Abstract: In this paper, the construction of fast algorithms for the computation of Periodic Walsh Piecewise-Linear PWL transform and the Periodic Haar Piecewise-Linear PHL transform will be presented. Algorithms for the computation of the inverse transforms are also proposed. The matrix equation of the PWL and PHL transforms are introduced. Comparison of the computational requirements for the periodic piecewise-linear transforms and other orthogonal transforms shows that the periodic piecewise-linear transforms require less number of operations than some orthogonal transforms such as the Fourier, Walsh and the Discrete Cosine transforms.
Abstract: Buildings are one of the valuable assets to provide
people with shelters for work, leisure and rest. After years of
attacks by weather, buildings will deteriorate which need proper
maintenance in order to fulfill the requirements and satisfaction of
the users. Poorly managed buildings not just give a negative image
to the city itself, but also pose potential risk hazards to the health
and safety of the general public. As a result, the management of
maintenance projects has played an important role in cities like
Hong Kong where the problem of urban decay has drawn much
attention. However, most research has focused on managing new
construction, and little research effort has been put on maintenance
projects. Given the short duration and more diversified nature of
work, repair and maintenance works are found to be more difficult
to monitor and regulate when compared with new works. Project
participants may face with problems in running maintenance
projects which should be investigated so that proper strategies can
be established. This paper aims to provide a thorough analysis on
the problems of running maintenance projects. A review of
literature on the characteristics of building maintenance projects
was firstly conducted, which forms a solid basis for the empirical
study. Results on the problems and difficulties of running
maintenance projects from the viewpoints of industry practitioners
will also be delivered with a view to formulating effective
strategies for managing maintenance projects successfully.
Abstract: EPC Class-1 Generation-2 UHF tags, one of Radio
frequency identification or RFID tag types, is expected that most
companies are planning to use it in the supply chain in the short term
and in consumer packaging in the long term due to its inexpensive
cost. Because of the very cost, however, its resources are extremely
scarce and it is hard to have any valuable security algorithms in it. It
causes security vulnerabilities, in particular cloning the tags for
counterfeits. In this paper, we propose a product authentication
solution for anti-counterfeiting at application level in the supply chain
and mobile RFID environment. It aims to become aware of
distribution of spurious products with fake RFID tags and to provide a
product authentication service to general consumers with mobile
RFID devices like mobile phone or PDA which has a mobile RFID
reader. We will discuss anti-counterfeiting mechanisms which are
required to our proposed solution and address requirements that the
mechanisms should have.
Abstract: This paper introduces a low cost INS/GPS algorithm for
land vehicle navigation application. The data fusion process is done
with an extended Kalman filter in cascade configuration mode. In
order to perform numerical simulations, MATLAB software has been
developed. Loosely coupled configuration is considered. The results
obtained in this work demonstrate that a low-cost INS/GPS navigation
system is partially capable of meeting the performance requirements
for land vehicle navigation. The relative effectiveness of the kalman
filter implementation in integrated GPS/INS navigation algorithm is
highlighted. The paper also provides experimental results; field test
using a car is carried out.
Abstract: A process flowsheet was developed in ChemCad 6.4
to study the effect of feed moisture contents on the pre-esterification
of waste oils. Waste oils were modelled as a mixture of triolein
(90%), oleic acid (5%) and water (5%). The process mainly consisted
of feed drying, pre-esterification reaction and methanol recovery. The
results showed that the process energy requirements would be
minimized when higher degrees of feed drying and higher preesterification
reaction temperatures are used.
Abstract: Fossil fuels are the major source to meet the world
energy requirements but its rapidly diminishing rate and adverse
effects on our ecological system are of major concern. Renewable
energy utilization is the need of time to meet the future challenges.
Ocean energy is the one of these promising energy resources. Threefourths
of the earth-s surface is covered by the oceans. This enormous
energy resource is contained in the oceans- waters, the air above the
oceans, and the land beneath them. The renewable energy source of
ocean mainly is contained in waves, ocean current and offshore solar
energy. Very fewer efforts have been made to harness this reliable
and predictable resource. Harnessing of ocean energy needs detail
knowledge of underlying mathematical governing equation and their
analysis. With the advent of extra ordinary computational resources
it is now possible to predict the wave climatology in lab simulation.
