarketing,
e-payment, e-buying and online advertising. Assumptions
are made that traders have basic knowledge and exposure to ICT
services. i.e. internet service and computers. Study concludes that
reputation, privacy and trust are the three website attributes that
influence the acceptance of e-commerce by construction material
traders.
Abstract: In this paper, a new method of controlling position of AC Servomotor using Field Programmable Gate Array (FPGA). FPGA controller is used to generate direction and the number of pulses required to rotate for a given angle. Pulses are sent as a square wave, the number of pulses determines the angle of rotation and frequency of square wave determines the speed of rotation. The proposed control scheme has been realized using XILINX FPGA SPARTAN XC3S400 and tested using MUMA012PIS model Alternating Current (AC) servomotor. Experimental results show that the position of the AC Servo motor can be controlled effectively. KeywordsAlternating Current (AC), Field Programmable Gate Array (FPGA), Liquid Crystal Display (LCD).
Abstract: Assembly line balancing is a very important issue in
mass production systems due to production cost. Although many
studies have been done on this topic, but because assembly line
balancing problems are so complex they are categorized as NP-hard
problems and researchers strongly recommend using heuristic
methods. This paper presents a new heuristic approach called the
critical task method (CTM) for solving U-shape assembly line
balancing problems. The performance of the proposed heuristic
method is tested by solving a number of test problems and comparing
them with 12 other heuristics available in the literature to confirm the
superior performance of the proposed heuristic. Furthermore, to
prove the efficiency of the proposed CTM, the objectives are
increased to minimize the number of workstation (or equivalently
maximize line efficiency), and minimizing the smoothness index.
Finally, it is proven that the proposed heuristic is more efficient than
the others to solve the U-shape assembly line balancing problem.
Abstract: The applications on numbers are across-the-board that there is much scope for study. The chic of writing numbers is diverse and comes in a variety of form, size and fonts. Identification of Indian languages scripts is challenging problems. In Optical Character Recognition [OCR], machine printed or handwritten characters/numerals are recognized. There are plentiful approaches that deal with problem of detection of numerals/character depending on the sort of feature extracted and different way of extracting them. This paper proposes a recognition scheme for handwritten Hindi (devnagiri) numerals; most admired one in Indian subcontinent our work focused on a technique in feature extraction i.e. Local-based approach, a method using 16-segment display concept, which is extracted from halftoned images & Binary images of isolated numerals. These feature vectors are fed to neural classifier model that has been trained to recognize a Hindi numeral. The archetype of system has been tested on varieties of image of numerals. Experimentation result shows that recognition rate of halftoned images is 98 % compared to binary images (95%).
Abstract: Dynamic shear test on simulated phantom can be used
to validate magnetic resonance elastography (MRE) measurements.
Phantom gel has been usually utilized for the cell culture of cartilage
and soft tissue and also been used for mechanical property
characterization using imaging systems. The viscoelastic property of
the phantom would be important for dynamic experiments and
analyses. In this study, An axisymmetric FE model is presented for
determining the dynamic shear behaviour of brain simulated phantom
using ABAQUS. The main objective of this study was to investigate
the effect of excitation frequencies and boundary conditions on shear
modulus and shear viscosity in viscoelastic media.
Abstract: The response of King Abdulla Canal (KAC) water to the upgrade of As Samra Wastewater Treatment Plant which discharges its effluent to the Zarqa River is investigated. Time series quality data that extends between October 2005 and December 2009 obtained by a state of the art telemetric monitoring system were analyzed for COD, EC, TP and TN at two monitoring stations located upstream and downstream of the confluence of the Zarqa River with KAC. The samples- means and the t-test showed that there has been significant improvement in the quality of the KAC water for COD, and TP. However, the improvement in the TN was found statistically insignificant, whereas the EC of the KAC was unaffected by the upgrade. Comparing the selected parameters with the standards and guidelines for using treated wastewater in irrigation showed that the KAC water has improved towards meeting the required standards and guidelines for treated wastewater reuse in irrigation.
Abstract: Investigations of the unimolecular decomposition of
vinyl ethyl ether (VEE), vinyl propyl ether (VPE) and vinyl butyl
ether (VBE) have shown that activation of the molecule of a ether
results in formation of a cyclic construction - the transition state (TS),
which may lead to the displacement of the thermodynamic
equilibrium towards the reaction products. The TS is obtained by
applying energy minimization relative to the ground state of an ether
under the program MM2 when taking into account the hydrogen bond
formation between a hydrogen atom of alkyl residue and the extreme
atom of carbon of the vinyl group. The dissociation of TS up to the
products is studied by energy minimization procedure using the
mathematical program Gaussian. The obtained calculation data for
VEE testify that the decomposition of this ether may be conditioned
by hydrogen bond formation for two possible versions: when α- or β-
hydrogen atoms of the ethyl group are bound to carbon atom of the
vinyl group. Applying the same calculation methods to other ethers
(VPE and VBE) it is shown that only in the case of hydrogen bonding
between α-hydrogen atom of the alkyl residue and the extreme atom
of carbon of the vinyl group (αH---C) results in decay of theses
ethers.
