Abstract: The 'wind-rain' house has a courtyard with glazed
roof, which allows more direct sunlight to come into indoor spaces
during the winter. The glazed roof can be partially opened or closed
and automatically controlled to provide natural ventilation in order to
adjust for indoor thermal conditions and the roof area can be shaded
by reflective insulation materials during the summer. Two field
studies for evaluating indoor thermal conditions of the two 'windrain'
houses have been carried out by author in 2009 and 2010.
Indoor and outdoor air temperature and relative humidity adjacent to
floor and ceiling of the two sample houses were continuously tested
at 15-minute intervals, 24 hours a day during the winter months.
Based on field study data, this study investigates relationships
between building design and indoor thermal condition of the 'windrain'
house to improve the future house design for building thermal
comfort and energy efficiency
Abstract: A large number of semantic web service composition
approaches are developed by the research community and one is
more efficient than the other one depending on the particular
situation of use. So a close look at the requirements of ones particular
situation is necessary to find a suitable approach to use. In this paper,
we present a Technique Recommendation System (TRS) which using
a classification of state-of-art semantic web service composition
approaches, can provide the user of the system with the
recommendations regarding the use of service composition approach
based on some parameters regarding situation of use. TRS has
modular architecture and uses the production-rules for knowledge
representation.
Abstract: Knowledge about the magnetic quantities in a magnetic circuit is always of great interest. On the one hand, this information is needed for the simulation of a transformer. On the other hand, parameter studies are more reliable, if the magnetic quantities are derived from a well established model. One possibility to model the 3-phase transformer is by using a magnetic equivalent circuit (MEC). Though this is a well known system, it is often not an easy task to set up such a model for a large number of lumped elements which additionally includes the nonlinear characteristic of the magnetic material. Here we show the setup of a solver for a MEC and the results of the calculation in comparison to measurements taken. The equations of the MEC are based on a rearranged system of the nodal analysis. Thus it is possible to achieve a minimum number of equations, and a clear and simple structure. Hence, it is uncomplicated in its handling and it supports the iteration process. Additional helpful tasks are implemented within the solver to enhance the performance. The electric circuit is described by an electric equivalent circuit (EEC). Our results for the 3-phase transformer demonstrate the computational efficiency of the solver, and show the benefit of the application of a MEC.
Abstract: Producing companies aspire to high delivery
availability despite appearing disruptions. To ensure high delivery
availability safety stocksare required. Howeversafety stock leads to
additional capital commitment and compensates disruptions instead
of solving the reasons.The intention is to increase the stability in
production by configuring the production planning and control
systematically. Thus the safety stock can be reduced. The largest
proportion of inventory in producing companies is caused by batch
inventory, schedule deviations and variability of demand rates.These
reasons for high inventory levels can be reduced by configuring the
production planning and control specifically. Hence the inventory
level can be reduced. This is enabled by synchronizing the lot size
straightening the demand as well as optimizing the releasing order,
sequencing and capacity control.
Abstract: Granular computing deals with representation of information in the form of some aggregates and related methods for transformation and analysis for problem solving. A granulation scheme based on clustering and Rough Set Theory is presented with focus on structured conceptualization of information has been presented in this paper. Experiments for the proposed method on four labeled data exhibit good result with reference to classification problem. The proposed granulation technique is semi-supervised imbibing global as well as local information granulation. To represent the results of the attribute oriented granulation a tree structure is proposed in this paper.
Abstract: Numerous experimental tests for post-installed anchor systems drilled in hardened concrete were conducted in order to estimate pull-out and shear strength accounting for uncertainties such as torque ratios, embedment depths and different diameters in demands. In this study, the strength of the systems was significantly changed by the effect of those three uncertainties during pull-out experimental tests, whereas the shear strength of the systems was not affected by torque ratios. It was also shown that concrete cone failure or damage mechanism was generally investigated during and after pull-out tests and in shear strength tests, mostly the anchor systems were failed prior to failure of primary structural system. Furthermore, 3D finite element model for the anchor systems was created by ABAQUS for the numerical analysis. The verification of finite element model was identical till the failure points to the load-displacement relationship specified by the experimental tests.
