Abstract: The wireless adhoc network is comprised of wireless
node which can move freely and are connected among themselves
without central infrastructure. Due to the limited transmission range
of wireless interfaces, in most cases communication has to be relayed
over intermediate nodes. Thus, in such multihop network each node
(also called router) is independent, self-reliant and capable to route
the messages over the dynamic network topology. Various protocols
are reported in this field and it is very difficult to decide the best one.
A key issue in deciding which type of routing protocol is best for
adhoc networks is the communication overhead incurred by the
protocol. In this paper STAR a table driven and DSR on demand
protocols based on IEEE 802.11 are analyzed for their performance
on different performance measuring metrics versus varying traffic
CBR load using QualNet 5.0.2 network simulator.
Abstract: In this paper, the robust exponential stability problem of discrete-time uncertain stochastic neural networks with timevarying delays is investigated. By introducing a new augmented Lyapunov function, some delay-dependent stable results are obtained in terms of linear matrix inequality (LMI) technique. Compared with some existing results in the literature, the conservatism of the new criteria is reduced notably. Three numerical examples are provided to demonstrate the less conservatism and effectiveness of the proposed method.
Abstract: In this paper, the differential quadrature method is applied to simulate natural convection in an inclined cubic cavity using velocity-vorticity formulation. The numerical capability of the present algorithm is demonstrated by application to natural convection in an inclined cubic cavity. The velocity Poisson equations, the vorticity transport equations and the energy equation are all solved as a coupled system of equations for the seven field variables consisting of three velocities, three vorticities and temperature. The coupled equations are simultaneously solved by imposing the vorticity definition at boundary without requiring the explicit specification of the vorticity boundary conditions. Test results obtained for an inclined cubic cavity with different angle of inclinations for Rayleigh number equal to 103, 104, 105 and 106 indicate that the present coupled solution algorithm could predict the benchmark results for temperature and flow fields. Thus, it is convinced that the present formulation is capable of solving coupled Navier-Stokes equations effectively and accurately.
Abstract: Noise has adverse effect on human health and
comfort. Noise not only cause hearing impairment, but it also acts as
a causal factor for stress and raising systolic pressure. Additionally it
can be a causal factor in work accidents, both by marking hazards
and warning signals and by impeding concentration. Industry
workers also suffer psychological and physical stress as well as
hearing loss due to industrial noise. This paper proposes an approach
to enable engineers to point out quantitatively the noisiest source for
modification, while multiple machines are operating simultaneously.
The model with the point source and spherical radiation in a free field
was adopted to formulate the problem. The procedure works very
well in ideal cases (point source and free field). However, most of the
industrial noise problems are complicated by the fact that the noise is
confined in a room. Reflections from the walls, floor, ceiling, and
equipment in a room create a reverberant sound field that alters the
sound wave characteristics from those for the free field. So the model
was validated for relatively low absorption room at NIT Kurukshetra
Central Workshop. The results of validation pointed out that the
estimated sound power of noise sources under simultaneous
conditions were on lower side, within the error limits 3.56 - 6.35 %.
Thus suggesting the use of this methodology for practical
implementation in industry. To demonstrate the application of the
above analytical procedure for estimating the sound power of noise
sources under simultaneous operating conditions, a manufacturing
facility (Railway Workshop at Yamunanagar, India) having five
sound sources (machines) on its workshop floor is considered in this
study. The findings of the case study had identified the two most
effective candidates (noise sources) for noise control in the Railway
Workshop Yamunanagar, India. The study suggests that the
modification in the design and/or replacement of these two identified
noisiest sources (machine) would be necessary so as to achieve an
effective reduction in noise levels. Further, the estimated data allows
engineers to better understand the noise situations of the workplace
and to revise the map when changes occur in noise level due to a
workplace re-layout.
