Abstract: In order to better understand the long term
implications of the grout wear failure mode in large-diameter plainsided
grouted connections, a numerical model has been developed
and calibrated that can take advantage of existing operational plant
data to predict the wear accumulation for the actual load conditions
experienced over a given period, thus limiting the requirement for
expensive monitoring systems. This model has been derived and
calibrated based on site structural condition monitoring (SCM) data
and supervisory control and data acquisition systems (SCADA) data
for two operational wind turbine generator substructures afflicted
with this challenge, along with experimentally derived wear rates.
Abstract: A mixed method by combining modified pole
clustering technique and modified cauer continued fraction is
proposed for reducing the order of the large-scale dynamic systems.
The denominator polynomial of the reduced order model is obtained
by using modified pole clustering technique while the coefficients of
the numerator are obtained by modified cauer continued fraction.
This method generated 'k' number of reduced order models for kth
order reduction. The superiority of the proposed method has been
elaborated through numerical example taken from the literature and
compared with few existing order reduction methods.
Abstract: A capacity spectrum method (CSM), one of methodologies to evaluate seismic fragilities of building structures, has been long recognized as the most convenient method, even if it contains several limitations to predict the seismic response of structures of interest. This paper proposes the procedure to estimate seismic fragility curves using an incremental dynamic analysis (IDA) rather than the method adopting a CSM. To achieve the research purpose, this study compares the seismic fragility curves of a 5-story reinforced concrete (RC) moment frame obtained from both methods; an IDA method and aCSM. Both seismic fragility curves are similar in slight and moderate damage states whereas the fragility curve obtained from the IDA method presents less variation (or uncertainties) in extensive and complete damage states. This is due to the fact that the IDA method can properly capture the structural response beyond yielding rather than the CSM and can directly calculate higher mode effects. From these observations, the CSM could overestimate seismic vulnerabilities of the studied structure in extensive or complete damage states.
Abstract: For cycling, the analysis of the pedal force is one of the
important factors in the study of exercise ability assessment and
overuse injuries. In past studies, a two-axis measurement sensor was
used at the sagittal plane to measure the force only in the anterior,
posterior, and vertical directions and to analyze the loss of force and
the injury on the frontal plane due to the forces in the right and left
directions. In this study, which is a basic study on diverse analyses of
the pedal force that consider the forces on the sagittal plane and the
frontal plane, a three-axis pedal force measurement sensor was
developed to measure the anterior-posterior (Fx), medio-lateral (Fz),
and vertical (Fy) forces. The sensor was fabricated with a size and
shape similar to those of the general flat pedal, and had a 550g weight
that allowed smooth pedaling. Its measurement range was ±1000 N for
Fx and Fz and ±2000 N for Fy, and its non-linearity, hysteresis, and
repeatability were approximately 0.5%. The data were sampled at
1000 Hz using a signal collector. To use the developed sensor, the
pedaling efficiency (index of efficiency, IE) and the range of left and
right (medio-lateral, ML) forces were measured with two seat heights
(low and high). The results of the measurement showed that the IE was
higher and the force range in the ML direction was lower with the high
position than with the low position. The developed measurement
sensor and its application results will be useful in understanding and
explaining the complicated pedaling technique, and will enable
diverse kinematic analyses of the pedal force on the sagittal plane and
the frontal plane.
Abstract: The effect of the inclusion of thyme and rosemary
essential oils into chitosan films, as well as the microbiological and
physical properties when storing chitosan film with and without the
mentioned inclusion was studied. The film forming solution was
prepared by dissolving chitosan (2%, w/v), polysorbate 80 (4% w/w
CH) and glycerol (16% w/w CH) in aqueous lactic acid solutions
(control). The thyme (TEO) and rosemary (REO) essential oils (EOs)
were included 1:1 w/w (EOs:CH) on their combination 50/50
(TEO:REO). The films were stored at temperatures of 5, 20, 33°C
and a relative humidity of 75% during four weeks. The films with
essential oil inclusion did not show an antimicrobial activity against
strains. This behavior could be explained because the chitosan only
inhibits the growth of microorganisms in direct contact with the
active sites. However, the inhibition capacity of TEO was higher than
the REO and a synergic effect between TEO:REO was found for S.
enteritidis strains in the chitosan solution.
Some physical properties were modified by the inclusion of
essential oils. The addition of essential oils does not affect the
mechanical properties (tensile strength, elongation at break, puncture
deformation), the water solubility, the swelling index nor the DSC
behavior. However, the essential oil inclusion can significantly
decrease the thickness, the moisture content, and the L* value of
films whereas the b* value increased due to molecular interactions
between the polymeric matrix, the loosing of the structure, and the
chemical modifications. On the other hand, the temperature and time
of storage changed some physical properties on the chitosan films.
