Abstract: Research on damage of gears and gear pairs using
vibration signals remains very attractive, because vibration signals
from a gear pair are complex in nature and not easy to interpret.
Predicting gear pair defects by analyzing changes in vibration signal
of gears pairs in operation is a very reliable method. Therefore, a
suitable vibration signal processing technique is necessary to extract
defect information generally obscured by the noise from dynamic
factors of other gear pairs.This article presents the value of cepstrum
analysis in vehicle gearbox fault diagnosis. Cepstrum represents the
overall power content of a whole family of harmonics and sidebands
when more than one family of sidebands is present at the same time.
The concept for the measurement and analysis involved in using the
technique are briefly outlined. Cepstrum analysis is used for detection
of an artificial pitting defect in a vehicle gearbox loaded with
different speeds and torques. The test stand is equipped with three
dynamometers; the input dynamometer serves asthe internal
combustion engine, the output dynamometers introduce the load on
the flanges of the output joint shafts. The pitting defect is
manufactured on the tooth side of a gear of the fifth speed on the
secondary shaft. Also, a method for fault diagnosis of gear faults is
presented based on order Cepstrum. The procedure is illustrated with
the experimental vibration data of the vehicle gearbox. The results
show the effectiveness of Cepstrum analysis in detection and
diagnosis of the gear condition.
Abstract: In 3D-wavelet video coding framework temporal
filtering is done along the trajectory of motion using Motion
Compensated Temporal Filtering (MCTF). Hence computationally
efficient motion estimation technique is the need of MCTF. In this
paper a predictive technique is proposed in order to reduce the
computational complexity of the MCTF framework, by exploiting
the high correlation among the frames in a Group Of Picture (GOP).
The proposed technique applies coarse and fine searches of any fast
block based motion estimation, only to the first pair of frames in a
GOP. The generated motion vectors are supplied to the next
consecutive frames, even to subsequent temporal levels and only fine
search is carried out around those predicted motion vectors. Hence
coarse search is skipped for all the motion estimation in a GOP
except for the first pair of frames. The technique has been tested for
different fast block based motion estimation algorithms over different
standard test sequences using MC-EZBC, a state-of-the-art scalable
video coder. The simulation result reveals substantial reduction (i.e.
20.75% to 38.24%) in the number of search points during motion
estimation, without compromising the quality of the reconstructed
video compared to non-predictive techniques. Since the motion
vectors of all the pair of frames in a GOP except the first pair will
have value ±1 around the motion vectors of the previous pair of
frames, the number of bits required for motion vectors is also
reduced by 50%.
Abstract: This paper aims to develop an algorithm of finite
capacity material requirement planning (FCMRP) system for a multistage
assembly flow shop. The developed FCMRP system has two
main stages. The first stage is to allocate operations to the first and
second priority work centers and also determine the sequence of the
operations on each work center. The second stage is to determine the
optimal start time of each operation by using a linear programming
model. Real data from a factory is used to analyze and evaluate the
effectiveness of the proposed FCMRP system and also to guarantee a
practical solution to the user. There are five performance measures,
namely, the total tardiness, the number of tardy orders, the total
earliness, the number of early orders, and the average flow-time. The
proposed FCMRP system offers an adjustable solution which is a
compromised solution among the conflicting performance measures.
The user can adjust the weight of each performance measure to
obtain the desired performance. The result shows that the combination
of FCMRP NP3 and EDD outperforms other combinations
in term of overall performance index. The calculation time for the
proposed FCMRP system is about 10 minutes which is practical for
the planners of the factory.
Abstract: Negation is useful in the majority of the real world applications. However, its introduction leads to semantic and canonical problems. SEPN nets are well adapted extension of predicate nets for the definition and manipulation of stratified programs. This formalism is characterized by two main contributions. The first concerns the management of the whole class of stratified programs. The second contribution is related to usual operations optimization (maximal stratification, incremental updates ...). We propose, in this paper, useful algorithms for manipulating stratified programs using SEPN. These algorithms were implemented and validated with STRPRO tool.
Abstract: This study was to investigate the performance of
hybrid solvents blended between primary, secondary, or tertiary
amines and piperazine (PZ) for CO2 removal from flue gas in terms
of CO2 absorption capacity and regeneration efficiency at 90 oC.
Alkanolamines used in this work were monoethanolamine (MEA),
diethanolamine (DEA), and triethanolamine (TEA). The CO2
absorption was experimentally examined under atmospheric pressure
and room temperature. The results show that MEA blend with PZ
provided the maximum CO2 absorption capacity of 0.50 mol
CO2/mol amine while TEA provided the minimum CO2 absorption
capacity of 0.30 mol CO2/mol amine. TEA was easier to regenerate
for both first cycle and second cycle with less loss of absorption
capacity. The regeneration efficiency of TEA was 95.09 and 92.89 %,
for the first and second generation cycles, respectively.
