Abstract: A compact 1x3 power splitter based on Photonic
Crystal Waveguides (PCW) with flexible power splitting ratio is
presented in this paper. Multimode interference coupler (MMI) is
integrated with PCW. The device size reduction compared with the
conventional MMI power splitter is attributed to the large dispersion
of the PCW. Band Solve tool is used to calculate the band structure of
PCW. Finite Difference Time Domain (FDTD) method is adopted to
simulate the relevant structure at 1550nm wavelength. The device is
polarization insensitive and allows the control of output (o/p) powers
within certain percentage points for both polarizations.
Abstract: Fuzzy controllers are potential candidates for the
control of nonlinear, time variant and also complicated systems. Anti
lock brake system (ABS) which is a nonlinear system, may not be
easily controlled by classical control methods. An intelligent Fuzzy
control method is very useful for this kind of nonlinear system. A
typical antilock brake system (ABS) by sensing the wheel lockup,
releases the brakes for a short period of time, and then reapplies again
the brakes when the wheel spins up. In this paper, an intelligent fuzzy
ABS controller is designed to adjust slipping performance for variety
of roads. There are tow major sections in the proposing control
system. First section consists of tow Fuzzy-Logic Controllers (FLC)
providing optimal brake torque for both front and rear wheels.
Second section which is also a FLC provides required amount of slip
and torque references properties for different kind of roads.
Simulation results of our proposed intelligent ABS for three different
kinds of road show more reliable and better performance in compare
with two other break systems.
Abstract: The use of computer hardware and software in
education and training dates to the early 1940s, when American
researchers developed flight simulators which used analog computers
to generate simulated onboard instrument data.Computer software is
widely used to help engineers and undergraduate student solve their
problems quickly and more accurately. This paper presents the list of
computer software in geotechnical engineering.
Abstract: We introduce a logic-based framework for database
updating under constraints. In our framework, the constraints are
represented as an instantiated extended logic program. When performing
an update, database consistency may be violated. We provide
an approach of maintaining database consistency, and study the
conditions under which the maintenance process is deterministic. We
show that the complexity of the computations and decision problems
presented in our framework is in each case polynomial time.
Abstract: Most buildings have been using anchor bolts
commonly for installing outdoor advertising structures. Anchor bolts
of common carbon steel are widely used and often installed
indiscriminately by inadequate installation standards. In the area
where strong winds frequently blow, falling accidents of outdoor
advertising structures can occur and cause a serious disaster, which is
very dangerous and to be prevented. In this regard, the development of
high-performance anchor bolts is urgently required. In the present
study, 25Cr-8Ni-1.5Si-1Mn-0.4C alloy was produced by traditional
vacuum induction melting (VIM) for the application of anchor bolt.
The alloy composition is revealed as a duplex microstructure from
thermodynamic phase analysis by FactSage® and confirmed by
metallographic experiment. Addition of Nitrogen to the alloy was
found to reduce the ferritic phase domain and significantly increase the
hardness and the tensile strength. Microstructure observation revealed
mixed structure of austenite and ferrite with fine carbide distributed
along the grain and phase boundaries.
Abstract: Factoring Boolean functions is one of the basic operations in algorithmic logic synthesis. A novel algebraic factorization heuristic for single-output combinatorial logic functions is presented in this paper and is developed based on the set theory paradigm. The impact of factoring is analyzed mainly from a low power design perspective for standard cell based digital designs in this paper. The physical implementation of a number of MCNC/IWLS combinational benchmark functions and sub-functions are compared before and after factoring, based on a simple technology mapping procedure utilizing only standard gate primitives (readily available as standard cells in a technology library) and not cells corresponding to optimized complex logic. The power results were obtained at the gate-level by means of an industry-standard power analysis tool from Synopsys, targeting a 130nm (0.13μm) UMC CMOS library, for the typical case. The wire-loads were inserted automatically and the simulations were performed with maximum input activity. The gate-level simulations demonstrate the advantage of the proposed factoring technique in comparison with other existing methods from a low power perspective, for arbitrary examples. Though the benchmarks experimentation reports mixed results, the mean savings in total power and dynamic power for the factored solution over a non-factored solution were 6.11% and 5.85% respectively. In terms of leakage power, the average savings for the factored forms was significant to the tune of 23.48%. The factored solution is expected to better its non-factored counterpart in terms of the power-delay product as it is well-known that factoring, in general, yields a delay-efficient multi-level solution.
Abstract: In this work, simulation algorithms for contact drying
of agitated particulate materials under vacuum and at atmospheric
pressure were developed. The implementation of algorithms gives a
predictive estimation of drying rate curves and bulk bed temperature
during contact drying. The calculations are based on the penetration
model to describe the drying process, where all process parameters
such as heat and mass transfer coefficients, effective bed properties,
gas and liquid phase properties are estimated with proper
correlations. Simulation results were compared with experimental
data from the literature. In both cases, simulation results were in good
agreement with experimental data. Few deviations were identified
and the limitations of the predictive capabilities of the models are
discussed. The programs give a good insight of the drying behaviour
of the analysed powders.