This could have occurred because of chemical changes, such as
swelling in the presence of high humidity air and the reacetylation of
amino groups. In the majority of cases, properties such as moisture
content, tensile strength, elongation at break, puncture deformation,
a*, b*, chrome, 7E increased whereas water resistance, swelling
index, L*, and hue angle decreased.
Abstract: The article deals with one of the most significant
issues concerning the functioning of the public sector in the European
Union. The objectives of good governance were formulated by the
EU itself and also the Scholars in reaction to the discussion that
started a decade ago and concerned the role of the government in 21st
century, the future of integration processes and globalization
challenges in Europe. Currently, the concept of good governance is
mainly associated with the improvement of management of public
policies in the European Union, concerning both domestic and EU
policies. However, it goes beyond the issues of state capacity and
effectiveness of management. Good governance relates also to
societal participation in the public administration and verification of
decisions made in public authorities’ (including public
administration). Indirectly, the concept and practice of good
governance are connected to societal legitimisation of public bodies
in the European Union.
Abstract: Chemical Reaction Optimization (CRO) is an
optimization metaheuristic inspired by the nature of chemical
reactions as a natural process of transforming the substances from
unstable to stable states. Starting with some unstable molecules with
excessive energy, a sequence of interactions takes the set to a state of
minimum energy. Researchers reported successful application of the
algorithm in solving some engineering problems, like the quadratic
assignment problem, with superior performance when compared with
other optimization algorithms. We adapted this optimization
algorithm to the Printed Circuit Board Drilling Problem (PCBDP)
towards reducing the drilling time and hence improving the PCB
manufacturing throughput. Although the PCBDP can be viewed as
instance of the popular Traveling Salesman Problem (TSP), it has
some characteristics that would require special attention to the
transactions that explore the solution landscape. Experimental test
results using the standard CROToolBox are not promising for
practically sized problems, while it could find optimal solutions for
artificial problems and small benchmarks as a proof of concept.
Abstract: A thermosyphon system is a heat transfer loop which
operates on the basis of gravity and buoyancy forces. It guarantees a
good reliability and low maintenance cost as it does not involve any
mechanical pump. Therefore, it can be used in many industrial
applications such as refrigeration and air conditioning, electronic
cooling, nuclear reactors, geothermal heat extraction, etc. But flow
instabilities and loop configuration are the major problems in this
system. Several previous researchers studied that stabilities can be
suppressed by using nanofluids as loop fluid. In the present study a
rectangular thermosyphon loop with end heat exchangers are
considered for the study. This configuration is more appropriate for
many practical applications such as solar water heater, geothermal
heat extraction, etc. In the present work, steady-state analysis is
carried out on thermosyphon loop with parallel flow coaxial heat
exchangers at heat source and heat sink. In this loop nanofluid is
considered as the loop fluid and water is considered as the external
fluid in both hot and cold heat exchangers. For this analysis onedimensional
homogeneous model is developed. In this model,
conservation equations like conservation of mass, momentum, energy
are discretized using finite difference method. A computer code is
written in MATLAB to simulate the flow in thermosyphon loop. A
comparison in terms of heat transfer is made between water and
nanofluid as working fluids in the loop.
Abstract: A Distributed Denial of Service (DDoS) attack is a
major threat to cyber security. It originates from the network layer or
the application layer of compromised/attacker systems which are
connected to the network. The impact of this attack ranges from the
simple inconvenience to use a particular service to causing major
failures at the targeted server. When there is heavy traffic flow to a
target server, it is necessary to classify the legitimate access and
attacks. In this paper, a novel method is proposed to detect DDoS
attacks from the traces of traffic flow. An access matrix is created
from the traces. As the access matrix is multi dimensional, Principle
Component Analysis (PCA) is used to reduce the attributes used for
detection. Two classifiers Naive Bayes and K-Nearest neighborhood
are used to classify the traffic as normal or abnormal. The
performance of the classifier with PCA selected attributes and actual
attributes of access matrix is compared by the detection rate and
False Positive Rate (FPR).
Abstract: In this paper, the transient device performance analysis
of n-type Gate Inside JunctionLess Transistor (GI-JLT) has been
evaluated. 3-D Bohm Quantum Potential (BQP) transport device
simulation has been used to evaluate the delay and power dissipation
performance. GI-JLT has a number of desirable device parameters
such as reduced propagation delay, dynamic power dissipation,
power and delay product, intrinsic gate delay and energy delay
product as compared to Gate-all-around transistors GAA-JLT. In
addition to this, various other device performance parameters namely,
on/off current ratio, short channel effects (SCE), transconductance
Generation Factor (TGF) and unity gain cut-off frequency (fT ) and
subthreshold slope (SS) of the GI-JLT and GAA-JLT have been
analyzed and compared. GI-JLT shows better device performance
characteristics than GAA-JLT for low power and high frequency
applications, because of its larger gate electrostatic control on the
device operation.
