Photonic Crystal Waveguide 1x3 Flexible Power Splitter for Optical Network

A compact 1x3 power splitter based on Photonic Crystal Waveguides (PCW) with flexible power splitting ratio is presented in this paper. Multimode interference coupler (MMI) is integrated with PCW. The device size reduction compared with the conventional MMI power splitter is attributed to the large dispersion of the PCW. Band Solve tool is used to calculate the band structure of PCW. Finite Difference Time Domain (FDTD) method is adopted to simulate the relevant structure at 1550nm wavelength. The device is polarization insensitive and allows the control of output (o/p) powers within certain percentage points for both polarizations.

Intelligent ABS Fuzzy Controller for Diverse RoadSurfaces

Fuzzy controllers are potential candidates for the control of nonlinear, time variant and also complicated systems. Anti lock brake system (ABS) which is a nonlinear system, may not be easily controlled by classical control methods. An intelligent Fuzzy control method is very useful for this kind of nonlinear system. A typical antilock brake system (ABS) by sensing the wheel lockup, releases the brakes for a short period of time, and then reapplies again the brakes when the wheel spins up. In this paper, an intelligent fuzzy ABS controller is designed to adjust slipping performance for variety of roads. There are tow major sections in the proposing control system. First section consists of tow Fuzzy-Logic Controllers (FLC) providing optimal brake torque for both front and rear wheels. Second section which is also a FLC provides required amount of slip and torque references properties for different kind of roads. Simulation results of our proposed intelligent ABS for three different kinds of road show more reliable and better performance in compare with two other break systems.

A Review on WEB Resources in Teaching of Geotechnical Engineering

The use of computer hardware and software in education and training dates to the early 1940s, when American researchers developed flight simulators which used analog computers to generate simulated onboard instrument data.Computer software is widely used to help engineers and undergraduate student solve their problems quickly and more accurately. This paper presents the list of computer software in geotechnical engineering.

A Logic Approach to Database Dynamic Updating

We introduce a logic-based framework for database updating under constraints. In our framework, the constraints are represented as an instantiated extended logic program. When performing an update, database consistency may be violated. We provide an approach of maintaining database consistency, and study the conditions under which the maintenance process is deterministic. We show that the complexity of the computations and decision problems presented in our framework is in each case polynomial time.

Microstructure and Mechanical Properties of Duplex Stainless steel for Anchor Bolt Application

Most buildings have been using anchor bolts commonly for installing outdoor advertising structures. Anchor bolts of common carbon steel are widely used and often installed indiscriminately by inadequate installation standards. In the area where strong winds frequently blow, falling accidents of outdoor advertising structures can occur and cause a serious disaster, which is very dangerous and to be prevented. In this regard, the development of high-performance anchor bolts is urgently required. In the present study, 25Cr-8Ni-1.5Si-1Mn-0.4C alloy was produced by traditional vacuum induction melting (VIM) for the application of anchor bolt. The alloy composition is revealed as a duplex microstructure from thermodynamic phase analysis by FactSage® and confirmed by metallographic experiment. Addition of Nitrogen to the alloy was found to reduce the ferritic phase domain and significantly increase the hardness and the tensile strength. Microstructure observation revealed mixed structure of austenite and ferrite with fine carbide distributed along the grain and phase boundaries.

A Set Theory Based Factoring Technique and Its Use for Low Power Logic Design

Factoring Boolean functions is one of the basic operations in algorithmic logic synthesis. A novel algebraic factorization heuristic for single-output combinatorial logic functions is presented in this paper and is developed based on the set theory paradigm. The impact of factoring is analyzed mainly from a low power design perspective for standard cell based digital designs in this paper. The physical implementation of a number of MCNC/IWLS combinational benchmark functions and sub-functions are compared before and after factoring, based on a simple technology mapping procedure utilizing only standard gate primitives (readily available as standard cells in a technology library) and not cells corresponding to optimized complex logic. The power results were obtained at the gate-level by means of an industry-standard power analysis tool from Synopsys, targeting a 130nm (0.13μm) UMC CMOS library, for the typical case. The wire-loads were inserted automatically and the simulations were performed with maximum input activity. The gate-level simulations demonstrate the advantage of the proposed factoring technique in comparison with other existing methods from a low power perspective, for arbitrary examples. Though the benchmarks experimentation reports mixed results, the mean savings in total power and dynamic power for the factored solution over a non-factored solution were 6.11% and 5.85% respectively. In terms of leakage power, the average savings for the factored forms was significant to the tune of 23.48%. The factored solution is expected to better its non-factored counterpart in terms of the power-delay product as it is well-known that factoring, in general, yields a delay-efficient multi-level solution.

