Abstract: The sand production problem has led researchers into making various attempts to understand the phenomenon. The generally accepted concept is that the occurrence of sanding is due to the in-situ stress conditions and the induced changes in stress that results in the failure of the reservoir sandstone during hydrocarbon production from wellbores. By using a hypothetical cased (perforated) well, an approach to the problem is presented here by using Finite Element numerical modelling techniques. In addition to the examination of the erosion problem, the influence of certain key parameters is studied in order to ascertain their effect on the failure and subsequent erosion process. The major variables investigated include: drawdown, perforation depth, and the erosion criterion. Also included is the determination of the optimal mud pressure for given operational and reservoir conditions. The improved understanding between parameters enables the choice of optimal values to minimize sanding during oil production.
Abstract: Scale Time Offset Robust Modulation (STORM) [1]–
[3] is a high bandwidth waveform design that adds time-scale
to embedded reference modulations using only time-delay [4]. In
an environment where each user has a specific delay and scale,
identification of the user with the highest signal power and that
user-s phase is facilitated by the STORM processor. Both of these
parameters are required in an efficient multiuser detection algorithm.
In this paper, the STORM modulation approach is evaluated with
a direct sequence spread quadrature phase shift keying (DS-QPSK)
system. A misconception of the STORM time scale modulation is that
a fine temporal resolution is required at the receiver. STORM will
be applied to a QPSK code division multiaccess (CDMA) system
by modifying the spreading codes. Specifically, the in-phase code
will use a typical spreading code, and the quadrature code will
use a time-delayed and time-scaled version of the in-phase code.
Subsequently, the same temporal resolution in the receiver is required
before and after the application of STORM. In this paper, the bit error
performance of STORM in a synchronous CDMA system is evaluated
and compared to theory, and the bit error performance of STORM
incorporated in a single user WCDMA downlink is presented to
demonstrate the applicability of STORM in a modern communication
system.
Abstract: The aeration process via injectors is used to combat
the lack of oxygen in lakes due to eutrophication. A 3D numerical
simulation of the resulting flow using a simplified model is presented.
In order to generate the best dynamic in the fluid with respect to
the aeration purpose, the optimization of the injectors location is
considered. We propose to adapt to this problem the topological
sensitivity analysis method which gives the variation of a criterion
with respect to the creation of a small hole in the domain. The main
idea is to derive the topological sensitivity analysis of the physical
model with respect to the insertion of an injector in the fluid flow
domain. We propose in this work a topological optimization algorithm
based on the studied asymptotic expansion. Finally we present some
numerical results, showing the efficiency of our approach
Abstract: This paper examines predictability in stock return in
developed and emergingmarkets by testing long memory in stock
returns using wavelet approach. Wavelet-based maximum likelihood
estimator of the fractional integration estimator is superior to the
conventional Hurst exponent and Geweke and Porter-Hudak
estimator in terms of asymptotic properties and mean squared error.
We use 4-year moving windows to estimate the fractional integration
parameter. Evidence suggests that stock return may not be predictable
indeveloped countries of the Asia-Pacificregion. However,
predictability of stock return insome developing countries in this
region such as Indonesia, Malaysia and Philippines may not be ruled
out. Stock return in the Thailand stock market appears to be not
predictable after the political crisis in 2008.
Abstract: The Goursat partial differential equation arises in
linear and non linear partial differential equations with mixed
derivatives. This equation is a second order hyperbolic partial
differential equation which occurs in various fields of study such as
in engineering, physics, and applied mathematics. There are many
approaches that have been suggested to approximate the solution of
the Goursat partial differential equation. However, all of the
suggested methods traditionally focused on numerical differentiation
approaches including forward and central differences in deriving the
scheme. An innovation has been done in deriving the Goursat partial
differential equation scheme which involves numerical integration
techniques. In this paper we have developed a new scheme to solve
the Goursat partial differential equation based on the Adomian
decomposition (ADM) and associated with Boole-s integration rule to
approximate the integration terms. The new scheme can easily be
applied to many linear and non linear Goursat partial differential
equations and is capable to reduce the size of computational work.
The accuracy of the results reveals the advantage of this new scheme
over existing numerical method.
Abstract: This paper proposes new hybrid approaches for face
recognition. Gabor wavelets representation of face images is an
effective approach for both facial action recognition and face
identification. Perform dimensionality reduction and linear
discriminate analysis on the down sampled Gabor wavelet faces can
increase the discriminate ability. Nearest feature space is extended to
various similarity measures. In our experiments, proposed Gabor
wavelet faces combined with extended neural net feature space
classifier shows very good performance, which can achieve 93 %
maximum correct recognition rate on ORL data set without any preprocessing
step.
Abstract: Wireless Mesh Networking is a promising proposal
for broadband data transmission in a large area with low cost and
acceptable QoS. These features- trade offs in WMNs is a hot research
field nowadays. In this paper a mathematical optimization framework
has been developed to maximize throughput according to upper
bound delay constraints. IEEE 802.11 based infrastructure
backhauling mode of WMNs has been considered to formulate the
MINLP optimization problem. Proposed method gives the full
routing and scheduling procedure in WMN in order to obtain
mentioned goals.
