Abstract: The alumosilicate ceramics with mullite crystalline phase are used in various branches of science and technique. The mullite refractory ceramics with high porosity serve as a heat insulator and as a constructional materials [1], [2]. The purpose of the work was to sinter high porosity ceramic and to increase the quantity of mullite phase in this mullite, mullite-corundum ceramics. Two types of compositions were prepared at during the experiment. The first type is compositions with commercial alumina and silica oxides. The second type is from mixing these oxides with 10, 20 and 30 wt.%. of kaolin. In all samples the Al2O3 and SiO2 were in 2.57:1 ratio, because that was conformed to mullite stechiometric compositions (3Al2O3.2SiO2). The types of alumina oxides were α-Al2O3 (d50=4µm) and γ-Al2O3 (d50=80µm). Ratios of α-: γ-Al2O3 were (1:1) or (1:3). The porous materials were prepared by slip casting of suspension of raw materials. The aluminium paste (0.18 wt.%) was used as a pore former. Water content in the suspensions was 26-47 wt.%. Pore formation occurred as a result of hydrogen formation in chemical reaction between aluminium paste and water [2]. The samples were sintered at the temperature of 1650°C and 1750°C for one hour. The increasing amount of kaolin, α-: γ-Al2O3 at the ratio (1:3) and sintering at the highest temperature raised the quantity of mullite phase. The mullite phase began to dominate over the corundum phase.
Abstract: Bead-on-plate welds were carried out on AISI 316L
(N) austenitic stainless steel (ASS) using flux cored arc welding
(FCAW) process. The bead on plates weld was conducted as per L25
orthogonal array. In this paper, the weld bead geometry such as depth
of penetration (DOP), bead width (BW) and weld reinforcement (R)
of AISI 316L (N) ASS are investigated. Taguchi approach is used as
statistical design of experiment (DOE) technique for optimizing the
selected welding input parameters. Grey relational analysis and
desirability approach are applied to optimize the input parameters
considering multiple output variables simultaneously. Confirmation
experiment has also been conducted to validate the optimized
parameters.
Abstract: There have been numerous implementations of
security system using biometric, especially for identification and
verification cases. An example of pattern used in biometric is the iris
pattern in human eye. The iris pattern is considered unique for each
person. The use of iris pattern poses problems in encoding the human
iris.
In this research, an efficient iris recognition method is proposed.
In the proposed method the iris segmentation is based on the
observation that the pupil has lower intensity than the iris, and the
iris has lower intensity than the sclera. By detecting the boundary
between the pupil and the iris and the boundary between the iris and
the sclera, the iris area can be separated from pupil and sclera. A step
is taken to reduce the effect of eyelashes and specular reflection of
pupil. Then the four levels Coiflet wavelet transform is applied to the
extracted iris image. The modified Hamming distance is employed to
measure the similarity between two irises.
This research yields the identification success rate of 84.25% for
the CASIA version 1.0 database. The method gives an accuracy of
77.78% for the left eyes of MMU 1 database and 86.67% for the
right eyes. The time required for the encoding process, from the
segmentation until the iris code is generated, is 0.7096 seconds.
These results show that the accuracy and speed of the method is
better than many other methods.
Abstract: Phase locked loops in 10 Gb/s and faster data links are
low phase noise devices. Characterization of their phase jitter
transfer functions is difficult because the intrinsic noise of the PLLs
is comparable to the phase noise of the reference clock signal. The
problem is solved by using a linear model to account for the intrinsic
noise. This study also introduces a novel technique for measuring the
transfer function. It involves the use of the reference clock as a
source of wideband excitation, in contrast to the commonly used
sinusoidal excitations at discrete frequencies. The data reported here
include the intrinsic noise of a PLL for 10 Gb/s links and the jitter
transfer function of a PLL for 12.8 Gb/s links. The measured transfer
function suggests that the PLL responded like a second order linear
system to a low noise reference clock.
Abstract: In this study, the problem of discriminating between interictal epileptic and non- epileptic pathological EEG cases, which present episodic loss of consciousness, investigated. We verify the accuracy of the feature extraction method of autocross-correlated coefficients which extracted and studied in previous study. For this purpose we used in one hand a suitable constructed artificial supervised LVQ1 neural network and in other a cross-correlation technique. To enforce the above verification we used a statistical procedure which based on a chi- square control. The classification and the statistical results showed that the proposed feature extraction is a significant accurate method for diagnostic discrimination cases between interictal and non-interictal EEG events and specifically the classification procedure showed that the LVQ neural method is superior than the cross-correlation one.