Contact Drying Simulation of Particulate Materials: A Comprehensive Approach

In this work, simulation algorithms for contact drying of agitated particulate materials under vacuum and at atmospheric pressure were developed. The implementation of algorithms gives a predictive estimation of drying rate curves and bulk bed temperature during contact drying. The calculations are based on the penetration model to describe the drying process, where all process parameters such as heat and mass transfer coefficients, effective bed properties, gas and liquid phase properties are estimated with proper correlations. Simulation results were compared with experimental data from the literature. In both cases, simulation results were in good agreement with experimental data. Few deviations were identified and the limitations of the predictive capabilities of the models are discussed. The programs give a good insight of the drying behaviour of the analysed powders.

The Uses of Conspiracy Theories for the Construction of a Political Religion in Venezuela

This article analyses conspiracy theories as part of the wider discourses of missionary politics. It presents a case study of Venezuela and describes how its leaders use conspiracy theories as political tools. Through quotes taken form Venezuelan president Chavez-s public speeches and other sources, and through a short analysis of the ideological basis of his discourses, it shows how conspiracy theories are constructed and how they affect the local political praxis. The article also describes how conspiracy theories have been consistently used as an important part of the construction of a political religion for the New Man of the Bolivarian Revolution. It concludes that the use of conspiracy theories by political leaders produces a sense of loss of political agency.

A Proposed Framework for Improving IT Utilization in the Energy Industry

The purpose of this study is to suggest direction for future study of the energy-IT industry that will be used for framework to increase IT utilization in the energy industry. Recently, Green IT is a becoming global issue because of global environmental pollution. Also, IT roles in energy industry are becoming more important. However, the related studies were IT industry oriented that is not sufficient to make plan for Green energy. Therefore, after analyzing existing studies related to Green energy and Green IT, re-categorization for Green energy-IT industry was suggested. Direction of framework is based on energy industry that enable to link between energy and IT. The results of this study suggest comprehensive insight to Green energy-IT industry. Thus it is able to provide useful implications and guidelines to increase IT utilization in the energy industry.

House Indoor Thermal and Health Conditions with Different Passive Designs

According to the Auckland climate, building passive design more focus on improving winter indoor thermal and health conditions. Based on field study data of indoor air temperature and relative humidity close to ceiling and floor of an insulated Auckland townhouse with and without a whole home mechanical ventilation system, this study is to analysis variation of indoor microclimate data of an Auckland townhouse using or not using the mechanical ventilation system to evaluate winter indoor thermal and health conditions for the future house design with a mechanical ventilation system.

A Probability based Pair Extension Method in Protein 2-DE Gel Image Analysis

The two-dimensional gel electrophoresis method (2-DE) is widely used in Proteomics to separate thousands of proteins in a sample. By comparing the protein expression levels of proteins in a normal sample with those in a diseased one, it is possible to identify a meaningful set of marker proteins for the targeted disease. The major shortcomings of this approach involve inherent noises and irregular geometric distortions of spots observed in 2-DE images. Various experimental conditions can be the major causes of these problems. In the protein analysis of samples, these problems eventually lead to incorrect conclusions. In order to minimize the influence of these problems, this paper proposes a partition based pair extension method that performs spot-matching on a set of gel images multiple times and segregates more reliable mapping results which can improve the accuracy of gel image analysis. The improved accuracy of the proposed method is analyzed through various experiments on real 2-DE images of human liver tissues.