Abstract: This work describes refrigeration effects during storage on total protein and amino acids composition of raw and processed flour of two pearl millet cultivars (Ashana and Dembi). The protein content of the whole raw flour was found to be 14.46 and 13.38% for Ashana and Dembi cultivars, respectively. Dehulling of the grains reduced the protein content to 13.38 and 12.67% for the cultivars, respectively. For both cultivars, the protein content of the whole and dehulled raw flour before and after cooking was slightly decreased when the flour was stored for 60 days even after refrigeration. The effect of refrigeration process in combination with the storage period, cooking or dehulling was found to be vary between amino acids and even between cultivars. Regardless of the storage period and processing method, the amino acids content was remained unchanged after refrigeration for both cultivars.
Abstract: A clustering is process to identify a homogeneous
groups of object called as cluster. Clustering is one interesting topic
on data mining. A group or class behaves similarly characteristics.
This paper discusses a robust clustering process for data images with
two reduction dimension approaches; i.e. the two dimensional
principal component analysis (2DPCA) and principal component
analysis (PCA). A standard approach to overcome this problem is
dimension reduction, which transforms a high-dimensional data into
a lower-dimensional space with limited loss of information. One of
the most common forms of dimensionality reduction is the principal
components analysis (PCA). The 2DPCA is often called a variant of
principal component (PCA), the image matrices were directly treated
as 2D matrices; they do not need to be transformed into a vector so
that the covariance matrix of image can be constructed directly using
the original image matrices. The decomposed classical covariance
matrix is very sensitive to outlying observations. The objective of
paper is to compare the performance of robust minimizing vector
variance (MVV) in the two dimensional projection PCA (2DPCA)
and the PCA for clustering on an arbitrary data image when outliers
are hiden in the data set. The simulation aspects of robustness and
the illustration of clustering images are discussed in the end of
paper
Abstract: The purpose of this paper is to investigate the
influence of a number of variables on the conditional mean and
conditional variance of credit spread changes. The empirical analysis
in this paper is conducted within the context of bivariate GARCH-in-
Mean models, using the so-called BEKK parameterization. We show
that credit spread changes are determined by interest-rate and equityreturn
variables, which is in line with theory as provided by the
structural models of default. We also identify the credit spread
change volatility as an important determinant of credit spread
changes, and provide evidence on the transmission of volatility
between the variables under study.
Abstract: A fully implicit finite-difference method has been proposed for the numerical solutions of one dimensional coupled nonlinear Burgers’ equations on the uniform mesh points. The method forms a system of nonlinear difference equations which is to be solved at each iteration. Newton’s iterative method has been implemented to solve this nonlinear assembled system of equations. The linear system has been solved by Gauss elimination method with partial pivoting algorithm at each iteration of Newton’s method. Three test examples have been carried out to illustrate the accuracy of the method. Computed solutions obtained by proposed scheme have been compared with analytical solutions and those already available in the literature by finding L2 and L∞ errors.
Abstract: The results from experimental research of deformation
by upsetting and die forging of lead specimens wit controlled impact
are presented. Laboratory setup for conducting the investigations,
which uses cold rocket engine operated with compressed air, is
described. The results show that when using controlled impact is
achieving greater plastic deformation and consumes less impact
energy than at ordinary impact deformation process.
Abstract: Today the intangible assets are the capital of knowledge and are the most important and the most valuable resource for organizations. All employees have knowledge independently of the kind of jobs they do. Knowledge is thus an asset, which influences business operations. The objective of this article is to identify knowledge continuity as an objective of business continuity management. The article has been prepared based on the analysis of secondary sources and the evaluation of primary sources of data by means of a quantitative survey conducted in the Czech Republic. The conclusion of the article is that organizations that apply business continuity management do not focus on the preservation of the knowledge of key employees. Organizations ensure knowledge continuity only intuitively, on a random basis, non-systematically and discontinuously. The non-ensuring of knowledge continuity represents a threat of loss of key knowledge for organizations and can also negatively affect business continuity.
