Abstract: The draw solute separation process in Forward
Osmosis desalination was simulated in Aspen Plus chemical process
modeling software, to estimate the energy consumption and compare
it with other desalination processes, mainly the Reverse Osmosis
process which is currently most prevalent. The electrolytic chemistry
for the system was retrieved using the Elec – NRTL property method
in the Aspen Plus database. Electrical equivalent of energy required
in the Forward Osmosis desalination technique was estimated and
compared with the prevalent desalination techniques.
Abstract: In the current research, we present an operation framework and protection mechanism to facilitate secure environment to protect mobile agents against tampering. The system depends on the presence of an authentication authority. The advantage of the proposed system is that security measures is an integral part of the design, thus common security retrofitting problems do not arise. This is due to the presence of AlGamal encryption mechanism to protect its confidential content and any collected data by the agent from the visited host . So that eavesdropping on information from the agent is no longer possible to reveal any confidential information. Also the inherent security constraints within the framework allow the system to operate as an intrusion detection system for any mobile agent environment. The mechanism is tested for most of the well known severe attacks against agents and networked systems. The scheme proved a promising performance that makes it very much recommended for the types of transactions that needs highly secure environments, e. g., business to business.
Abstract: The authors present a mixed method for reducing the order of the large-scale dynamic systems. In this method, the denominator polynomial of the reduced order model is obtained by using the modified pole clustering technique while the coefficients of the numerator are obtained by Pade approximations. This method is conceptually simple and always generates stable reduced models if the original high-order system is stable. The proposed method is illustrated with the help of the numerical examples taken from the literature.
Abstract: This paper is concerned with motion recognition based fuzzy WP(Wavelet Packet) feature extraction approach from Vicon physical data sets. For this purpose, we use an efficient fuzzy mutual-information-based WP transform for feature extraction. This method estimates the required mutual information using a novel approach based on fuzzy membership function. The physical action data set includes 10 normal and 10 aggressive physical actions that measure the human activity. The data have been collected from 10 subjects using the Vicon 3D tracker. The experiments consist of running, seating, and walking as physical activity motion among various activities. The experimental results revealed that the presented feature extraction approach showed good recognition performance.
Abstract: The process of constructing a scale measuring the attitudes of youth toward violence on televisions is reported. A 30-item draft attitude scale was applied to a working group of 232 students attending the Faculty of Educational Sciences at Ankara University between the years 2005-2006. To introduce the construct validity and dimensionality of the scale, exploratory and confirmatory factor analysis was applied to the data. Results of the exploratory factor analysis showed that the scale had three factors that accounted for 58,44% (22,46% for the first, 22,15% for the second and 13,83% for the third factor) of the common variance. It is determined that the first factor considered issues related individual effects of violence on televisions, the second factor concerned issues related social effects of violence on televisions and the third factor concerned issues related violence on television programs. Results of the confirmatory factor analysis showed that all the items under each factor are fitting the concerning factors structure. An alpha reliability of 0,90 was estimated for the whole scale. It is concluded that the scale is valid and reliable.
Abstract: A geothermal power plant multiple simulator for
operators training is presented. The simulator is designed to be
installed in a wireless local area network and has a capacity to train
one to six operators simultaneously, each one with an independent
simulation session. The sessions must be supervised only by one
instructor. The main parts of this multiple simulator are: instructor
and operator-s stations. On the instructor station, the instructor
controls the simulation sessions, establishes training exercises and
supervises each power plant operator in individual way. This station
is hosted in a Main Personal Computer (NS) and its main functions
are: to set initial conditions, snapshots, malfunctions or faults,
monitoring trends, and process and soft-panel diagrams. On the other
hand the operators carry out their actions over the power plant
simulated on the operator-s stations; each one is also hosted in a PC.
The main software of instructor and operator-s stations are executed
on the same NS and displayed in PCs through graphical Interactive
Process Diagrams (IDP). The geothermal multiple simulator has been
installed in the Geothermal Simulation Training Center (GSTC) of
the Comisi├│n Federal de Electricidad, (Federal Commission of
Electricity, CFE), Mexico, and is being utilized as a part of the
training courses for geothermal power plant operators.
Abstract: The cost of damage to the non-structural systems in
critical facilities like nuclear power plants and hospitals can exceed
80% of the total cost of damage during an earthquake. The failure of
nonstructural components, especially, piping systems led to leakage of
water and subsequent shut-down of hospitals immediately after the
event. Consequently, the evaluation of performance of these types of
structural configurations has become necessary to mitigate the risk and
to achieve reliable designs.