Development of Maximum Entropy Method for Prediction of Droplet-size Distribution in Primary Breakup Region of Spray

Droplet size distributions in the cold spray of a fuel are important in observed combustion behavior. Specification of droplet size and velocity distributions in the immediate downstream of injectors is also essential as boundary conditions for advanced computational fluid dynamics (CFD) and two-phase spray transport calculations. This paper describes the development of a new model to be incorporated into maximum entropy principle (MEP) formalism for prediction of droplet size distribution in droplet formation region. The MEP approach can predict the most likely droplet size and velocity distributions under a set of constraints expressing the available information related to the distribution. In this article, by considering the mechanisms of turbulence generation inside the nozzle and wave growth on jet surface, it is attempted to provide a logical framework coupling the flow inside the nozzle to the resulting atomization process. The purpose of this paper is to describe the formulation of this new model and to incorporate it into the maximum entropy principle (MEP) by coupling sub-models together using source terms of momentum and energy. Comparison between the model prediction and experimental data for a gas turbine swirling nozzle and an annular spray indicate good agreement between model and experiment.

SeqWord Gene Island Sniffer: a Program to Study the Lateral Genetic Exchange among Bacteria

SeqWord Gene Island Sniffer, a new program for the identification of mobile genetic elements in sequences of bacterial chromosomes is presented. This program is based on the analysis of oligonucleotide usage variations in DNA sequences. 3,518 mobile genetic elements were identified in 637 bacterial genomes and further analyzed by sequence similarity and the functionality of encoded proteins. The results of this study are stored in an open database http://anjie.bi.up.ac.za/geidb/geidbhome. php). The developed computer program and the database provide the information valuable for further investigation of the distribution of mobile genetic elements and virulence factors among bacteria. The program is available for download at www.bi.up.ac.za/SeqWord/sniffer/index.html.

SySRA: A System of a Continuous Speech Recognition in Arab Language

We report in this paper the model adopted by our system of continuous speech recognition in Arab language SySRA and the results obtained until now. This system uses the database Arabdic-10 which is a corpus of word for the Arab language and which was manually segmented. Phonetic decoding is represented by an expert system where the knowledge base is translated in the form of production rules. This expert system transforms a vocal signal into a phonetic lattice. The higher level of the system takes care of the recognition of the lattice thus obtained by deferring it in the form of written sentences (orthographical Form). This level contains initially the lexical analyzer which is not other than the module of recognition. We subjected this analyzer to a set of spectrograms obtained by dictating a score of sentences in Arab language. The rate of recognition of these sentences is about 70% which is, to our knowledge, the best result for the recognition of the Arab language. The test set consists of twenty sentences from four speakers not having taken part in the training.

A Semi-Fragile Signature based Scheme for Ownership Identification and Color Image Authentication

In this paper, a novel scheme is proposed for ownership identification and authentication using color images by deploying Cryptography and Digital Watermarking as underlaying technologies. The former is used to compute the contents based hash and the latter to embed the watermark. The host image that will claim to be the rightful owner is first transformed from RGB to YST color space exclusively designed for watermarking based applications. Geometrically YS ÔèÑ T and T channel corresponds to the chrominance component of color image, therefore suitable for embedding the watermark. The T channel is divided into 4×4 nonoverlapping blocks. The size of block is important for enhanced localization, security and low computation. Each block along with ownership information is then deployed by SHA160, a one way hash function to compute the content based hash, which is always unique and resistant against birthday attack instead of using MD5 that may raise the condition i.e. H(m)=H(m'). The watermark payload varies from block to block and computed by the variance factorα . The quality of watermarked images is quite high both subjectively and objectively. Our scheme is blind, computationally fast and exactly locates the tampered region.

