Abstract: Developments in communication technologies
especially in wireless have enabled the progress of low-cost and lowpower
wireless sensor networks (WSNs). The features of such WSN
are holding minimal energy, weak computational capabilities,
wireless communication and an open-medium nature where sensors
are deployed. WSN is underpinned by application driven such as
military applications, the health sector, etc. Due to the intrinsic nature
of the network and application scenario, WSNs are vulnerable to
many attacks externally and internally. In this paper we have focused
on the types of internal attacks of WSNs based on OSI model and
discussed some security requirements, characterizers and challenges
of WSNs, by which to contribute to the WSN-s security research.
Abstract: Matching algorithms have significant importance in
speaker recognition. Feature vectors of the unknown utterance are
compared to feature vectors of the modeled speakers as a last step in
speaker recognition. A similarity score is found for every model in
the speaker database. Depending on the type of speaker recognition,
these scores are used to determine the author of unknown speech
samples. For speaker verification, similarity score is tested against a
predefined threshold and either acceptance or rejection result is
obtained. In the case of speaker identification, the result depends on
whether the identification is open set or closed set. In closed set
identification, the model that yields the best similarity score is
accepted. In open set identification, the best score is tested against a
threshold, so there is one more possible output satisfying the
condition that the speaker is not one of the registered speakers in
existing database. This paper focuses on closed set speaker
identification using a modified version of a well known matching
algorithm. The results of new matching algorithm indicated better
performance on YOHO international speaker recognition database.
Abstract: The relationships between Proteolysis and soluble
calcium levels with hardness of cheese texture were investigated in
Iranian UF white cheese during 90 d ripening. Cheeses were sampled
in interior and exterior. Results showed that levels of proteolysis,
soluble calcium and hardness of cheese texture changed significantly
(p< 0.05) over ripening. Levels of proteolysis and hardness were
significantly (p< 0.05) different in interior and exterior zones of
cheeses. External zones of cheeses became softer and had higher
levels of proteolysis compared to internal zones during ripening. The
highest correlation coefficient (r2= 0.979; p
Abstract: Young patients suffering from Cerebral Palsy are
facing difficult choices concerning heavy surgeries. Diagnosis settled
by surgeons can be complex and on the other hand decision for
patient about getting or not such a surgery involves important
reflection effort. Proposed software combining prediction for
surgeries and post surgery kinematic values, and from 3D model
representing the patient is an innovative tool helpful for both patients
and medicine professionals. Beginning with analysis and
classification of kinematics values from Data Base extracted from
gait analysis in 3 separated clusters, it is possible to determine close
similarity between patients. Prediction surgery best adapted to
improve a patient gait is then determined by operating a suitable
preconditioned neural network. Finally, patient 3D modeling based
on kinematic values analysis, is animated thanks to post surgery
kinematic vectors characterizing the closest patient selected from
patients clustering.
Abstract: Segmentation of a color image composed of different
kinds of regions can be a hard problem, namely to compute for an
exact texture fields. The decision of the optimum number of
segmentation areas in an image when it contains similar and/or un
stationary texture fields. A novel neighborhood-based segmentation
approach is proposed. A genetic algorithm is used in the proposed
segment-pass optimization process. In this pass, an energy function,
which is defined based on Markov Random Fields, is minimized. In
this paper we use an adaptive threshold estimation method for image
thresholding in the wavelet domain based on the generalized
Gaussian distribution (GGD) modeling of sub band coefficients. This
method called Normal Shrink is computationally more efficient and
adaptive because the parameters required for estimating the threshold
depend on sub band data energy that used in the pre-stage of
segmentation. A quad tree is employed to implement the multi
resolution framework, which enables the use of different strategies at
different resolution levels, and hence, the computation can be
accelerated. The experimental results using the proposed
segmentation approach are very encouraging.
Abstract: The present work deals with the structural analysis of
turbine blades and modeling of turbine blades. A common failure
mode for turbine machines is high cycle of fatigue of compressor and
turbine blades due to high dynamic stresses caused by blade vibration
and resonance within the operation range of the machinery. In this
work, proper damping system will be analyzed to reduce the
vibrating blade. The main focus of the work is the modeling of under
platform damper to evaluate the dynamic analysis of turbine-blade
vibrations. The system is analyzed using Bond graph technique. Bond
graph is one of the most convenient ways to represent a system from
the physical aspect in foreground. It has advantage of putting together
multi-energy domains of a system in a single representation in a
unified manner. The bond graph model of dry friction damper is
simulated on SYMBOLS-shakti® software. In this work, the blades
are modeled as Timoshenko beam. Blade Vibrations under different
working conditions are being analyzed numerically.
Abstract: The Philosophy of Sufficiency Economy, bestowed
by His Majesty the King Bhumibol Adulyadej to the people of
Thailand, highlights a balanced way of living. Three principles of
moderation reasonableness, and immunity, along with the conditions
for morality and knowledge, can be applied to any level of the
society–from an individual to the nation. The Philosophy of
Sufficiency Economy helps address the current development
challenges, which are issues on institutions, environmental
sustainability, human well-being, and the role of the government.