Abstract: The malfunction of thermal protection system (TPS) caused by aerodynamic heating is a latent trouble to aircraft structure safety. Accurately predicting the structure temperature field is quite important for the TPS design of hypersonic vehicle. Since Thornton’s work in 1988, the coupled method of aerodynamic heating and heat transfer has developed rapidly. However, little attention has been paid to the influence of structural deformation on aerodynamic heating and structural temperature field. In the flight, especially the long-endurance flight, the structural deformation, caused by the aerodynamic heating and temperature rise, has a direct impact on the aerodynamic heating and structural temperature field. Thus, the coupled interaction cannot be neglected. In this paper, based on the method of static aero-thermo-elasticity, considering the influence of aero-thermo-elasticity deformation, the aerodynamic heating and heat transfer coupled results of hypersonic vehicle wing model were calculated. The results show that, for the low-curvature region, such as fuselage or center-section wing, structure deformation has little effect on temperature field. However, for the stagnation region with high curvature, the coupled effect is not negligible. Thus, it is quite important for the structure temperature prediction to take into account the effect of elastic deformation. This work has laid a solid foundation for improving the prediction accuracy of the temperature distribution of aircraft structures and the evaluation capacity of structural performance.
Abstract: In this work, we consider the rational points on elliptic
curves over finite fields Fp. We give results concerning the number
of points Np,a on the elliptic curve y2 ≡ x3 +a3(mod p) according
to whether a and x are quadratic residues or non-residues. We use
two lemmas to prove the main results first of which gives the list of
primes for which -1 is a quadratic residue, and the second is a result
from [1]. We get the results in the case where p is a prime congruent
to 5 modulo 6, while when p is a prime congruent to 1 modulo 6,
there seems to be no regularity for Np,a.
Abstract: This paper presents a model for the evaluation of
energy performance and aerodynamic forces acting on a three-bladed
small vertical axis Darrieus wind turbine depending on blade chord
curvature with respect to rotor axis.
The adopted survey methodology is based on an analytical code
coupled to a solid modeling software, capable of generating the
desired blade geometry depending on the blade design geometric
parameters, which is linked to a finite volume CFD code for the
calculation of rotor performance.
After describing and validating the model with experimental data,
the results of numerical simulations are proposed on the bases of two
different blade profile architectures, which are respectively
characterized by a straight chord and by a curved one, having a chord
radius equal to rotor external circumference. A CFD campaign of
analysis is completed for three blade-candidate airfoil sections, that is
the recently-developed DU 06-W-200 cambered blade profile, a
classical symmetrical NACA 0021 and its derived cambered airfoil,
characterized by a curved chord, having a chord radius equal to rotor
external circumference.
The effects of blade chord curvature on angle of attack, blade
tangential and normal forces are first investigated and then the
overall rotor torque and power are analyzed as a function of blade
azimuthal position, achieving a numerical quantification of the
influence of blade camber on overall rotor performance.
Abstract: Elliptic curve-based certificateless signature is slowly
gaining attention due to its ability to retain the efficiency of
identity-based signature to eliminate the need of certificate
management while it does not suffer from inherent private
key escrow problem. Generally, cryptosystem based on elliptic
curve offers equivalent security strength at smaller key sizes
compared to conventional cryptosystem such as RSA which
results in faster computations and efficient use of computing
power, bandwidth, and storage. This paper proposes to implement
certificateless signature based on bilinear pairing to
structure the framework of IKE authentication. In this paper,
we perform a comparative analysis of certificateless signature
scheme with a well-known RSA scheme and also present the
experimental results in the context of signing and verification
execution times. By generalizing our observations, we discuss the
different trade-offs involved in implementing IKE authentication
by using certificateless signature.
Abstract: This article is devoted to the problems of the
disproportional development of regions in the Republic Kazakhstan.
The threats proceeding from problem regions, make strong impact on
the country-s sustainable development, therefore they are necessary
to be considered at the level of national security.