Abstract: Globalization, supported by information and
communication technologies, changes the rules of competitiveness
and increases the significance of information, knowledge and
network cooperation. In line with this trend, the need for efficient
trust-building tools has emerged. The absence of trust building
mechanisms and strategies was identified within several studies.
Through trust development, participation on e-business network and
usage of network services will increase and provide to SMEs new
economic benefits. This work is focused on effective trust building
strategies development for electronic business network platforms.
Based on trust building mechanism identification, the questionnairebased
analysis of its significance and minimum level of requirements
was conducted. In the paper, we are confirming the trust dependency
on e-Skills which play crucial role in higher level of trust into the
more sophisticated and complex trust building ICT solutions.
Abstract: This research contribution propels the idea of collaborating environment for the execution of student satellite projects in the backdrop of project management principles. The recent past has witnessed a technological shift in the aerospace industry from the big satellite projects to the small spacecrafts especially for the earth observation and communication purposes. This vibrant shift has vitalized the academia and industry to share their resources and to create a win-win paradigm of mutual success and technological development along with the human resource development in the field of aerospace. Small student satellites are the latest jargon of academia and more than 100 CUBESAT projects have been executed successfully all over the globe and many new student satellite projects are in the development phase. The small satellite project management requires the application of specific knowledge, skills, tools and techniques to achieve the defined mission requirements. The Authors have presented the detailed outline for the project management of student satellites and presented the role of industry to collaborate with the academia to get the optimized results in academic environment.
Abstract: Speckled images arise when coherent microwave,
optical, and acoustic imaging techniques are used to image an object, surface or scene. Examples of coherent imaging systems include synthetic aperture radar, laser imaging systems, imaging sonar
systems, and medical ultrasound systems. Speckle noise is a form of object or target induced noise that results when the surface of the object is Rayleigh rough compared to the wavelength of the illuminating radiation. Detection and estimation in images corrupted
by speckle noise is complicated by the nature of the noise and is not
as straightforward as detection and estimation in additive noise. In
this work, we derive stochastic models for speckle noise, with an emphasis on speckle as it arises in medical ultrasound images. The
motivation for this work is the problem of segmentation and tissue classification using ultrasound imaging. Modeling of speckle in this
context involves partially developed speckle model where an underlying Poisson point process modulates a Gram-Charlier series
of Laguerre weighted exponential functions, resulting in a doubly
stochastic filtered Poisson point process. The statistical distribution of partially developed speckle is derived in a closed canonical form.
It is observed that as the mean number of scatterers in a resolution cell is increased, the probability density function approaches an
exponential distribution. This is consistent with fully developed speckle noise as demonstrated by the Central Limit theorem.
Abstract: The purpose of this paper is to guide the effort in
improving the economic added value of Indonesian fisheries product
through post fishing program, which is cold storage program.
Indonesia's fisheries potential has been acknowledged by the world.
FAO (2009) stated that Indonesia is one of the tenth highest
producers of fishery products in the world. Based on BPS (Statistics
Indonesia data), the national fisheries production in 2011 reached
5.714 million tons, which 93.55% came from marine fisheries and
6.45% from open waters. Indonesian territory consist of 2/3 of
Indonesian waters, has given enormous benefits for Indonesia,
especially fishermen. To improve the economic level of fishermen
requires efforts to develop fisheries business unit. On of the efforts is
by improving the quality of products which are marketed in the
regional and international levels. It is certainly need the support of
the existence of various fishery facilities (infrastructure to
superstructure), one of which is cold storage. Given the many
benefits of cold storage as a means of processing of fishery resources,
Indonesia Maritime Security Coordinating Board (IMSCB) as one of
the maritime institutions for maritime security and safety, has a
program to empower the coastal community through encourages the
development of cold storage in the middle and lower fishery business
unit. The development of cold storage facilities which able to run its
maximum role requires synergistic efforts of various parties.