Abstract: Environment both endowed and built are essential for
tourism. However tourism and environment maintains a complex
relationship, where in most cases environment is at the receiving end.
Many tourism development activities have adverse environmental
effects, mainly emanating from construction of general infrastructure
and tourism facilities. These negative impacts of tourism can lead to
the destruction of precious natural resources on which it depends.
These effects vary between locations; and its effect on a hill
destination is highly critical. This study aims at developing a
Sustainable Tourism Planning Model for an environmentally
sensitive tourism destination in Kerala, India. Being part of the
Nilgiri mountain ranges, Munnar falls in the Western Ghats, one of
the biological hotspots in the world. Endowed with a unique high
altitude environment Munnar inherits highly significant ecological
wealth. Giving prime importance to the protection of this ecological
heritage, the study proposes a tourism planning model with resource
conservation and sustainability as the paramount focus. Conceiving a
novel approach towards sustainable tourism planning, the study
proposes to assess tourism attractions using Ecological Sensitivity
Index (ESI) and Tourism Attractiveness Index (TAI). Integration of
these two indices will form the Ecology – Tourism Matrix (ETM),
outlining the base for tourism planning in an environmentally
sensitive destination. The ETM Matrix leads to a classification of
tourism nodes according to its Conservation Significance and
Tourism Significance. The spatial integration of such nodes based on
the Hub & Spoke Principle constitutes sub – regions within the STZ.
Ensuing analyses lead to specific guidelines for the STZ as a whole,
specific tourism nodes, hubs and sub-regions. The study results in a
multi – dimensional output, viz., (1) Classification system for tourism
nodes in an environmentally sensitive region/ destination (2)
Conservation / Tourism Development Strategies and Guidelines for
the micro and macro regions and (3) A Sustainable Tourism Planning
Tool particularly for Ecologically Sensitive Destinations, which can
be adapted for other destinations as well.
Abstract: This paper presents a genetic algorithm based
approach for solving security constrained optimal power flow
problem (SCOPF) including FACTS devices. The optimal location of
FACTS devices are identified using an index called overload index
and the optimal values are obtained using an enhanced genetic
algorithm. The optimal allocation by the proposed method optimizes
the investment, taking into account its effects on security in terms of
the alleviation of line overloads. The proposed approach has been
tested on IEEE-30 bus system to show the effectiveness of the
proposed algorithm for solving the SCOPF problem.
Abstract: Discrete particle swarm optimization (DPSO) is a
powerful stochastic evolutionary algorithm that is used to solve the
large-scale, discrete and nonlinear optimization problems. However,
it has been observed that standard DPSO algorithm has premature
convergence when solving a complex optimization problem like
transmission expansion planning (TEP). To resolve this problem an
advanced discrete particle swarm optimization (ADPSO) is proposed
in this paper. The simulation result shows that optimization of lines
loading in transmission expansion planning with ADPSO is better
than DPSO from precision view point.
Abstract: This is a study on numerical simulation of the convection-diffusion transport of a chemical species in steady flow through a small-diameter tube, which is lined with a very thin layer made up of retentive and absorptive materials. The species may be subject to a first-order kinetic reversible phase exchange with the wall material and irreversible absorption into the tube wall. Owing to the velocity shear across the tube section, the chemical species may spread out axially along the tube at a rate much larger than that given by the molecular diffusion; this process is known as dispersion. While the long-time dispersion behavior, well described by the Taylor model, has been extensively studied in the literature, the early development of the dispersion process is by contrast much less investigated. By early development, that means a span of time, after the release of the chemical into the flow, that is shorter than or comparable to the diffusion time scale across the tube section. To understand the early development of the dispersion, the governing equations along with the reactive boundary conditions are solved numerically using the Flux Corrected Transport Algorithm (FCTA). The computation has enabled us to investigate the combined effects on the early development of the dispersion coefficient due to the reversible and irreversible wall reactions. One of the results is shown that the dispersion coefficient may approach its steady-state limit in a short time under the following conditions: (i) a high value of Damkohler number (say Da ≥ 10); (ii) a small but non-zero value of absorption rate (say Γ* ≤ 0.5).
Abstract: A great deal of research works in the field information
systems security has been based on a positivist paradigm. Applying
the reductionism concept of the positivist paradigm for information
security means missing the bigger picture and thus, the lack of holism
which could be one of the reasons why security is still overlooked,
comes as an afterthought or perceived from a purely technical
dimension. We need to reshape our thinking and attitudes towards
security especially in a complex and dynamic environment such as e-
Business to develop a holistic understanding of e-Business security in
relation to its context as well as considering all the stakeholders in
the problem area. In this paper we argue the suitability and need for
more inductive interpretive approach and qualitative research method
to investigate e-Business security. Our discussion is based on a
holistic framework of enquiry, nature of the research problem, the
underling theoretical lens and the complexity of e-Business
environment. At the end we present a research strategy for
developing a holistic framework for understanding of e-Business
security problems in the context of developing countries based on an
interdisciplinary inquiry which considers their needs and
requirements.