Abstract: This study examines knowledge management in the public organizations in Iran. The purpose of this article is to provide a conceptual framework for application of knowledge management in public organizations. The study indicates that an increasing tendency for implementation of knowledge management in organizations is emerging. Nonetheless knowledge management in public organizations is toddler and little has been done to bring the subject to use in the public sector. The globalization of change and popularization of some values like participation, citizen-orientation and knowledge-orientation in the new theories of public administration requires that the knowledge management is considered and attend to in the public sector. This study holds that a knowledge management framework for public organizations is different from this in the public sector, because public sector is stakeholder-dependent while the private is shareholder-dependent. Based on the research, we provide a conceptual model. The model proposed involves three factors: Organizational, knowledge citizens and contextual factors. The study results indicate these factors affect on knowledge management in public organizations in Iran.
Abstract: This paper addresses the problem of recognizing and
interpreting the behavior of human workers in industrial
environments for the purpose of integrating humans in software
controlled manufacturing environments. In this work we propose a
generic concept in order to derive solutions for task-related manual
production applications. Thus, we are able to use a versatile concept
providing flexible components and being less restricted to a specific
problem or application. We instantiate our concept in a spot welding
scenario in which the behavior of a human worker is interpreted
when performing a welding task with a hand welding gun. We
acquire signals from inertial sensors, video cameras and triggers and
recognize atomic actions by using pose data from a marker based
video tracking system and movement data from inertial sensors.
Recognized atomic actions are analyzed on a higher evaluation level
by a finite state machine.
Abstract: Team efficacy beliefs show promise in enhancing
team performance. Using a model-based quantitative research design,
we investigated the antecedents and performance consequences of
generalized team efficacy (potency) in a sample of 56 capital projects
executed by 15 Fortune 500 companies in the process industries.
Empirical analysis of our field survey identified that generalized
team efficacy beliefs were positively associated with an objective
measure of project cost performance. Regression analysis revealed
that team competence, empowering leadership, and performance
feedback all predicted generalized team efficacy beliefs. Tests of
mediation revealed that generalized team efficacy fully mediated
between these three inputs and project cost performance.
Abstract: This paper aims to study the methodology of building the knowledge of planning adequate punches in order to complete the task of strip layout for shearing processes, using progressive dies. The proposed methodology uses die design rules and characteristics of different types of punches to classify them into five groups: prior use (the punches must be used first), posterior use (must be used last), compatible use (may be used together), sequential use (certain punches must precede some others) and simultaneous use (must be used together). With these five groups of punches, the searching space of feasible designs will be greatly reduced, and superimposition becomes a more effective method of punch layout. The superimposition scheme will generate many feasible solutions, an evaluation function based on number of stages, moment balancing and strip stability is developed for helping designers to find better solutions.
Abstract: Collaborative networked learning (hereafter CNL)
was first proposed by Charles Findley in his work “Collaborative
networked learning: online facilitation and software support" as part
of instructional learning for the future of the knowledge worker. His
premise was that through electronic dialogue learners and experts
could interactively communicate within a contextual framework to
resolve problems, and/or to improve product or process knowledge.
Collaborative learning has always been the forefront of educational
technology and pedagogical research, but not in the mainstream of
operations management. As a result, there is a large disparity in the
study of CNL, and little is known about the antecedents of network
collaboration and sharing of information among diverse employees in
the manufacturing environment. This paper presents a model to
bridge the gap between theory and practice. The objective is that
manufacturing organizations will be able to accelerate organizational
learning and sharing of information through various collaborative
Abstract: Megalopolis is a group of densely populated metropolitan areas that combine to form an urban complex. Since China introduced the economic reforms in late 1970s, the Chinese urban system has experienced unprecedented growth. The process of urbanisation prevailed in the 1980s, and the process of predominantly large city growth appeared to continue through 1990s and 2000s. In this study, the magnitude and pattern of urbanisation in China during 1990s were examined using remotely sensed imagery acquired by TM/ETM+ sensor onboard the Landsat satellites. The development of megalopolis areas in China was also studied based on the GIS analysis of the increases of urban and built-up area from 1990 to 2000. The analysis suggests that in the traditional agricultural zones in China, e.g., Huang-Huai-Hai Plains, Changjiang River Delta, Pearl River Delta and Sichuan Basin, the urban and built-up areas increased by 1.76 million hectares, of which 0.82 million hectares are expansion of urban areas, an increase of 24.78% compared with 1990 at the national scale. The Yellow River Delta, Changjiang River Delta and Pearl River Delta also saw an increase of urban and built-up area by 63.9%, 66.2% and 83.0% respectively. As a result, three major megalopolises were developed in China: the Guangzhou-Shenzhen-Hong Kong- Macau (Pearl River Delta: PRD) megalopolis area, the Shanghai- Nanjing-Hangzhou (Changjiang River Delta: CRD) megalopolis area and the Beijing-Tianjing-Tangshan-Qinhuangdao (Yellow River Delta-Bohai Sea Ring: YRD) megalopolis area. The relationship between the processed of megalopolisation and the inter-provincial population flow was also explored in the context of social-economic and transport infrastructure development in Post-reform China.