Several techniques have been developed mostly stem from numerical
analysis of Navier Stokes equations. This paper presents a brief over
view of such mathematical model and tools to understand and
analyze the wave climatology. Models of 1st, 2nd and 3rd generations
have been developed to estimate the wave characteristics to assess the
power potential. A brief overview of available wave energy
technologies is also given. A novel concept of on-shore wave energy
extraction method is also presented at the end. The concept is based
upon total energy conservation, where energy of wave is transferred
to the flexible converter to increase its kinetic energy. Squeezing
action by the external pressure on the converter body results in
increase velocities at discharge section. High velocity head then can
be used for energy storage or for direct utility of power generation.
This converter utilizes the both potential and kinetic energy of the
waves and designed for on-shore or near-shore application. Increased
wave height at the shore due to shoaling effects increases the
potential energy of the waves which is converted to renewable
energy. This approach will result in economic wave energy
converter due to near shore installation and more dense waves due to
shoaling. Method will be more efficient because of tapping both
potential and kinetic energy of the waves.
Abstract: In order to meet environmental norms, Indian fuel
policy aims at producing ultra low sulphur diesel (ULSD) in near
future. A catalyst for meeting such requirements has been developed
and kinetics of this catalytic process is being looked into. In the
present investigations, effect of mass transfer on kinetics of ultra deep
hydrodesulphurization (UDHDS) to produce ULSD has been studied
to determine intrinsic kinetics over a pre-sulphided catalyst.
Experiments have been carried out in a continuous flow micro reactor
operated in the temperature range of 330 to 3600C, whsv of 1 hr-1 at a
pressure of 35 bar, and its parameters estimated. Based on the derived
rate expression and estimated parameters optimum operation range
has been determined for this UDHDS catalyst to obtain ULSD
product.
Abstract: The protection issues in distribution systems with open and closed-loop are studied, and a generalized protection setting scheme based on the traditional over current protection theories is proposed to meet the new requirements. The setting method is expected to be easier realized using computer program, so that the on-line adaptive setting for coordination in distribution system can be implemented. An automatic setting program is created and several cases are taken into practice. The setting results are verified by the coordination curves of the protective devices which are plotted using MATLAB.
Abstract: Fundamental motivation of this paper is how gaze estimation can be utilized effectively regarding an application to games. In games, precise estimation is not always important in aiming targets but an ability to move a cursor to an aiming target accurately is also significant. Incidentally, from a game producing point of view, a separate expression of a head movement and gaze movement sometimes becomes advantageous to expressing sense of presence. A case that panning a background image associated with a head movement and moving a cursor according to gaze movement can be a representative example. On the other hand, widely used technique of POG estimation is based on a relative position between a center of corneal reflection of infrared light sources and a center of pupil. However, a calculation of a center of pupil requires relatively complicated image processing, and therefore, a calculation delay is a concern, since to minimize a delay of inputting data is one of the most significant requirements in games. In this paper, a method to estimate a head movement by only using corneal reflections of two infrared light sources in different locations is proposed. Furthermore, a method to control a cursor using gaze movement as well as a head movement is proposed. By using game-like-applications, proposed methods are evaluated and, as a result, a similar performance to conventional methods is confirmed and an aiming control with lower computation power and stressless intuitive operation is obtained.
Abstract: A large number of semantic web service composition
approaches are developed by the research community and one is
more efficient than the other one depending on the particular
situation of use. So a close look at the requirements of ones particular
situation is necessary to find a suitable approach to use. In this paper,
we present a Technique Recommendation System (TRS) which using
a classification of state-of-art semantic web service composition
approaches, can provide the user of the system with the
recommendations regarding the use of service composition approach
based on some parameters regarding situation of use. TRS has
modular architecture and uses the production-rules for knowledge
representation.