Influence of Combined Drill Coulters on Seedbed Compaction under Conservation Tillage Technologies

All over the world, including the Middle and East European countries, sustainable tillage and sowing technologies are applied increasingly broadly with a view to optimising soil resources, mitigating soil degradation processes, saving energy resources, preserving biological diversity, etc. As a result, altered conditions of tillage and sowing technological processes are faced inevitably. The purpose of this study is to determine the seedbed topsoil hardness when using a combined sowing coulter in different sustainable tillage technologies. The research involved a combined coulter consisting of two dissected blade discs and a shoe coulter. In order to determine soil hardness at the seedbed area, a multipenetrometer was used. It was found by experimental studies that in loosened soil, a combined sowing coulter equally suppresses the furrow bottom, walls and soil near the furrow; therefore, here, soil hardness was similar at all researched depths and no significant differences were established. In loosened and compacted (double-rolled) soil, the impact of a combined coulter on the hardness of seedbed soil surface was more considerable at a depth of 2 mm. Soil hardness at the furrow bottom and walls to a distance of up to 26 mm was 1.1 MPa. At a depth of 10 mm, the greatest hardness was established at the furrow bottom. In loosened and heavily compacted (rolled for 6 times) soil, at a depth of 2 and 10 mm a combined coulter most of all compacted the furrow bottom, which has a hardness of 1.8 MPa. At a depth of 20 mm, soil hardness within the whole investigated area varied insignificantly and fluctuated by around 2.0 MPa. The hardness of furrow walls and soil near the furrow was by approximately 1.0 MPa lower than that at the furrow bottom

Computational Evaluation of a C-A Heat Pump

The compression-absorption heat pump (C-A HP), one of the promising heat recovery equipments that make process hot water using low temperature heat of wastewater, was evaluated by computer simulation. A simulation program was developed based on the continuity and the first and second laws of thermodynamics. Both the absorber and desorber were modeled using UA-LMTD method. In order to prevent an unfeasible temperature profile and to reduce calculation errors from the curved temperature profile of a mixture, heat loads were divided into lots of segments. A single-stage compressor was considered. A compressor cooling load was also taken into account. An isentropic efficiency was computed from the map data. Simulation conditions were given based on the system consisting of ordinarily designed components. The simulation results show that most of the total entropy generation occurs during the compression and cooling process, thus suggesting the possibility that system performance can be enhanced if a rectifier is introduced.

Modeling and Analysis of Twelve-phase (Multi- Phase) DSTATCOM for Multi-Phase Load Circuits

This paper presents modeling and analysis of 12-phase distribution static compensator (DSTATCOM), which is capable of balancing the source currents in spite of unbalanced loading and phase outages. In addition to balance the supply current, the power factor can be set to a desired value. The theory of instantaneous symmetrical components is used to generate the twelve-phase reference currents. These reference currents are then tracked using current controlled voltage source inverter, operated in a hysteresis band control scheme. An ideal compensator in place of physical realization of the compensator is used. The performance of the proposed DTATCOM is validated through MATLAB simulation and detailed simulation results are given.

Exploring the Medical Tourism Development Barriers and Participation Willingness in Taiwan: An Example of Mainland Tourist

Medical Tourism is a new development in Taiwan recently. The willingness and barriers of potential tourists from China to participate medical tourism are studied. A questionnaire survey is conducted and the SPSS software is used to analyze data. The results show that under one fifth of respondents express full medical tourism participation willingness. Among travel barriers toward medical tourism, “insufficient information of medical tourism trip", “not enough time", “no companion", “worrying about unsatisfied itinerary." are perceived the most important barriers.

Data Mining on the Router Logs for Statistical Application Classification

With the advance of information technology in the new era the applications of Internet to access data resources has steadily increased and huge amount of data have become accessible in various forms. Obviously, the network providers and agencies, look after to prevent electronic attacks that may be harmful or may be related to terrorist applications. Thus, these have facilitated the authorities to under take a variety of methods to protect the special regions from harmful data. One of the most important approaches is to use firewall in the network facilities. The main objectives of firewalls are to stop the transfer of suspicious packets in several ways. However because of its blind packet stopping, high process power requirements and expensive prices some of the providers are reluctant to use the firewall. In this paper we proposed a method to find a discriminate function to distinguish between usual packets and harmful ones by the statistical processing on the network router logs. By discriminating these data, an administrator may take an approach action against the user. This method is very fast and can be used simply in adjacent with the Internet routers.