Abstract: This article analyses conspiracy theories as part of the
wider discourses of missionary politics. It presents a case study of
Venezuela and describes how its leaders use conspiracy theories as
political tools. Through quotes taken form Venezuelan president
Chavez-s public speeches and other sources, and through a short
analysis of the ideological basis of his discourses, it shows how
conspiracy theories are constructed and how they affect the local
political praxis. The article also describes how conspiracy theories
have been consistently used as an important part of the construction of
a political religion for the New Man of the Bolivarian Revolution. It
concludes that the use of conspiracy theories by political leaders
produces a sense of loss of political agency.
Abstract: The purpose of this study is to suggest direction for
future study of the energy-IT industry that will be used for framework to increase IT utilization in the energy industry. Recently, Green IT is a becoming global issue because of global environmental pollution.
Also, IT roles in energy industry are becoming more important.
However, the related studies were IT industry oriented that is not sufficient to make plan for Green energy. Therefore, after analyzing
existing studies related to Green energy and Green IT,
re-categorization for Green energy-IT industry was suggested. Direction of framework is based on energy industry that enable to link between energy and IT. The results of this study suggest comprehensive insight to Green energy-IT industry. Thus it is able to
provide useful implications and guidelines to increase IT utilization in the energy industry.
Abstract: According to the Auckland climate, building passive
design more focus on improving winter indoor thermal and health
conditions. Based on field study data of indoor air temperature and
relative humidity close to ceiling and floor of an insulated Auckland
townhouse with and without a whole home mechanical ventilation
system, this study is to analysis variation of indoor microclimate data
of an Auckland townhouse using or not using the mechanical
ventilation system to evaluate winter indoor thermal and health
conditions for the future house design with a mechanical ventilation
system.
Abstract: The two-dimensional gel electrophoresis method
(2-DE) is widely used in Proteomics to separate thousands of proteins
in a sample. By comparing the protein expression levels of proteins in
a normal sample with those in a diseased one, it is possible to identify
a meaningful set of marker proteins for the targeted disease. The major
shortcomings of this approach involve inherent noises and irregular
geometric distortions of spots observed in 2-DE images. Various
experimental conditions can be the major causes of these problems. In
the protein analysis of samples, these problems eventually lead to
incorrect conclusions. In order to minimize the influence of these
problems, this paper proposes a partition based pair extension method
that performs spot-matching on a set of gel images multiple times and
segregates more reliable mapping results which can improve the
accuracy of gel image analysis. The improved accuracy of the
proposed method is analyzed through various experiments on real
2-DE images of human liver tissues.
Abstract: Droplet size distributions in the cold spray of a fuel
are important in observed combustion behavior. Specification of
droplet size and velocity distributions in the immediate downstream
of injectors is also essential as boundary conditions for advanced
computational fluid dynamics (CFD) and two-phase spray transport
calculations. This paper describes the development of a new model to
be incorporated into maximum entropy principle (MEP) formalism
for prediction of droplet size distribution in droplet formation region.
The MEP approach can predict the most likely droplet size and
velocity distributions under a set of constraints expressing the
available information related to the distribution.
In this article, by considering the mechanisms of turbulence
generation inside the nozzle and wave growth on jet surface, it is
attempted to provide a logical framework coupling the flow inside the
nozzle to the resulting atomization process. The purpose of this paper
is to describe the formulation of this new model and to incorporate it
into the maximum entropy principle (MEP) by coupling sub-models
together using source terms of momentum and energy. Comparison
between the model prediction and experimental data for a gas turbine
swirling nozzle and an annular spray indicate good agreement
between model and experiment.
Abstract: SeqWord Gene Island Sniffer, a new program for
the identification of mobile genetic elements in sequences of bacterial chromosomes is presented. This program is based on the
analysis of oligonucleotide usage variations in DNA sequences. 3,518 mobile genetic elements were identified in 637 bacterial
genomes and further analyzed by sequence similarity and the
functionality of encoded proteins. The results of this study are stored in an open database http://anjie.bi.up.ac.za/geidb/geidbhome.
php). The developed computer program and the database provide the information valuable for further investigation of the
distribution of mobile genetic elements and virulence factors among bacteria. The program is available for download at www.bi.up.ac.za/SeqWord/sniffer/index.html.
Abstract: We report in this paper the model adopted by our
system of continuous speech recognition in Arab language SySRA
and the results obtained until now. This system uses the database
Arabdic-10 which is a corpus of word for the Arab language and
which was manually segmented. Phonetic decoding is represented
by an expert system where the knowledge base is translated in the
form of production rules. This expert system transforms a vocal
signal into a phonetic lattice. The higher level of the system takes
care of the recognition of the lattice thus obtained by deferring it in
the form of written sentences (orthographical Form). This level
contains initially the lexical analyzer which is not other than the
module of recognition. We subjected this analyzer to a set of
spectrograms obtained by dictating a score of sentences in Arab
language. The rate of recognition of these sentences is about 70%
which is, to our knowledge, the best result for the recognition of the
Arab language. The test set consists of twenty sentences from four
speakers not having taken part in the training.
