Abstract: The purpose of this work is fast design optimization of
the seal chamber. The study includes the mass transfer between lower
and upper chamber on seal chamber for hot water application pumps.
The use of Fluent 12.1 commercial code made it possible to capture
complex flow with heat-mass transfer, radiation, Tailor instability,
and buoyancy effect. Realizable k-epsilon model was used for
turbulence modeling. Radiation heat losses were taken into account.
The temperature distribution at seal region is predicted with respect
to heat addition.
Results show the possibilities of the model simplifications by
excluding the water domain in low chamber from calculations. CFD
simulations permit to improve seal chamber design to meet target
water temperature around the seal. This study can be used for the
analysis of different seal chamber configurations.
Abstract: In this paper, Lattice Boltzmann Method (LBM) is used to study laminar flow with mixed convection heat transfer inside a two-dimensional inclined lid-driven rectangular cavity with aspect ratio AR = 3. Bottom wall of the cavity is maintained at lower temperature than the top lid, and its vertical walls are assumed insulated. Top lid motion results in fluid motion inside the cavity. Inclination of the cavity causes horizontal and vertical components of velocity to be affected by buoyancy force. To include this effect, calculation procedure of macroscopic properties by LBM is changed and collision term of Boltzmann equation is modified. A computer program is developed to simulate this problem using BGK model of lattice Boltzmann method. The effects of the variations of Richardson number and inclination angle on the thermal and flow behavior of the fluid inside the cavity are investigated. The results are presented as velocity and temperature profiles, stream function contours and isotherms. It is concluded that LBM has good potential to simulate mixed convection heat transfer problems.
Abstract: In this paper, we have developed a method to
compute fractal dimension (FD) of discrete time signals, in the
time domain, by modifying the box-counting method. The size
of the box is dependent on the sampling frequency of the
signal. The number of boxes required to completely cover the
signal are obtained at multiple time resolutions. The time
resolutions are made coarse by decimating the signal. The loglog
plot of total number of boxes required to cover the curve
versus size of the box used appears to be a straight line, whose
slope is taken as an estimate of FD of the signal. The results
are provided to demonstrate the performance of the proposed
method using parametric fractal signals. The estimation
accuracy of the method is compared with that of Katz, Sevcik,
and Higuchi methods. In addition, some properties of the FD
are discussed.
Abstract: We present a new approach to evaluation of Cyber Security in Power Systems using the method of modeling the power systems Infrastructure using software agents. Interfaces between module and the home smart meter are recognized as the primary points of intrusion.
Abstract: This paper describes the design and implementation of cyber video consultation systems(CVCS) using hybrid P2P for video consultation between remote sites. The proposed system is based on client-server and P2P(Peer to Peer) architecture, where client-server is used for communication with the MCU(Multipoint Control Unit) and P2P is used for the cyber video consultation. The developed video consultation system decreases server traffic, and cuts down network expenses, as the multimedia data decentralizes to the client by hybrid P2P architecture. Also the developed system is tested by the group-type video consultation system using communication protocol and application software through Ethernet networks.
Abstract: For any country the project management has been a
vital part for its development. The highly competitive business world
has created tremendous pressure on the project managers to achieve
success. The pressure is derived from survival and profit building in
business organizations which compels the project managers to pursue
unethical practices. As a result unethical activities in business
projects can be found easily where situations or issues arise due to
dubious business practice, high corruption, or absolute violation of
the law. The recent spur on Commonwealth games to be organized in
New Delhi indicates towards the same. It has been seen that the
project managers mainly focus on cost, time, and quality rather than
social impact and long term effects of the project. Surprisingly the
literature as well as the practitioner-s perspective also does not
identify the role of ethics in project success. This paper identifies
ethics as the fourth most important dimension in the project based
organizations. The paper predicts that the approach of considering
ethics will result in sustainability of the project. It will increase
satisfaction and loyalty of the customers as well as create harmony,
trust, brotherhood, values and morality among the team members.
This paper is conceptual in nature as inadequate literature exists
linking the project success with an ethical approach.
Abstract: It is important problems to increase the detection rates
and reduce false positive rates in Intrusion Detection System (IDS).
Although preventative techniques such as access control and
authentication attempt to prevent intruders, these can fail, and as a
second line of defence, intrusion detection has been introduced. Rare
events are events that occur very infrequently, detection of rare
events is a common problem in many domains. In this paper we
propose an intrusion detection method that combines Rough set and
Fuzzy Clustering. Rough set has to decrease the amount of data and
get rid of redundancy. Fuzzy c-means clustering allow objects to
belong to several clusters simultaneously, with different degrees of
membership. Our approach allows us to recognize not only known
attacks but also to detect suspicious activity that may be the result of
a new, unknown attack. The experimental results on Knowledge
Discovery and Data Mining-(KDDCup 1999) Dataset show that the
method is efficient and practical for intrusion detection systems.