This paper focuses on a methodology to evaluate the static and
dynamic characteristics of complex actual piping system based on
NFPA-13 and SMACNA guidelines. The result of this study revealed
that current piping system subjected to design lateral force and design
spectrum based on UBC-97 was failed in both cases and mode shapes
between piping system and building structure were very different
Abstract: Majority of Business Software Systems (BSS)
Development and Enhancement Projects (D&EP) fail to meet criteria
of their effectiveness, what leads to the considerable financial losses.
One of the fundamental reasons for such projects- exceptionally low
success rate are improperly derived estimates for their costs and time.
In the case of BSS D&EP these attributes are determined by the work
effort, meanwhile reliable and objective effort estimation still appears
to be a great challenge to the software engineering. Thus this paper is
aimed at presenting the most important synthetic conclusions coming
from the author-s own studies concerning the main factors of
effective BSS D&EP work effort estimation. Thanks to the rational
investment decisions made on the basis of reliable and objective
criteria it is possible to reduce losses caused not only by abandoned
projects but also by large scale of overrunning the time and costs of
BSS D&EP execution.
Abstract: The fundamental objective of the university is to
genuinely provide a higher education to mankind and society. Higher
education institutions earn billions of dollars in research funds, granted
by national government or related institutions, which literally came
from taxpayers. Everyday universities consume those grants; in return,
provide society with a human resource and research developments.
However, not all taxpayers have their major concerns on those
researches, other than that they are more curiously to see the project
being build tangibly and evidently to certify what they pay for. This
paper introduces the concept of University – Community Business
Continuity Management for Disaster – Resilient City, which modified
the concept of Business Continuity Management (BCM) toward
university community to create advancing collaboration leading to the
disaster – resilient community and city. This paper focuses on
describing in details the backgrounds and principles of the concept and
discussing the advantages and limitations of the concept.
Abstract: Crystallization has been used for the separation of
chloronitrobenzene or CNBs, which are isomeric substances (o-, mand
p-CNB) and important intermediates in chemical productions. Effects of feed composition on the crystallization of m- and p-CNB was first studied. The results conform to the binary phase diagram of
m- and p-CNB. After that, effects of FAU zeolites (NaX, CaX, BaX, NaY and CaY) above the eutectic composition (63.5 and 65.0 wt% m-CNB in the feed) was also investigated. The results showed that
the FAU zeolites significantly affected the precipitates, the
composition of which was shifted from being rich in m-CNB to rich
in p-CNB. Effects of the number of FAU zeolites on the precipitate composition was then studied. The results revealed that the
precipitates from the lower number of the zeolites had higher p-CNB purity than those from the higher number of zeolite.
Abstract: This paper presents an integrated knowledge-based
approach to multi-scale modeling of aquatic systems, with a view to
enhancing predictive power and aiding environmental management
and policy-making. The basic phases of this approach have been
exemplified in the case of a bay in Saronicos Gulf (Attiki, Greece).
The results showed a significant problem with rising phytoplankton
blooms linked to excessive microbial growth, arisen mostly due to
increased nitrogen inflows; therefore, the nitrification/denitrification
processes of the benthic and water column sub-systems have
provided the quality variables to be monitored for assessing
environmental status. It is thereby demonstrated that the proposed
approach facilitates modeling choices and implementation option
decisions, while it provides substantial support for knowledge and
experience capitalization in long-term water management.
Abstract: Current tools for data migration between documentoriented
and relational databases have several disadvantages. We
propose a new approach for data migration between documentoriented
and relational databases. During data migration the relational
schema of the target (relational database) is automatically created
from collection of XML documents. Proposed approach is verified on
data migration between document-oriented database IBM Lotus/
Notes Domino and relational database implemented in relational
database management system (RDBMS) MySQL.
Abstract: In this paper in consideration of each available
techniques deficiencies for speech recognition, an advanced method
is presented that-s able to classify speech signals with the high
accuracy (98%) at the minimum time. In the presented method, first,
the recorded signal is preprocessed that this section includes
denoising with Mels Frequency Cepstral Analysis and feature
extraction using discrete wavelet transform (DWT) coefficients; Then
these features are fed to Multilayer Perceptron (MLP) network for
classification. Finally, after training of neural network effective
features are selected with UTA algorithm.
Abstract: In this paper, real-coded genetic algorithm (RCGA) optimization technique has been applied for large-scale linear dynamic multi-input-multi-output (MIMO) system. The method is based on error minimization technique where the integral square error between the transient responses of original and reduced order models has been minimized by RCGA. The reduction procedure is simple computer oriented and the approach is comparable in quality with the other well-known reduction techniques. Also, the proposed method guarantees stability of the reduced model if the original high-order MIMO system is stable. The proposed approach of MIMO system order reduction is illustrated with the help of an example and the results are compared with the recently published other well-known reduction techniques to show its superiority.