Abstract: Optical Coherence Tomography (OCT) combined
with the Confocal Microscopy, as a noninvasive method, permits the
determinations of materials defects in the ceramic layers depth. For
this study 256 anterior and posterior metal and integral ceramic fixed
partial dentures were used, made with Empress (Ivoclar), Wollceram
and CAD/CAM (Wieland) technology. For each investigate area 350
slices were obtain and a 3D reconstruction was perform from each
stuck. The Optical Coherent Tomography, as a noninvasive method,
can be used as a control technique in integral ceramic technology,
before placing those fixed partial dentures in the oral cavity. The
purpose of this study is to evaluate the capability of En face Optical
Coherence Tomography (OCT) combined with a fluorescent method
in detection and analysis of possible material defects in metalceramic
and integral ceramic fixed partial dentures. As a conclusion,
it is important to have a non invasive method to investigate fixed
partial prostheses before their insertion in the oral cavity in order to
satisfy the high stress requirements and the esthetic function.
Abstract: Globalization, supported by information and
communication technologies, changes the rules of competitiveness
and increases the significance of information, knowledge and
network cooperation. In line with this trend, the need for efficient
trust-building tools has emerged. The absence of trust building
mechanisms and strategies was identified within several studies.
Through trust development, participation on e-business network and
usage of network services will increase and provide to SMEs new
economic benefits. This work is focused on effective trust building
strategies development for electronic business network platforms.
Based on trust building mechanism identification, the questionnairebased
analysis of its significance and minimum level of requirements
was conducted. In the paper, we are confirming the trust dependency
on e-Skills which play crucial role in higher level of trust into the
more sophisticated and complex trust building ICT solutions.
Abstract: This research contribution propels the idea of collaborating environment for the execution of student satellite projects in the backdrop of project management principles. The recent past has witnessed a technological shift in the aerospace industry from the big satellite projects to the small spacecrafts especially for the earth observation and communication purposes. This vibrant shift has vitalized the academia and industry to share their resources and to create a win-win paradigm of mutual success and technological development along with the human resource development in the field of aerospace. Small student satellites are the latest jargon of academia and more than 100 CUBESAT projects have been executed successfully all over the globe and many new student satellite projects are in the development phase. The small satellite project management requires the application of specific knowledge, skills, tools and techniques to achieve the defined mission requirements. The Authors have presented the detailed outline for the project management of student satellites and presented the role of industry to collaborate with the academia to get the optimized results in academic environment.
Abstract: Mobile adhoc network (MANET) is a collection of
mobile devices which form a communication network with no preexisting
wiring or infrastructure. Multiple routing protocols have
been developed for MANETs. As MANETs gain popularity, their
need to support real time applications is growing as well. Such
applications have stringent quality of service (QoS) requirements
such as throughput, end-to-end delay, and energy. Due to dynamic
topology and bandwidth constraint supporting QoS is a challenging
task. QoS aware routing is an important building block for QoS
support. The primary goal of the QoS aware protocol is to determine
the path from source to destination that satisfies the QoS
requirements. This paper proposes a new energy and delay aware
protocol called energy and delay aware TORA (EDTORA) based on
extension of Temporally Ordered Routing Protocol (TORA).Energy
and delay verifications of query packet have been done in each node.
Simulation results show that the proposed protocol has a higher
performance than TORA in terms of network lifetime, packet
delivery ratio and end-to-end delay.
Abstract: We present a simple nonconforming approximation of the linear two–point boundary value problem which violates patch test requirements. Nevertheless the solutions, obtained from these type of approximations, converge to the exact solution.
Abstract: People have always needed to believe in some
supernatural power, which could explain nature phenomena.