Abstract: Public parks are placed high on the research agenda, with many studies addressing their social, economic and environment influences in different countries around the world. They have been recognized as contributors to the physical quality of urban environments. Recently, a broader view of public parks has emerged. This view goes well beyond the traditional value of parks as places for more recreation and visual delight, to depict them as valuable contributors to broader strategic objectives, such as property values, place attractiveness, job opportunities, social belonging, public health, tourist development, and improving the overall quality of life. This research examines the role of public parks in enhancing the quality of human life in Egyptian environment. It measures 'quality of life' in terms of 'human needs' and 'well-being'. This should open ways for policymakers, practitioners, researchers and the public to realize the potentials of public parks towards improving the quality of life.
Abstract: Dynamic models of power converters are normally
time-varying because of their switching actions. Several approaches
are applied to analyze the power converters to achieve the timeinvariant
models suitable for system analysis and design via the
classical control theory. The paper presents how to derive dynamic
models of the power system consisting of a three-phase controlled
rectifier feeding an uncontrolled buck converter by using the
combination between the well known techniques called the DQ and
the generalized state-space averaging methods. The intensive timedomain
simulations of the exact topology model are used to support
the accuracies of the reported model. The results show that the
proposed model can provide good accuracies in both transient and
steady-state responses.
Abstract: This paper provides a new approach to solve the motion planning problems of flying robots in uncertain 3D dynamic environments. The robots controlled by this method can adaptively choose the fast way to avoid collision without information about the shapes and trajectories of obstacles. Based on sphere coordinates the new method accomplishes collision avoidance of flying robots without any other auxiliary positioning systems. The Self-protection System gives robots self-protection abilities to work in uncertain 3D dynamic environments. Simulations illustrate the validity of the proposed method.
Abstract: A social network is a set of people or organization or other social entities connected by some form of relationships. Analysis of social network broadly elaborates visual and mathematical representation of that relationship. Web can also be considered as a social network. This paper presents an innovative approach to analyze a social network using a variant of existing ant colony optimization algorithm called as Clever Ant Colony Metaphor. Experiments are performed and interesting findings and observations have been inferred based on the proposed model.
Abstract: Lossless compression schemes with secure
transmission play a key role in telemedicine applications that helps in
accurate diagnosis and research. Traditional cryptographic algorithms
for data security are not fast enough to process vast amount of data.
Hence a novel Secured lossless compression approach proposed in
this paper is based on reversible integer wavelet transform, EZW
algorithm, new modified runlength coding for character
representation and selective bit scrambling. The use of the lifting
scheme allows generating truly lossless integer-to-integer wavelet
transforms. Images are compressed/decompressed by well-known
EZW algorithm. The proposed modified runlength coding greatly
improves the compression performance and also increases the
security level. This work employs scrambling method which is fast,
simple to implement and it provides security. Lossless compression
ratios and distortion performance of this proposed method are found
to be better than other lossless techniques.
Abstract: This paper presents a highly efficient algorithm for detecting and tracking humans and objects in video surveillance sequences. Mean shift clustering is applied on backgrounddifferenced image sequences. For efficiency, all calculations are performed on integral images. Novel corresponding exponential integral kernels are introduced to allow the application of nonuniform kernels for clustering, which dramatically increases robustness without giving up the efficiency of the integral data structures. Experimental results demonstrating the power of this approach are presented.
Abstract: Wavelets have provided the researchers with
significant positive results, by entering the texture defect detection domain. The weak point of wavelets is that they are one-dimensional
by nature so they are not efficient enough to describe and analyze two-dimensional functions. In this paper we present a new method to
detect the defect of texture images by using curvelet transform.
Simulation results of the proposed method on a set of standard
texture images confirm its correctness. Comparing the obtained results indicates the ability of curvelet transform in describing
discontinuity in two-dimensional functions compared to wavelet
transform
Abstract: Much has been written about the difficulties students
have with producing traditional dissertations. This includes both
native English speakers (L1) and students with English as a second
language (L2). The main emphasis of these papers has been on the
structure of the dissertation, but in all cases, even when electronic
versions are discussed, the dissertation is still in what most would
regard as a traditional written form.
Master of Science Degrees in computing disciplines require
students to gain technical proficiency and apply their knowledge to a
range of scenarios. The basis of this paper is that if a dissertation is a
means of showing that such a student has met the criteria for a pass,
which should be based on the learning outcomes of the dissertation
module, does meeting those outcomes require a student to
demonstrate their skills in a solely text based form, particularly in a
highly technical research project? Could it be possible for a student
to produce a series of related artifacts which form a cohesive package
that meets the learning out comes of the dissertation?