Abstract: Wavelet transform has been extensively used in
machine fault diagnosis and prognosis owing to its strength to deal
with non-stationary signals. The existing Wavelet transform based
schemes for fault diagnosis employ wavelet decomposition of the
entire vibration frequency which not only involve huge
computational overhead in extracting the features but also increases
the dimensionality of the feature vector. This increase in the
dimensionality has the tendency to 'over-fit' the training data and
could mislead the fault diagnostic model. In this paper a novel
technique, envelope wavelet packet transform (EWPT) is proposed in
which features are extracted based on wavelet packet transform of the
filtered envelope signal rather than the overall vibration signal. It not
only reduces the computational overhead in terms of reduced number
of wavelet decomposition levels and features but also improves the
fault detection accuracy. Analytical expressions are provided for the
optimal frequency resolution and decomposition level selection in
EWPT. Experimental results with both actual and simulated machine
fault data demonstrate significant gain in fault detection ability by
EWPT at reduced complexity compared to existing techniques.
Abstract: The increasing industrialization and motorization of the world has led to a steep rise for the demand of petroleum-based fuels. Petroleum-based fuels are obtained from limited reserves. These finite reserves are highly concentrated in certain regions of the world. Therefore, those countries not having these resources are facing energy/foreign exchange crisis, mainly due to the import of crude petroleum. Hence, it is necessary to look for alternative fuels which can be produced from resources available locally within the country such as alcohol, biodiesel, vegetable oils etc. Biodiesel is a renewable, domestically produced fuel that has been shown to reduce particulate, hydrocarbon, and carbon monoxide emissions from combustion. In the present study an experimental investigation on emission characteristic of a liquid burner system operating on several percentage of biodiesel and gas oil is carried out. Samples of exhaust gas are analysed with Testo 350 Xl. The results show that biodiesel can lower some pollutant such as CO, CO2 and particulate matter emissions while NOx emission would increase in comparison with gas oil. The results indicate there may be benefits to using biodiesel in industrial processes.
Abstract: Brick is one of the most common masonry units used as building material. Due to the demand, different types of waste have been investigated to be incorporated into the bricks. Many types of sludge have been incorporated in fired clay brick for example marble sludge, stone sludge, water sludge, sewage sludge, and ceramic sludge. The utilization of these waste materials in fired clay bricks usually has positive effects on the properties such as lightweight bricks with improved shrinkage, porosity, and strength. This paper reviews on utilization of different types of sludge wastes into fired clay bricks. Previous investigations have demonstrated positive effects on the physical and mechanical properties as well as less impact towards the environment. Thus, the utilizations of sludge waste could produce a good quality of brick and could be one of alternative disposal methods for the sludge wastes.
Abstract: We introduce the notion of commuting regular Γ-
semiring and discuss some properties of commuting regular Γ-
semiring. We also obtain a necessary and sufficient condition for
Γ-semiring to possess commuting regularity.
Abstract: Interactive push VOD system is a new kind of system
that incorporates push technology and interactive technique. It can
push movies to users at high speeds at off-peak hours for optimal
network usage so as to save bandwidth. This paper presents effective
software-based solution for processing mass downstream data at
terminals of interactive push VOD system, where the service can
download movie according to a viewer-s selection. The downstream
data is divided into two catalogs: (1) the carousel data delivered
according to DSM-CC protocol; (2) IP data delivered according to
Euro-DOCSIS protocol. In order to accelerate download speed and
reduce data loss rate at terminals, this software strategy introduces
caching, multi-thread and resuming mechanisms. The experiments
demonstrate advantages of the software-based solution.
Abstract: The possibilities of mobile technology generate new
demands for vocational teacher trainers to transform their approach
to work and to incorporate its usage into their ordinary educational
practice. This paper presents findings of a focus discussion group
(FDG) session on the usage of iPads within a school of vocational
teacher education (SoVTE). It aims to clarify how the teacher
trainers are using iPads and what has changed in their work during
the usage of iPads. The analytical framework bases on content
analysis and expansive learning cycle. It was not only found what
kind of a role iPads played in their daily practices but it brought also
into attention how a cultural change regarding the usage of social
media and mobile technology was desperately needed in the whole
work community. Thus, the FGD was abducted for developing the
knowledge practices of the community of the SoVTE.