Abstract: In this work a novel approach for color image
segmentation using higher order entropy as a textural feature for
determination of thresholds over a two dimensional image histogram
is discussed. A similar approach is applied to achieve multi-level
thresholding in both grayscale and color images. The paper discusses
two methods of color image segmentation using RGB space as the
standard processing space. The threshold for segmentation is decided
by the maximization of conditional entropy in the two dimensional
histogram of the color image separated into three grayscale images of
R, G and B. The features are first developed independently for the
three ( R, G, B ) spaces, and combined to get different color
component segmentation. By considering local maxima instead of the
maximum of conditional entropy yields multiple thresholds for the
same image which forms the basis for multilevel thresholding.
Abstract: This paper investigates experimental and numerical study of the airflow characteristics for vortex, round and square ceiling diffusers and its effect on the thermal comfort in a ventilated room. Three different thermal comfort criteria namely; Mean Age of the Air (MAA), ventilation effectiveness (E), and Effective Draft Temperature (EDT) have been used to predict the thermal comfort zone inside the room. In experimental work, a sub-scale room is set-up to measure the temperature field in the room. In numerical analysis, unstructured grids have been used to discretize the numerical domain. Conservation equations are solved using FLUENT commercial flow solver. The code is validated by comparing the numerical results obtained from three different turbulence models with the available experimental data. The comparison between the various numerical models shows that the standard k-ε turbulence model can be used to simulate these cases successfully. After validation of the code, effect of supply air velocity on the flow and thermal field could be investigated and hence the thermal comfort. The results show that the pressure coefficient created by the square diffuser is 1.5 times greater than that created by the vortex diffuser. The velocity decay coefficient is nearly the same for square and round diffusers and is 2.6 times greater than that for the vortex diffuser.
Abstract: In this paper we will develop further the sequential life test approach presented in a previous article by [1] using an underlying two parameter Inverse Weibull sampling distribution. The location parameter or minimum life will be considered equal to zero. Once again we will provide rules for making one of the three possible decisions as each observation becomes available; that is: accept the null hypothesis H0; reject the null hypothesis H0; or obtain additional information by making another observation. The product being analyzed is a new electronic component. There is little information available about the possible values the parameters of the corresponding Inverse Weibull underlying sampling distribution could have.To estimate the shape and the scale parameters of the underlying Inverse Weibull model we will use a maximum likelihood approach for censored failure data. A new example will further develop the proposed sequential life testing approach.
Abstract: This paper proposes a technique to protect against
email bombing. The technique employs a statistical approach, Naïve
Bayes (NB), and Neural Networks to show that it is possible to
differentiate between good and bad traffic to protect against email
bombing attacks. Neural networks and Naïve Bayes can be trained
by utilizing many email messages that include both input and output
data for legitimate and non-legitimate emails. The input to the model
includes the contents of the body of the messages, the subject, and
the headers. This information will be used to determine if the email
is normal or an attack email. Preliminary tests suggest that Naïve
Bayes can be trained to produce an accurate response to confirm
which email represents an attack.
Abstract: Due to the non- intuitive nature of Quantum
algorithms, it becomes difficult for a classically trained person to
efficiently construct new ones. So rather than designing new
algorithms manually, lately, Genetic algorithms (GA) are being
implemented for this purpose. GA is a technique to automatically
solve a problem using principles of Darwinian evolution. This has
been implemented to explore the possibility of evolving an n-qubit
circuit when the circuit matrix has been provided using a set of
single, two and three qubit gates. Using a variable length population
and universal stochastic selection procedure, a number of possible
solution circuits, with different number of gates can be obtained for
the same input matrix during different runs of GA. The given
algorithm has also been successfully implemented to obtain two and
three qubit Boolean circuits using Quantum gates. The results
demonstrate the effectiveness of the GA procedure even when the
search spaces are large.
Abstract: With the rapid expansion of city scale and the
excessive concentration of population, achieving relative equality of
extracurricular education resources and improving spatial service
performance of relevant facilities become necessary arduous tasks. In
urban space, extracurricular education facilities should offer better
service to its targeted area and promote the equality and efficiency of
education, which is accomplished by the allocation of facilities. Based
on questionnaire and survey for local students in Hangzhou City in
2009, this study classifies extracurricular education facilities in
meg-city and defines the equalization of these facilities. Then it is
suggested to establish extracurricular education facilities system
according to the development level of city and demands of local
students, and to introduce a spatial analysis method into urban
planning through the aspects of spatial distribution, travel cost and
spatial service scope. Finally, the practice of nine sub-districts of
Hangzhou is studied.