Abstract: The fundamental aim of extended expansion concept is
to achieve higher work done which in turn leads to higher thermal
efficiency. This concept is compatible with the application of
turbocharger and LHR engine. The Low Heat Rejection engine was
developed by coating the piston crown, cylinder head inside with
valves and cylinder liner with partially stabilized zirconia coating of
0.5 mm thickness. Extended expansion in diesel engines is termed as
Miller cycle in which the expansion ratio is increased by reducing the
compression ratio by modifying the inlet cam for late inlet valve
closing. The specific fuel consumption reduces to an appreciable level
and the thermal efficiency of the extended expansion turbocharged
LHR engine is improved.
In this work, a thermodynamic model was formulated and
developed to simulate the LHR based extended expansion
turbocharged direct injection diesel engine. It includes a gas flow
model, a heat transfer model, and a two zone combustion model. Gas
exchange model is modified by incorporating the Miller cycle, by
delaying inlet valve closing timing which had resulted in considerable
improvement in thermal efficiency of turbocharged LHR engines. The
heat transfer model, calculates the convective and radiative heat
transfer between the gas and wall by taking into account of the
combustion chamber surface temperature swings. Using the two-zone
combustion model, the combustion parameters and the chemical
equilibrium compositions were determined. The chemical equilibrium
compositions were used to calculate the Nitric oxide formation rate by
assuming a modified Zeldovich mechanism. The accuracy of this
model is scrutinized against actual test results from the engine. The
factors which affect thermal efficiency and exhaust emissions were
deduced and their influences were discussed. In the final analysis it is
seen that there is an excellent agreement in all of these evaluations.
Abstract: In this paper, we present an innovative scheme of
blindly extracting message bits from an image distorted by an attack.
Support Vector Machine (SVM) is used to nonlinearly classify the
bits of the embedded message. Traditionally, a hard decoder is used
with the assumption that the underlying modeling of the Discrete
Cosine Transform (DCT) coefficients does not appreciably change.
In case of an attack, the distribution of the image coefficients is
heavily altered. The distribution of the sufficient statistics at the
receiving end corresponding to the antipodal signals overlap and a
simple hard decoder fails to classify them properly. We are
considering message retrieval of antipodal signal as a binary
classification problem. Machine learning techniques like SVM is
used to retrieve the message, when certain specific class of attacks is
most probable. In order to validate SVM based decoding scheme, we
have taken Gaussian noise as a test case. We generate a data set using
125 images and 25 different keys. Polynomial kernel of SVM has
achieved 100 percent accuracy on test data.
Abstract: This paper presents a new heuristic algorithm for the classical symmetric traveling salesman problem (TSP). The idea of the algorithm is to cut a TSP tour into overlapped blocks and then each block is improved separately. It is conjectured that the chance of improving a good solution by moving a node to a position far away from its original one is small. By doing intensive search in each block, it is possible to further improve a TSP tour that cannot be improved by other local search methods. To test the performance of the proposed algorithm, computational experiments are carried out based on benchmark problem instances. The computational results show that algorithm proposed in this paper is efficient for solving the TSPs.
Abstract: In this era of technology, fueled by the pervasive usage of the internet, security is a prime concern. The number of new attacks by the so-called “bots", which are automated programs, is increasing at an alarming rate. They are most likely to attack online registration systems. Technology, called “CAPTCHA" (Completely Automated Public Turing test to tell Computers and Humans Apart) do exist, which can differentiate between automated programs and humans and prevent replay attacks. Traditionally CAPTCHA-s have been implemented with the challenge involved in recognizing textual images and reproducing the same. We propose an approach where the visual challenge has to be read out from which randomly selected keywords are used to verify the correctness of spoken text and in turn detect the presence of human. This is supplemented with a speaker recognition system which can identify the speaker also. Thus, this framework fulfills both the objectives – it can determine whether the user is a human or not and if it is a human, it can verify its identity.
Abstract: Economic freedoms, most emphasized issue in the recent years, are considered to affect economic growth and performance via institutional structure. In this context, a model that includes Turkey and Middle East Countries, and where the effects of economic freedom on growth are examined, was formed. For the groups of countries determined, in the study carried out by using the dataset belonging the period of 2004 - 2009, between economic freedoms and growth, a negative relationship was observed as group. In the sense of individual effects, it was identified that there was a positive relationship in terms of some Middle East Countries and Turkey.