Abstract: In 1990 [1] the subband-DFT (SB-DFT) technique was proposed. This technique used the Hadamard filters in the decomposition step to split the input sequence into low- and highpass sequences. In the next step, either two DFTs are needed on both bands to compute the full-band DFT or one DFT on one of the two bands to compute an approximate DFT. A combination network with correction factors was to be applied after the DFTs. Another approach was proposed in 1997 [2] for using a special discrete wavelet transform (DWT) to compute the discrete Fourier transform (DFT). In the first step of the algorithm, the input sequence is decomposed in a similar manner to the SB-DFT into two sequences using wavelet decomposition with Haar filters. The second step is to perform DFTs on both bands to obtain the full-band DFT or to obtain a fast approximate DFT by implementing pruning at both input and output sides. In this paper, the wavelet-based DFT (W-DFT) with Haar filters is interpreted as SB-DFT with Hadamard filters. The only difference is in a constant factor in the combination network. This result is very important to complete the analysis of the W-DFT, since all the results concerning the accuracy and approximation errors in the SB-DFT are applicable. An application example in spectral analysis is given for both SB-DFT and W-DFT (with different filters). The adaptive capability of the SB-DFT is included in the W-DFT algorithm to select the band of most energy as the band to be computed. Finally, the W-DFT is extended to the two-dimensional case. An application in image transformation is given using two different types of wavelet filters.
Abstract: Memory Errors Detection and Correction aim to secure the transaction of data between the central processing unit of a satellite onboard computer and its local memory. In this paper, the application of a double-bit error detection and correction method is described and implemented in Field Programmable Gate Array (FPGA) technology. The performance of the proposed EDAC method is measured and compared with two different EDAC devices, using the same FPGA technology. Statistical analysis of single-event upset (SEU) and multiple-bit upset (MBU) activity in commercial memories onboard the first Algerian microsatellite Alsat-1 is given.
Abstract: Three strains of Vibrio parahaemolyticus (690, BCRC
13023 and BCRC 13025) implicated in food poisoning outbreaks in
Taiwan were subjected to acid adaptation at pH 5.5 for 90 min. The
growth behaviors of acid-adapted and non-adapted V.
parahaemolyticus in the media supplemented with various nitrogen
and carbon sources were investigated. The effects of acid adaptation
on the thermostable direct hemolysin (TDH) secretion and fatty acid
profiles of V. parahaemolyticus were also examined. Results showed
that acid-adapted and non-adapted V. parahaemolyticus 690, BCRC
13023 and BCRC 13025 grew similarly in TSB-3% NaCl and basal
media supplemented with various carbon and nitrogen sources during
incubation period. Higher TDH secretion was noted with V.
parahaemolyticus 690 among the three strains. However, acid-adapted
strains produced less amounts of TDH than non-adapted strains when
they were grown in TSB-3% NaCl. Additionally, acid adaptation
increased the ratio of SFA/USFA in cells of V. parahaemolyticus
strains.
Abstract: One of the main research directions in CAD/CAM
machining area is the reducing of machining time.
The feedrate scheduling is one of the advanced techniques that
allows keeping constant the uncut chip area and as sequel to keep
constant the main cutting force. They are two main ways for feedrate
optimization. The first consists in the cutting force monitoring, which
presumes to use complex equipment for the force measurement and
after this, to set the feedrate regarding the cutting force variation. The
second way is to optimize the feedrate by keeping constant the
material removal rate regarding the cutting conditions.
In this paper there is proposed a new approach using an extended
database that replaces the system model.
The feedrate scheduling is determined based on the identification
of the reconfigurable machine tool, and the feed value determination
regarding the uncut chip section area, the contact length between tool
and blank and also regarding the geometrical roughness.
The first stage consists in the blank and tool monitoring for the
determination of actual profiles. The next stage is the determination
of programmed tool path that allows obtaining the piece target
profile.
The graphic representation environment models the tool and blank
regions and, after this, the tool model is positioned regarding the
blank model according to the programmed tool path. For each of
these positions the geometrical roughness value, the uncut chip area
and the contact length between tool and blank are calculated. Each of
these parameters are compared with the admissible values and
according to the result the feed value is established.
We can consider that this approach has the following advantages:
in case of complex cutting processes the prediction of cutting force is
possible; there is considered the real cutting profile which has
deviations from the theoretical profile; the blank-tool contact length
limitation is possible; it is possible to correct the programmed tool
path so that the target profile can be obtained.
Applying this method, there are obtained data sets which allow the
feedrate scheduling so that the uncut chip area is constant and, as a
result, the cutting force is constant, which allows to use more
efficiently the machine tool and to obtain the reduction of machining
time.
Abstract: The purpose of study is to demonstrate how the characteristics of technology and the process required for development of technology affect technology transfer from public organisations to industry on the technology level. In addition, using the advantage of the analytic level and the novel means of measuring technology convergence, we examine the characteristics of converging technologies as compared to non-converging technologies in technology transfer process. In sum, our study finds that a technology from the public sector is likely to be transferred when its readiness level is closer to generation of profit, when its stage of life cycle is early and when its economic values is high. Our findings also show that converging technologies are less likely to be transferred.