Abstract: Modular multiplication is the basic operation
in most public key cryptosystems, such as RSA, DSA, ECC,
and DH key exchange. Unfortunately, very large operands
(in order of 1024 or 2048 bits) must be used to provide
sufficient security strength. The use of such big numbers
dramatically slows down the whole cipher system, especially
when running on embedded processors.
So far, customized hardware accelerators - developed on
FPGAs or ASICs - were the best choice for accelerating
modular multiplication in embedded environments. On the
other hand, many algorithms have been developed to speed
up such operations. Examples are the Montgomery modular
multiplication and the interleaved modular multiplication
algorithms. Combining both customized hardware with
an efficient algorithm is expected to provide a much faster
cipher system.
This paper introduces an enhanced architecture for computing
the modular multiplication of two large numbers X
and Y modulo a given modulus M. The proposed design is
compared with three previous architectures depending on
carry save adders and look up tables. Look up tables should
be loaded with a set of pre-computed values. Our proposed
architecture uses the same carry save addition, but replaces
both look up tables and pre-computations with an enhanced
version of sign detection techniques. The proposed architecture
supports higher frequencies than other architectures.
It also has a better overall absolute time for a single operation.
Abstract: The city of Melbourne in Victoria, Australia, provides a number of examples of how a growing city can integrate urban planning and water planning to achieve sustainable urban development, environmental protection, liveability and integrated water management outcomes, and move towards becoming a “Water Sensitive City". Three examples are provided - the development at Botanic Ridge, where a 318 hectare residential development is being planned and where integrated water management options are being implemented using a “triple bottom line" sustainability investment approach; the Toolern development, which will capture and reuse stormwater and recycled water to greatly reduce the suburb-s demand for potable water, and the development at Kalkallo where a 1,200 hectare industrial precinct development is planned which will merge design of the development's water supply, sewerage services and stormwater system. The Paper argues that an integrated urban planning and water planning approach is fundamental to creating liveable, vibrant communities which meet social and financial needs while being in harmony with the local environment. Further work is required on developing investment frameworks and risk analysis frameworks to ensure that all possible solutions can be assessed equally.
Abstract: Most of the commercial gluten free products are
nutritionally inferior when compared to gluten containing
counterparts as manufacturers most often use the refined flours and
starches. So it is possible that people on gluten free diet have low
intake of fibre content. The foxtail millet flour and copra meal are
gluten free and have high fibre and protein contents. The formulation
of fibre rich gluten free cookies was optimized by response surface
methodology considering independent process variables as proportion
of Foxtail millet (Setaria italica) flour in mixed flour, fat content and
guar gum. The sugar, sodium chloride, sodium bicarbonates and
water were added in fixed proportion as 60, 1.0, 0.4 and 20% of
mixed flour weight, respectively. Optimum formulation obtained for
maximum spread ratio, fibre content, surface L-value, overall
acceptability and minimum breaking strength were 80% foxtail millet
flour in mixed flour, 42.8 % fat content and 0.05% guar gum.
Abstract: 4G Communication Networks provide heterogeneous
wireless technologies to mobile subscribers through IP based
networks and users can avail high speed access while roaming across
multiple wireless channels; possible by an organized way to manage
the Quality of Service (QoS) functionalities in these networks. This
paper proposes the idea of developing a novel QoS optimization
architecture that will judge the user requirements and knowing peak
times of services utilization can save the bandwidth/cost factors. The
proposed architecture can be customized according to the network
usage priorities so as to considerably improve a network-s QoS
performance.
Abstract: The Eulerian numerical method is proposed to analyze
the explosion in tunnel. Based on this method, an original software
M-MMIC2D is developed by Cµ program language. With this
software, the explosion problem in the tunnel with three
expansion-chambers is numerically simulated, and the results are
found to be in full agreement with the observed experimental data.
Abstract: The purpose of this paper is to demonstrate the ability
of a genetic programming (GP) algorithm to evolve a team of data
classification models. The GP algorithm used in this work is
“multigene" in nature, i.e. there are multiple tree structures (genes)
that are used to represent team members. Each team member assigns
a data sample to one of a fixed set of output classes. A majority vote,
determined using the mode (highest occurrence) of classes predicted
by the individual genes, is used to determine the final class
prediction. The algorithm is tested on a binary classification problem.
For the case study investigated, compact classification models are
obtained with comparable accuracy to alternative approaches.
Abstract: The present investigation aimed to study the
histomorphometric characterizations of the thyroid gland of the duck.
Five adult male and five adult female ducks were used in the
experiment. Results showed that the overall histological structure of
the thyroid gland of the duck were similar to those of the other
vertebrae. The gland consisted of roughly spherical randomly
distributed micro and macrofollicles with very little interstitial tissue
between them. Each follicle is lined by a single layer of epithelial
cells enclosing a cavity, the follicular cavity, which is filled with
colloid. Ultrastructural findings showed that the apical surface of the
follicular cells bears a variable number of short, irregularly
distributed microvilli which are apparently more numerous on the
columnar cells than on the lower, relatively inactive cells.