Abstract: The toxicity of aqueous extracts of two plants,
Nicotiana tobacum and Eucalyptus globulus were investigated against second instar larvae of Lycoriella auripila, one of the most
important pests of button mushroom, using agar dilution technique.
Seven concentrations of aqueous extracts of both plants were applied
on second instar larvae and their mortality were evaluated after 24, 48 and 72 h. The obtained results revealed that aqueous extracts of N.
tabacum and E. globulus caused 77.55 and 72.5% mortality of larvae
of L. auripila at concentration of 4000 ppm after 72h, respectively. Toxicities of tobacco extract after 24, 48 and 72 h were 1.52, 1.85
and 1.70 times greather than eucalyptus, respectively. The estimated LC50 after 24, 48 and 72 h were 7316.5, 2468.5 and 2013.1 ppm for
tobacco and 64870.0, 6839.5 and 3326.4 ppm for eucalyptus, respectively. These plants merit further study as potential insecticides
for the control of L. auripila.
Abstract: CEMTool is a command style design and analyzing
package for scientific and technological algorithm and a matrix based
computation language. In this paper, we present new 2D & 3D
finite element method (FEM) packages for CEMTool. We discuss
the detailed structures and the important features of pre-processor,
solver, and post-processor of CEMTool 2D & 3D FEM packages. In
contrast to the existing MATLAB PDE Toolbox, our proposed FEM
packages can deal with the combination of the reserved words. Also,
we can control the mesh in a very effective way. With the introduction
of new mesh generation algorithm and fast solving technique, our
FEM packages can guarantee the shorter computational time than
MATLAB PDE Toolbox. Consequently, with our new FEM packages,
we can overcome some disadvantages or limitations of the existing
MATLAB PDE Toolbox.
Abstract: Wave generation methodology has been developed
and validated by simulating wave in CFD. In this analysis, Flap type
wave maker has been modeled numerically with wave basin to
generate waves for marine experimental analysis. Irregular waves are
arrived from the wave spectrum, and this wave has been simulated in
CFD. Generated irregular wave has been compared with an analytical
wave. Simulated wave has been processed for FFT analysis, and the
wave spectrum is validated with original wave spectrum.
Abstract: Until recently it would have been unusual to consider classifying population movements and refugees as security problem. However, efforts at shaping our world to make ourselves secure have paradoxically led to ever greater insecurity. The feeling of uncertainty, pertinent throughout all discourses of security, has led to the creation of security production into seemingly benign routines of everyday life. Yet, the paper argues, neither of security discourses accounted for, disclosed and challenged the fundamental aporias embedded in Western security narratives. In turn, the paper aims to unpick the conventional security wisdom, which is haunted with strong ontologies, embedded in the politics of Orientalism, and (in)security nexus. The paper concludes that current security affair conceals the integral impossibility of fulfilling its very own promise of assured security. The paper also provides suggestions about alternative security discourse based on mutual dialogue.
Abstract: Metal cutting is a severe plastic deformation process
involving large strains, high strain rates, and high temperatures.
Conventional analysis of the chip formation process is based on bulk
material deformation disregarding the inhomogeneous nature of the
material microstructure. A series of orthogonal cutting tests of AISI
1045 and 1144 steel were conducted which yielded similar process
characteristics and chip formations. With similar shear angles and cut
chip thicknesses, shear strains for both chips were found to range
from 2.0 up to 2.8. The manganese-sulfide (MnS) precipitate in the
1144 steel has a very distinct and uniform shape which allows for
comparison before and after chip formation. From close observations
of MnS precipitates in the cut chips it is shown that the conventional
approach underestimates plastic strains in metal cutting.
Experimental findings revealed local shear strains around a value of
6. These findings and their implications are presented and discussed.
Abstract: This paper proposes a new model to support user
queries on postgraduate research information at Universiti Tenaga
Nasional. The ontology to be developed will contribute towards
shareable and reusable domain knowledge that makes knowledge
assets intelligently accessible to both people and software. This work
adapts a methodology for ontology development based on the
framework proposed by Uschold and King. The concepts and
relations in this domain are represented in a class diagram using the
Protégé software. The ontology will be used to support a menudriven
query system for assisting students in searching for
information related to postgraduate research at the university.
Abstract: Active power filter continues to be a powerful tool to control harmonics in power systems thereby enhancing the power quality. This paper presents a fuzzy tuned PID controller based shunt active filter to diminish the harmonics caused by non linear loads like thyristor bridge rectifiers and imbalanced loads. Here Fuzzy controller provides the tuning of PID, based on firing of thyristor bridge rectifiers and variations in input rms current. The shunt APF system is implemented with three phase current controlled Voltage Source Inverter (VSI) and is connected at the point of common coupling for compensating the current harmonics by injecting equal but opposite filter currents. These controllers are capable of controlling dc-side capacitor voltage and estimating reference currents. Hysteresis Current Controller (HCC) is used to generate switching signals for the voltage source inverter. Simulation studies are carried out with non linear loads like thyristor bridge rectifier along with unbalanced loads and the results proved that the APF along with fuzzy tuned PID controller work flawlessly for different firing angles of non linear load.