Abstract: The transition period of Kosovo society brought
fundamental changes in all the spheres of organizing life. This was
the period when also in the cultural tradition the biggest movement
and an emerging from ‘isolation’ or from the ‘shell’ occurred.
Transformation of the traditional and embracing of the modern began
here. The same was experienced and is currently being experienced
also by Gjakova and its surrounding which is historically renowned
for its great tradition and culture.
The population of this region is actually facing a transition from
the traditional system into the modern one and quite often with huge
leaps.
These ‘movements’ or ‘evolutions’ of the society of this region,
besides the numerous positive things it ‘harvested’, also brought
things that do not at all correspond with their tradition as well as new
criminal occurrences which in the past were not present in this area.
Furthermore, some of the ‘new’ behaviors that are embraced from
other ‘cultures’ and ‘civilizations’, and which are often exceeded, are
quite perturbing. The security situation is also worrying, particularly
following the appearance of some new criminal occurrences.
Therefore, with this research paper we will strive to analyze the
new cultural “intersections” as well as the nature of the origin of
some new very worrying criminal occurrences. We will present there
also some factors inciting into these occurrences, which were
confessed by the persons involved in these criminal occurrences and
who come from this very region.
Abstract: In this paper, we propose a method for three-dimensional
(3-D)-model indexing based on defining a new
descriptor, which we call new descriptor using spherical harmonics.
The purpose of the method is to minimize, the processing time on the
database of objects models and the searching time of similar objects
to request object.
Firstly we start by defining the new descriptor using a new
division of 3-D object in a sphere. Then we define a new distance
which will be used in the search for similar objects in the database.
Abstract: In this paper, a system of linear matrix equations
is considered. A new necessary and sufficient condition for the
consistency of the equations is derived by means of the generalized
singular-value decomposition, and the explicit representation of the
general solution is provided.
Abstract: Given the dynamic nature of the higher education
landscape, induction programmes for new academics has become the
norm nowadays to support academics negotiate these rough terrain.
This study investigates an induction programme for new academics
in a higher education institution to establish what difference it has
made to participants. The findings revealed that the benefits ranged
from creating safe spaces for collaboration and networking to
fostering reflective practice and contributing to the scholarship of
teaching and learning. The study also revealed that some of the
intentions of the programme may not have been achieved, for
example transformative learning. This led to questioning whether this
intention is an appropriate one given the short duration of the
programme and the long, drawn out process of transformation. It may
be concluded that the academic induction programme in this study
serves to sow the seeds for transformative learning through fostering
critically reflective practice. Recommendations for further study
could include long term impact of the programme on student learning
and success, these being the core business of higher education. It is
also recommended that in addition to an induction programme, the
university invests in a mentoring programme for new staff and extend
the support for academics in order to sustain critical reflection and
which may contribute to transformative educational practice.
Abstract: Wireless mesh networking is rapidly gaining in
popularity with a variety of users: from municipalities to enterprises,
from telecom service providers to public safety and military
organizations. This increasing popularity is based on two basic facts:
ease of deployment and increase in network capacity expressed in
bandwidth per footage; WMNs do not rely on any fixed
infrastructure. Many efforts have been used to maximizing
throughput of the network in a multi-channel multi-radio wireless
mesh network. Current approaches are purely based on either static or
dynamic channel allocation approaches. In this paper, we use a
hybrid multichannel multi radio wireless mesh networking
architecture, where static and dynamic interfaces are built in the
nodes. Dynamic Adaptive Channel Allocation protocol (DACA), it
considers optimization for both throughput and delay in the channel
allocation. The assignment of the channel has been allocated to be codependent
with the routing problem in the wireless mesh network and
that should be based on passage flow on every link. Temporal and
spatial relationship rises to re compute the channel assignment every
time when the pattern changes in mesh network, channel assignment
algorithms assign channels in network. In this paper a computing
path which captures the available path bandwidth is the proposed
information and the proficient routing protocol based on the new path
which provides both static and dynamic links. The consistency
property guarantees that each node makes an appropriate packet
forwarding decision and balancing the control usage of the network,
so that a data packet will traverse through the right path.