Mitochondria and rough endoplasmic reticulum occupy the
subnuclear region of the follicular cell, whereas the Golgi complex,
free ribosomes and colloid droplets were found in the apical
cytoplasm. At light or electron microscopic levels, there was no sex
difference in histomorphometric characteristics of the thyroid
glands.ls.
Abstract: By taking advantage of computer-s processing power, an unlimited number of variations and parameters in both spatial and environmental can be provided while following the same set of rules and constraints. This paper focuses on using the tools of parametric urbanism towards a more responsive environmental and sustainable urban morphology. It presents an understanding to Parametric Urban Comfort Envelope (PUCE) as an interactive computational assessment urban model. In addition, it investigates the applicability potentials of this model to generate an optimized urban form to Borg El Arab city (a new Egyptian Community) concerning the human comfort values specially wind and solar envelopes. Finally, this paper utilizes its application outcomes -both visual and numerical- to extend the designer-s limitations by decrease the concern of controlling and manipulation of geometry, and increase the designer-s awareness about the various potentials of using the parametric tools to create relationships that generate multiple geometric alternatives.
Abstract: Optical network uses a tool for routing which is called
Latin router. These routers use particular algorithms for routing. In this paper, we present algorithm for configuration of optical network that is optimized regarding previous algorithm. We show that by decreasing the number of hops for source-destination in lightpath number of satisfied request is less. Also we had shown that more than
single-hop lightpath relating single-hop lightpath is better.
Abstract: An optimal solution for a large number of constraint
satisfaction problems can be found using the technique of
substitution and elimination of variables analogous to the technique
that is used to solve systems of equations. A decision function
f(A)=max(A2) is used to determine which variables to eliminate. The
algorithm can be expressed in six lines and is remarkable in both its
simplicity and its ability to find an optimal solution. However it is
inefficient in that it needs to square the updated A matrix after each
variable elimination. To overcome this inefficiency the algorithm is
analyzed and it is shown that the A matrix only needs to be squared
once at the first step of the algorithm and then incrementally updated
for subsequent steps, resulting in significant improvement and an
algorithm complexity of O(n3).
Abstract: Milk is a very important nutrient. Low productivity is
a problem of Turkish dairy farming. During recent years, Turkish government has supported cooperatives that assist milk producers and
encouraged farmers to become cooperative members. Turkish
government established several ways to support specially smallholders. For example Ministry of Agriculture and Rural Affairs
(MARA) provided two to four cows to villagers on a grant or loan basis with a long repayment period at low interest rates by
cooperatives. Social Support Project in Rural Areas (SSPRA) is
another support program targeting only disadvantaged people,
especially poor villager. Both programs have a very strong social
support component and similar objectives. But there are minor
differences between them in terms of target people, terms and conditions of the credit supplied Isparta province in Mediterranean region of Turkey is one of the
supported regions. MARA distributed dairy cows to 1072 farmers through 16 agricultural cooperatives in Isparta province in the context
of SSPRA. In this study, economic-social impacts on dairy cattle project
implemented through cooperatives were examined in Isparta. Primary data were collected from 12 cooperatives- president. The
data were obtained by personal interview through a questionnaire and
to cooperatives and given to farms benefiting from the project in
order to reveal the economic and social developments.
Finding of the study revealed that project provided new job
opportunities and improved quality of livestock. It was found that producers who benefited from the project were more willing to
participate in cooperative or other producer organizations.
Abstract: Sport is one of the sectors in which the largest
technical projections regarding the functions of textiles can be found.
He is a large consumer of high performance composite materials and
new fibers. It is one of the sectors where the innovation is the most
important when the greatest numbers of spectacular developments are
aimed at increasing performance. In medicine, textile innovation is
used and contributes in the amelioration of different materials such as
dressing, orthosis, bandages, etc. The hygienic textiles in non-woven
materials record a strong growth. The objective of this study is to
show the different advances of development we obtained in the both
ways (sport and medicine). Polyamide fibers where developed
tacking into account the specification of the high level athlete’s
performance like swimming and triathlon (Olympic Games, Brazil
2016). The first textile utilization was for skiing (Olympic Games,
Sotchi 2014). The different textiles technologies where adapted for
medicine.
Abstract: Intelligent Video-Surveillance (IVS) systems are
being more and more popular in security applications. The analysis
and recognition of abnormal behaviours in a video sequence has
gradually drawn the attention in the field of IVS, since it allows
filtering out a large number of useless information, which guarantees
the high efficiency in the security protection, and save a lot of human
and material resources. We present in this paper ADABeV, an
intelligent video-surveillance framework for event recognition in
crowded scene to detect the abnormal human behaviour. This
framework is attended to be able to achieve real-time alarming,
reducing the lags in traditional monitoring systems. This architecture
proposal addresses four main challenges: behaviour understanding in
crowded scenes, hard lighting conditions, multiple input kinds of
sensors and contextual-based adaptability to recognize the active
context of the scene.