Abstract: In this paper, an image adaptive, invisible digital
watermarking algorithm with Orthogonal Polynomials based
Transformation (OPT) is proposed, for copyright protection of digital
images. The proposed algorithm utilizes a visual model to determine
the watermarking strength necessary to invisibly embed the
watermark in the mid frequency AC coefficients of the cover image,
chosen with a secret key. The visual model is designed to generate a
Just Noticeable Distortion mask (JND) by analyzing the low level
image characteristics such as textures, edges and luminance of the
cover image in the orthogonal polynomials based transformation
domain. Since the secret key is required for both embedding and
extraction of watermark, it is not possible for an unauthorized user to
extract the embedded watermark. The proposed scheme is robust to
common image processing distortions like filtering, JPEG
compression and additive noise. Experimental results show that the
quality of OPT domain watermarked images is better than its DCT
counterpart.
Abstract: Argument over the use of particular method in interlanguage pragmatics has increased recently. Researchers argued the advantages and disadvantages of each method either natural or elicited. Findings of different studies indicated that the use of one method may not provide enough data to answer all its questions. The current study investigated the validity of using multimethod approach in interlanguage pragmatics to understand the development of requests in Arabic as a second language (Arabic L2). To this end, the study adopted two methods belong to two types of data sources: the institutional discourse (natural data), and the role play (elicited data). Participants were 117 learners of Arabic L2 at the university level, representing four levels (beginners, low-intermediate, highintermediate, and advanced). Results showed that using two or more methods in interlanguage pragmatics affect the size and nature of data.
Abstract: Human ability is a major source of constraint to manufacturing industries in Nigeria. This paper therefore, discusses the importance of human influences on manufacturing and consequently to industrialization and National development. In this paper, the development of manufacturing was anchored on two main factors; Infrastructural Capacity Development (ICD) and Human Capacity Development (HCD). However, a wider view was given to the HCD and the various contemporary human capacity issues militating against manufacturing in Nigeria. It went further to discuss various ways of acquiring and upgrading workers’ skills and finally, suggestions were made on how to tackle the onerous human capacity issues in manufacturing.
Abstract: Routing security is a major concerned in Wireless
Sensor Network since a large scale of unattended nodes is deployed
in ad hoc fashion with no possibility of a global addressing due to a
limitation of node-s memory and the node have to be self organizing
when the systems require a connection with the other nodes. It
becomes more challenging when the nodes have to act as the router
and tightly constrained on energy and computational capabilities
where any existing security mechanisms are not allowed to be fitted
directly. These reasons thus increasing vulnerabilities to the network
layer particularly and to the whole network, generally. In this paper,
a Dynamic Window Secured Implicit Geographic Forwarding
(DWSIGF) routing is presented where a dynamic time is used for
collection window to collect Clear to Send (CTS) control packet in
order to find an appropriate hoping node. The DWIGF is expected to
minimize a chance to select an attacker as the hoping node that
caused by a blackhole attack that happen because of the CTS rushing
attack, which promise a good network performance with high packet
delivery ratios.
Abstract: This paper present some preliminary work on the
preparation and physicochemical caracterization of nanocomposite
MFI-alumina structures based on alumina hollow fibres. The fibers
are manufactured by a wet spinning process. α-alumina particles were
dispersed in a solution of polysulfone in NMP. The resulting slurry is
pressed through the annular gap of a spinneret into a precipitation
bath. The resulting green fibres are sintered. The mechanical strength
of the alumina hollow fibres is determined by a three-point-bending
test while the pore size is characterized by bubble-point testing. The
bending strength is in the range of 110 MPa while the average pore
size is 450 nm for an internal diameter of 1 mm and external diameter
of 1.7 mm. To characterize the MFI membranes various techniques
were used for physicochemical characterization of MFI–ceramic
hollow fibres membranes: The nitrogen adsorption, X-ray
diffractometry, scanning electron microscopy combined with X
emission microanalysis. Scanning Electron Microscopy (SEM) and
Energy Dispersive Microanalysis by the X-ray were used to observe
the morphology of the hollow fibre membranes (thickness,
infiltration into the carrier, defects, homogeneity). No surface film,
has been obtained, as observed by SEM and EDX analysis and
confirmed by high temperature variation of N2 and CO2 gas
permeances before cation exchange. Local analysis and characterise
(SEM and EDX) and overall (by ICP elemental analysis) were
conducted on two samples exchanged to determine the quantity and
distribution of the cation of cesium on the cross section fibre of the
zeolite between the cavities.