Different kinds of religions like Christianity, Hinduism, Islam,
Buddhism have thought believers in all world, how to behave
themselves. We think the most important role of religion in modern
society most important role of religion in modern society is safety of
the People. World and traditional religion played a prominent role in
the socio-cultural progress, and in the development of man as a
spiritual being. At the heart of religious morals the belief in god and
responsibility before it lies and specifies religious and ethical values
and categories . The religion is based on ethical standards historically
developed by society, requirements and concepts, but it puts all
social and moral relations of the person in dependence on religious
values. For everything that the believer makes on a debt or a duty, he
bears moral responsibility before conscience, people and god. The
concept of value of religious morals takes the central place because
the religion from all forms of public consciousness most values is
painted as it is urged to answer vital questions. Any religion not only
considers questions of creation of the world, sense of human
existence, relationship of god and the person, but also offers the
ethical concept, develops rules of behavior of people. The religion a
long time dominated in the history of culture, and during this time
created a set of cultural and material values. The identity of Kazakh
culture can be defined as a Cultural identity traditional ,national
identity and the identity values developed by Kazakh people in
process of cultural-historical development, promoting formation of
Kazakh culture identity on public consciousness. Identity is the
historical process but always the tradition exists in it as a component
of stability, as a component of self that what this identity formed .
Abstract: This paper describes the authorization system
architecture for Pervasive Grid environment. It discusses the
characteristics of classical authorization system and requirements of
the authorization system in pervasive grid environment as well.
Based on our analysis of current systems and taking into account the
main requirements of such pervasive environment, we propose new
authorization system architecture as an extension of the existing grid
authorization mechanisms. This architecture not only supports user
attributes but also context attributes which act as a key concept for
context-awareness thought. The architecture allows authorization of
users dynamically when there are changes in the pervasive grid
environment. For this, we opt for hybrid authorization method that
integrates push and pull mechanisms to combine the existing grid
authorization attributes with dynamic context assertions. We will
investigate the proposed architecture using a real testing environment
that includes heterogeneous pervasive grid infrastructures mapped
over multiple virtual organizations. Various scenarios are described
in the last section of the article to strengthen the proposed mechanism
with different facilities for the authorization procedure.
Abstract: The success of IT-projects concerning the
implementation of business application Software is strongly
depending upon the application of an efficient requirements
management, to understand the business requirements and to realize
them in the IT. But in fact, the Potentials of the requirements
management are not fully exhausted by small and medium sized
enterprises (SME) of the IT sector. To work out recommendations for
action and furthermore a possible solution, allowing a better exhaust
of potentials, it shall be examined in a scientific research project,
which problems occur out of which causes. In the same place, the
storage of knowledge from the requirements management, and its
later reuse are important, to achieve sustainable improvements of the
competitive of the IT-SMEs. Requirements Engineering is one of the
most important topics in Product Management for Software to
achieve the goal of optimizing the success of the software product.
Abstract: Requirement engineering has been the subject of large
volume of researches due to the significant role it plays in the
software development life cycle. However, dynamicity of software
industry is much faster than advances in requirements engineering
approaches. Therefore, this paper aims to systematically review and
evaluate the current research in requirement engineering and identify
new research trends and direction in this field. In addition, various
research methods associated with the Evaluation-based techniques
and empirical study are highlighted for the requirements engineering
field. Finally, challenges and recommendations on future directions
research are presented based on the research team observations
during this study.
Abstract: Modeling of the distributed systems allows us to
represent the whole its functionality. The working system instance
rarely fulfils the whole functionality represented by model; usually
some parts of this functionality should be accessible periodically.
The reporting system based on the Data Warehouse concept seams to
be an intuitive example of the system that some of its functionality is
required only from time to time. Analyzing an enterprise risk
associated with the periodical change of the system functionality, we
should consider not only the inaccessibility of the components
(object) but also their functions (methods), and the impact of such a
situation on the system functionality from the business point of view.
In the paper we suggest that the risk attributes should be estimated
from risk attributes specified at the requirements level (Use Case in
the UML model) on the base of the information about the structure of
the model (presented at other levels of the UML model). We argue
that it is desirable to consider the influence of periodical changes in
requirements on the enterprise risk estimation. Finally, the
proposition of such a solution basing on the UML system model is
presented.