Abstract: Wireless sensor networks (WSN) consists of many
sensor nodes that are placed on unattended environments such as
military sites in order to collect important information.
Implementing a secure protocol that can prevent forwarding forged
data and modifying content of aggregated data and has low delay
and overhead of communication, computing and storage is very
important. This paper presents a new protocol for concealed data
aggregation (CDA). In this protocol, the network is divided to
virtual cells, nodes within each cell produce a shared key to send
and receive of concealed data with each other. Considering to data
aggregation in each cell is locally and implementing a secure
authentication mechanism, data aggregation delay is very low and
producing false data in the network by malicious nodes is not
possible. To evaluate the performance of our proposed protocol, we
have presented computational models that show the performance
and low overhead in our protocol.
Abstract: Knowledge-based e-mail systems focus on
incorporating knowledge management approach in order to enhance
the traditional e-mail systems. In this paper, we present a knowledgebased
e-mail system called KS-Mail where people do not only send
and receive e-mail conventionally but are also able to create a sense
of knowledge flow. We introduce semantic processing on the e-mail
contents by automatically assigning categories and providing links to
semantically related e-mails. This is done to enrich the knowledge
value of each e-mail as well as to ease the organization of the e-mails
and their contents. At the application level, we have also built
components like the service manager, evaluation engine and search
engine to handle the e-mail processes efficiently by providing the
means to share and reuse knowledge. For this purpose, we present the
KS-Mail architecture, and elaborate on the details of the e-mail
server and the application server. We present the ontology mapping
technique used to achieve the e-mail content-s categorization as well
as the protocols that we have developed to handle the transactions in
the e-mail system. Finally, we discuss further on the implementation
of the modules presented in the KS-Mail architecture.
Abstract: Emerging Adulthood, the period during ages 18 to 25,
is a new conceptualitation proposed by Arnett which is especially
prevalent in the industrialized countries. Turkey is basically a
developing country having a young population structure.
Investigating the presence of such a life period in such a culture
might be helpful in understanding educational and psychological
needs of people who are in their twenties. With the aim of
investigating Emerging Adulthood in Turkey, a well-known
instrument (IDEA, 2003) was adapted to Turkish language and
Turkish culture. The scale was administered to 296 participants
between 15 and 34 ages and validity and reliability were conducted.
Exploratory factor analysis revealed three subscales. Reliability
coefficients of the scale (Cronbach a) was found as .69. Test-retest
reliability coefficients was found for the scale as .81. Finally, “The
IDEA" with 20 items was obtained to be used in the Turkish
population. The instrument is ready to be administered among
Turkish young people for the investigation of transition to adulthood,
and whether such a emerging adulthood period really existed.
Abstract: Mobile adhoc network (MANET) is a collection of
mobile devices which form a communication network with no preexisting
wiring or infrastructure. Multiple routing protocols have
been developed for MANETs. As MANETs gain popularity, their
need to support real time applications is growing as well. Such
applications have stringent quality of service (QoS) requirements
such as throughput, end-to-end delay, and energy. Due to dynamic
topology and bandwidth constraint supporting QoS is a challenging
task. QoS aware routing is an important building block for QoS
support. The primary goal of the QoS aware protocol is to determine
the path from source to destination that satisfies the QoS
requirements. This paper proposes a new energy and delay aware
protocol called energy and delay aware TORA (EDTORA) based on
extension of Temporally Ordered Routing Protocol (TORA).Energy
and delay verifications of query packet have been done in each node.
Simulation results show that the proposed protocol has a higher
performance than TORA in terms of network lifetime, packet
delivery ratio and end-to-end delay.