Abstract: Protein 3D structure prediction has always been an
important research area in bioinformatics. In particular, the
prediction of secondary structure has been a well-studied research
topic. Despite the recent breakthrough of combining multiple
sequence alignment information and artificial intelligence algorithms
to predict protein secondary structure, the Q3 accuracy of various
computational prediction algorithms rarely has exceeded 75%. In a
previous paper [1], this research team presented a rule-based method
called RT-RICO (Relaxed Threshold Rule Induction from Coverings)
to predict protein secondary structure. The average Q3 accuracy on
the sample datasets using RT-RICO was 80.3%, an improvement
over comparable computational methods. Although this demonstrated
that RT-RICO might be a promising approach for predicting
secondary structure, the algorithm-s computational complexity and
program running time limited its use. Herein a parallelized
implementation of a slightly modified RT-RICO approach is
presented. This new version of the algorithm facilitated the testing of
a much larger dataset of 396 protein domains [2]. Parallelized RTRICO
achieved a Q3 score of 74.6%, which is higher than the
consensus prediction accuracy of 72.9% that was achieved for the
same test dataset by a combination of four secondary structure
prediction methods [2].
Abstract: Current spectrums of a high power induction machine was calculated for the cases of full symmetry, static and dynamic eccentricity. The calculations involve integration of 93 electrical plus four mechanical ordinary differential equations. Electrical equations account for variable inductances affected by slotting and eccentricities. The calculations were followed by Fourier analysis of the stator currents in steady state operation. The paper presents the stator current spectrums in full symmetry, static and dynamic eccentricity cases, and demonstrates the harmonics present in each case. The effect of dynamic eccentricity is demonstrating via comparing the current spectrums related to dynamic eccentricity cases with the full symmetry one. The paper includes one case study, refers to dynamic eccentricity, to present the spectrum of the measured current and demonstrate the existence of the harmonics related to dynamic eccentricity. The zooms of current spectrums around the main slot harmonic zone are included to simplify the comparison and prove the existence of the dynamic eccentricity harmonics in both calculated and measured current spectrums.
Abstract: The use of a Bayesian Hierarchical Model (BHM) to interpret breath measurements obtained during a 13C Octanoic Breath Test (13COBT) is demonstrated. The statistical analysis was implemented using WinBUGS, a commercially available computer package for Bayesian inference. A hierarchical setting was adopted where poorly defined parameters associated with a delayed Gastric Emptying (GE) were able to "borrow" strength from global distributions. This is proved to be a sufficient tool to correct model's failures and data inconsistencies apparent in conventional analyses employing a Non-linear least squares technique (NLS). Direct comparison of two parameters describing gastric emptying ng ( tlag -lag phase, t1/ 2 -half emptying time) revealed a strong correlation between the two methods. Despite our large dataset ( n = 164 ), Bayesian modeling was fast and provided a successful fitting for all subjects. On the contrary, NLS failed to return acceptable estimates in cases where GE was delayed.
Abstract: This study considers priorities of primary goals to increase policy efficiency of Green ICT. Recently several studies have been published that address how IT is linked to climate change. However, most of the previous studies are limited to Green ICT industrial statute and policy directions. This paper present Green ICT
policy making processes systematically. As a result of the analysis of
Korean Green ICT policy, the following emerged as important to accomplish for Green ICT policy: eco-friendliness, technology evolution, economic efficiency, energy efficiency, and stable supply
of energy. This is an initial study analyzing Green ICT policy, which provides an academic framework that can be used a guideline to
establish Green ICT policy.
Abstract: The research objective aims to search information about storytelling and fable associated with fireflies in Amphawa community, in order to design and create a story book which is appropriate for the interests of children in early childhood. This book should help building the development of learning about the natural environment, imagination, and creativity among children, which then, brings about the promotion of the development, conservation and dissemination of cultural values and uniqueness of the Amphawa community. The population used in this study were 30 students in early childhood aged between 6-8 years-old, grade 1-3 from the Demonstration School of Suan Sunandha Rajabhat University. The method used for this study was purposive sampling and the research conducted by the query and analysis of data from both the document and the narrative field tales and fable associated with the fireflies of Amphawa community. Then, using the results to synthesize and create a conceptual design in a form of 8 visual images which were later applied to 1 illustrated children’s book and presented to the experts to evaluate and test this media.