Abstract: In this paper, a novel scheme is proposed for ownership identification and authentication using color images by deploying Cryptography and Digital Watermarking as underlaying technologies. The former is used to compute the contents based hash and the latter to embed the watermark. The host image that will claim to be the rightful owner is first transformed from RGB to YST color space exclusively designed for watermarking based applications. Geometrically YS ÔèÑ T and T channel corresponds to the chrominance component of color image, therefore suitable for embedding the watermark. The T channel is divided into 4×4 nonoverlapping blocks. The size of block is important for enhanced localization, security and low computation. Each block along with ownership information is then deployed by SHA160, a one way hash function to compute the content based hash, which is always unique and resistant against birthday attack instead of using MD5 that may raise the condition i.e. H(m)=H(m'). The watermark payload varies from block to block and computed by the variance factorα . The quality of watermarked images is quite high both subjectively and objectively. Our scheme is blind, computationally fast and exactly locates the tampered region.
Abstract: All over the world, including the Middle and East
European countries, sustainable tillage and sowing technologies are
applied increasingly broadly with a view to optimising soil resources,
mitigating soil degradation processes, saving energy resources,
preserving biological diversity, etc. As a result, altered conditions of
tillage and sowing technological processes are faced inevitably. The
purpose of this study is to determine the seedbed topsoil hardness
when using a combined sowing coulter in different sustainable tillage
technologies. The research involved a combined coulter consisting
of two dissected blade discs and a shoe coulter. In order to determine
soil hardness at the seedbed area, a multipenetrometer was used. It
was found by experimental studies that in loosened soil, a combined
sowing coulter equally suppresses the furrow bottom, walls and soil
near the furrow; therefore, here, soil hardness was similar at all
researched depths and no significant differences were established. In
loosened and compacted (double-rolled) soil, the impact of a
combined coulter on the hardness of seedbed soil surface was more
considerable at a depth of 2 mm. Soil hardness at the furrow bottom
and walls to a distance of up to 26 mm was 1.1 MPa. At a depth of 10
mm, the greatest hardness was established at the furrow bottom. In
loosened and heavily compacted (rolled for 6 times) soil, at a depth
of 2 and 10 mm a combined coulter most of all compacted the furrow
bottom, which has a hardness of 1.8 MPa. At a depth of 20 mm, soil
hardness within the whole investigated area varied insignificantly and
fluctuated by around 2.0 MPa. The hardness of furrow walls and soil
near the furrow was by approximately 1.0 MPa lower than that at the
furrow bottom
Abstract: The compression-absorption heat pump (C-A HP), one
of the promising heat recovery equipments that make process hot
water using low temperature heat of wastewater, was evaluated by
computer simulation. A simulation program was developed based on
the continuity and the first and second laws of thermodynamics. Both
the absorber and desorber were modeled using UA-LMTD method. In
order to prevent an unfeasible temperature profile and to reduce
calculation errors from the curved temperature profile of a mixture,
heat loads were divided into lots of segments. A single-stage
compressor was considered. A compressor cooling load was also
taken into account. An isentropic efficiency was computed from the
map data. Simulation conditions were given based on the system
consisting of ordinarily designed components. The simulation results
show that most of the total entropy generation occurs during the
compression and cooling process, thus suggesting the possibility that
system performance can be enhanced if a rectifier is introduced.
Abstract: This paper presents modeling and analysis of 12-phase distribution static compensator (DSTATCOM), which is capable of balancing the source currents in spite of unbalanced loading and phase outages. In addition to balance the supply current, the power factor can be set to a desired value. The theory of instantaneous symmetrical components is used to generate the twelve-phase reference currents. These reference currents are then tracked using current controlled voltage source inverter, operated in a hysteresis band control scheme. An ideal compensator in place of physical realization of the compensator is used. The performance of the proposed DTATCOM is validated through MATLAB simulation and detailed simulation results are given.
Abstract: Medical Tourism is a new development in Taiwan
recently. The willingness and barriers of potential tourists from
China to participate medical tourism are studied. A questionnaire
survey is conducted and the SPSS software is used to analyze data.
The results show that under one fifth of respondents express full
medical tourism participation willingness. Among travel barriers
toward medical tourism, “insufficient information of medical tourism
trip", “not enough time", “no companion", “worrying about
unsatisfied itinerary." are perceived the most important barriers.
Abstract: With the advance of information technology in the
new era the applications of Internet to access data resources has
steadily increased and huge amount of data have become accessible
in various forms. Obviously, the network providers and agencies,
look after to prevent electronic attacks that may be harmful or may
be related to terrorist applications. Thus, these have facilitated the
authorities to under take a variety of methods to protect the special
regions from harmful data. One of the most important approaches is
to use firewall in the network facilities. The main objectives of
firewalls are to stop the transfer of suspicious packets in several
ways. However because of its blind packet stopping, high process
power requirements and expensive prices some of the providers are
reluctant to use the firewall. In this paper we proposed a method to
find a discriminate function to distinguish between usual packets and
harmful ones by the statistical processing on the network router logs.
By discriminating these data, an administrator may take an approach
action against the user. This method is very fast and can be used
simply in adjacent with the Internet routers.