Abstract: The main aim of a communication system is to
achieve maximum performance. In Cognitive Radio any user or
transceiver has ability to sense best suitable channel, while channel is
not in use. It means an unlicensed user can share the spectrum of a
licensed user without any interference. Though, the spectrum sensing
consumes a large amount of energy and it can reduce by applying
various artificial intelligent methods for determining proper spectrum
holes. It also increases the efficiency of Cognitive Radio Network
(CRN). In this survey paper we discuss the use of different learning
models and implementation of Artificial Neural Network (ANN) to
increase the learning and decision making capacity of CRN without
affecting bandwidth, cost and signal rate.
Abstract: Given a graph G. A cycle of G is a sequence of
vertices of G such that the first and the last vertices are the same.
A hamiltonian cycle of G is a cycle containing all vertices of G.
The graph G is k-ordered (resp. k-ordered hamiltonian) if for any
sequence of k distinct vertices of G, there exists a cycle (resp.
hamiltonian cycle) in G containing these k vertices in the specified
order. Obviously, any cycle in a graph is 1-ordered, 2-ordered and 3-
ordered. Thus the study of any graph being k-ordered (resp. k-ordered
hamiltonian) always starts with k = 4. Most studies about this topic
work on graphs with no real applications. To our knowledge, the
chordal ring families were the first one utilized as the underlying
topology in interconnection networks and shown to be 4-ordered.
Furthermore, based on our computer experimental results, it was
conjectured that some of them are 4-ordered hamiltonian. In this
paper, we intend to give some possible directions in proving the
conjecture.
Abstract: Future flood can be predicted using the probable
maximum flood (PMF). PMF is calculated using the historical
discharge or rainfall data considering the other climatic parameters
remaining stationary. However climate is changing globally and the
key climatic variables are temperature, evaporation, rainfall and sea
level rise are likely to change. To develop scenarios to a basin or
catchment scale these important climatic variables should be
considered. Nowadays scenario based on climatic variables is more
suitable than PMF. Six scenarios were developed for a large Fitzroy
basin and presented in this paper.
Abstract: In-memory database systems are becoming popular
due to the availability and affordability of sufficiently large RAM and
processors in modern high-end servers with the capacity to manage
large in-memory database transactions. While fast and reliable inmemory
systems are still being developed to overcome cache misses,
CPU/IO bottlenecks and distributed transaction costs, disk-based data
stores still serve as the primary persistence. In addition, with the
recent growth in multi-tenancy cloud applications and associated
security concerns, many organisations consider the trade-offs and
continue to require fast and reliable transaction processing of diskbased
database systems as an available choice. For these
organizations, the only way of increasing throughput is by improving
the performance of disk-based concurrency control. This warrants a
hybrid database system with the ability to selectively apply an
enhanced disk-based data management within the context of inmemory
systems that would help improve overall throughput.
The general view is that in-memory systems substantially
outperform disk-based systems. We question this assumption and
examine how a modified variation of access invariance that we call
enhanced memory access, (EMA) can be used to allow very high
levels of concurrency in the pre-fetching of data in disk-based
systems. We demonstrate how this prefetching in disk-based systems
can yield close to in-memory performance, which paves the way for
improved hybrid database systems. This paper proposes a novel EMA
technique and presents a comparative study between disk-based EMA
systems and in-memory systems running on hardware configurations
of equivalent power in terms of the number of processors and their
speeds. The results of the experiments conducted clearly substantiate
that when used in conjunction with all concurrency control
mechanisms, EMA can increase the throughput of disk-based systems
to levels quite close to those achieved by in-memory system. The
promising results of this work show that enhanced disk-based
systems facilitate in improving hybrid data management within the
broader context of in-memory systems.
Abstract: Cost of governance in Nigeria has become a challenge
to development and concern to practitioners and scholars alike in the
field of business and social science research. In the 2010 national
budget of NGN4.6 trillion or USD28.75billion for instance, only a
pantry sum of NGN1.8trillion or USD11.15billion was earmarked for
capital expenditure. Similarly, in 2013, out of a total national budget
of NGN4.92trillion or USD30.75billion, only the sum of
NGN1.50trllion or USD9.38billion was voted for capital expenditure.
Therefore, based on the data sourced from the Nigerian Office of
Statistics, Central bank of Nigeria Statistical Bulletin as well as from
the United Nations Development Programme, this study examined
the causes of high cost of governance in Nigeria. It found out that the
high cost of governance in the country is in the interest of the ruling
class, arising from their unethical behaviour – corrupt practices and
the poor management of public resources. As a result, the study
recommends the need to intensify the war against corruption and
mismanagement of public resources by government officials as
possible solution to overcome the high cost of governance in Nigeria.
This could be achieved by strengthening the constitutional powers of
the various anti-corruption agencies in the area of arrest, investigation
and prosecution of offenders without the interference of the executive
arm of government either at the local, state or federal level.