Abstract: In this paper, the local grid refinement is focused by
using a nested grid technique. The Cartesian grid numerical method is
developed for simulating unsteady, viscous, incompressible flows
with complex immersed boundaries. A finite volume method is used in
conjunction with a two-step fractional-step procedure. The key aspects
that need to be considered in developing such a nested grid solver are
imposition of interface conditions on the inter-block and accurate
discretization of the governing equation in cells that are with the
inter-block as a control surface. A new interpolation procedure is
presented which allows systematic development of a spatial
discretization scheme that preserves the spatial accuracy of the
underlying solver. The present nested grid method has been tested by
two numerical examples to examine its performance in the two
dimensional problems. The numerical examples include flow past a
circular cylinder symmetrically installed in a Channel and flow past
two circular cylinders with different diameters. From the numerical
experiments, the ability of the solver to simulate flows with
complicated immersed boundaries is demonstrated and the nested grid
approach can efficiently speed up the numerical solutions.
Abstract: We demonstrate a 40Gbps downstream PON
transmission based on PM-QPSK modulation using commercial DFB
lasers without optical amplifier in the ODN, obtaining 40dB power
budget. We discuss this solution within NG-PON2 architectures.
Abstract: The paper presents an investigation into the role of virtual reality and web technologies in the field of distance education. Within this frame, special emphasis is given on the building of web-based virtual learning environments so as to successfully fulfill their educational objectives. In particular, basic pedagogical methods are studied, focusing mainly on the efficient preparation, approach and presentation of learning content, and specific designing rules are presented considering the hypermedia, virtual and educational nature of this kind of applications. The paper also aims to highlight the educational benefits arising from the use of virtual reality technology in medicine and study the emerging area of web-based medical simulations. Finally, an innovative virtual reality environment for distance education in medicine is demonstrated. The proposed environment reproduces conditions of the real learning process and enhances learning through a real-time interactive simulator.
Abstract: Natural gas flow contains undesirable solid particles,
liquid condensation, and/or oil droplets and requires reliable
removing equipment to perform filtration. Recent natural gas
processing applications are demanded compactness and reliability of
process equipment. Since conventional means are sophisticated in
design, poor in efficiency, and continue lacking robust, a supersonic
nozzle has been introduced as an alternative means to meet such
demands.
A 3-D Convergent-Divergent Nozzle is simulated using
commercial Code for pressure ratio (NPR) varies from 1.2 to 2. Six
different shapes of nozzle are numerically examined to illustrate the
position of shock-wave as such spot could be considered as a
benchmark of particle separation. Rectangle, triangle, circular,
elliptical, pentagon, and hexagon nozzles are simulated using Fluent
Code with all have same cross-sectional area.
The simple one-dimensional inviscid theory does not describe the
actual features of fluid flow precisely as it ignores the impact of
nozzle configuration on the flow properties. CFD Simulation results,
however, show that nozzle geometry influences the flow structures
including location of shock wave.
The CFD analysis predicts shock appearance when p01/pa>1.2 for
almost all geometry and locates at the lower area ratio (Ae/At).
Simulation results showed that shock wave in Elliptical nozzle has
the farthest distance from the throat among the others at relatively
small NPR. As NPR increases, hexagon would be the farthest. The
numerical result is compared with available experimental data and
has shown good agreement in terms of shock location and flow
structure.
Abstract: SQL injection on web applications is a very popular
kind of attack. There are mechanisms such as intrusion detection
systems in order to detect this attack. These strategies often rely on
techniques implemented at high layers of the application but do not
consider the low level of system calls. The problem of only
considering the high level perspective is that an attacker can
circumvent the detection tools using certain techniques such as URL
encoding. One technique currently used for detecting low-level
attacks on privileged processes is the tracing of system calls. System
calls act as a single gate to the Operating System (OS) kernel; they
allow catching the critical data at an appropriate level of detail. Our
basic assumption is that any type of application, be it a system
service, utility program or Web application, “speaks” the language of
system calls when having a conversation with the OS kernel. At this
level we can see the actual attack while it is happening. We conduct
an experiment in order to demonstrate the suitability of system call
analysis for detecting SQL injection. We are able to detect the attack.
Therefore we conclude that system calls are not only powerful in
detecting low-level attacks but that they also enable us to detect highlevel
attacks such as SQL injection.