Abstract: The purpose of this research aims to discover the
knowledge for analysis student motivation behavior on e-Learning
based on Data Mining Techniques, in case of the Information
Technology for Communication and Learning Course at Suan
Sunandha Rajabhat University. The data mining techniques was
applied in this research including association rules, classification
techniques. The results showed that using data mining technique can
indicate the important variables that influence the student motivation
behavior on e-Learning.
Abstract: Due to its capability to resist jamming signals, chirp
spread spectrum (CSS) technique has attracted much attention in
the area of wireless communications. However, there has been little
rigorous analysis for the performance of the CSS communication
system in jamming environments. In this paper, we present analytic
results on the performance of a CSS system by deriving symbol
error rate (SER) expressions for a CSS M-ary phase shift keying
(MPSK) system in the presence of broadband and tone jamming
signals, respectively. The numerical results show that the empirical
SER closely agrees with the analytic result.
Abstract: This paper presents a new method for estimating the nonstationary
noise power spectral density given a noisy signal. The
method is based on averaging the noisy speech power spectrum using
time and frequency dependent smoothing factors. These factors are
adjusted based on signal-presence probability in individual frequency
bins. Signal presence is determined by computing the ratio of the
noisy speech power spectrum to its local minimum, which is updated
continuously by averaging past values of the noisy speech power
spectra with a look-ahead factor. This method adapts very quickly to
highly non-stationary noise environments. The proposed method
achieves significant improvements over a system that uses voice
activity detector (VAD) in noise estimation.
Abstract: This paper presents performance analysis of the
Evolutionary Programming-Artificial Neural Network (EPANN)
based technique to optimize the architecture and training parameters
of a one-hidden layer feedforward ANN model for the prediction of
energy output from a grid connected photovoltaic system. The ANN
utilizes solar radiation and ambient temperature as its inputs while the
output is the total watt-hour energy produced from the grid-connected
PV system. EP is used to optimize the regression performance of the
ANN model by determining the optimum values for the number of
nodes in the hidden layer as well as the optimal momentum rate and
learning rate for the training. The EPANN model is tested using two
types of transfer function for the hidden layer, namely the tangent
sigmoid and logarithmic sigmoid. The best transfer function, neural
topology and learning parameters were selected based on the highest
regression performance obtained during the ANN training and testing
process. It is observed that the best transfer function configuration for
the prediction model is [logarithmic sigmoid, purely linear].
Abstract: This paper has two main ideas. Firstly, it describes Evans and Wurster-s concepts “the trade-off between reach and richness", and relates them to the impact of technology on the virtual markets. Authors Evans and Wurster see the transfer of information as a 'trade'off between richness and reach-. Reach refers to the number of people who share particular information, with Richness ['Rich'] being a more complex concept combining: bandwidth, customization, interactivity, reliability, security and currency. Traditional shopping limits the number of shops the shopper is able to visit due to time and other cost constraints; the time spent traveling consequently leaves the shopper with less time to evaluate the product. The paper concludes that although the Web provides Reach, offering Richness and the sense of community required for creating and sustaining relationships with potential clients could be difficult.
Abstract: Data gathering is an essential operation in wireless
sensor network applications. So it requires energy efficiency
techniques to increase the lifetime of the network. Similarly,
clustering is also an effective technique to improve the energy
efficiency and network lifetime of wireless sensor networks. In this
paper, an energy efficient cluster formation protocol is proposed with
the objective of achieving low energy dissipation and latency without
sacrificing application specific quality. The objective is achieved by
applying randomized, adaptive, self-configuring cluster formation
and localized control for data transfers. It involves application -
specific data processing, such as data aggregation or compression.
The cluster formation algorithm allows each node to make
independent decisions, so as to generate good clusters as the end.
Simulation results show that the proposed protocol utilizes minimum
energy and latency for cluster formation, there by reducing the
overhead of the protocol.
Abstract: Drought is one of the most damaging climate-related
hazards, it is generally considered as a prolonged absence of
precipitation. This normal and recurring climate phenomenon had
plagued civilization throughout history because of the negative
impacts on economical, environmental and social sectors. Drought
characteristics are thus recognized as important factors in water
resources planning and management. The purpose of this study is to
detect the changes in drought frequency, persistence and severity
in the Ruhr river basin. The frequency of drought events was
calculated using the Standardized Precipitation Index (SPI). Used
data are daily precipitation records from seven meteorological
stations covering the period 1961-2007. The main benefit of the
application of this index is its versatility, only rainfall data is required
to deliver five major dimensions of a drought : duration, intensity,
severity, magnitude, and frequency. Furthermore, drought can be
calculated in different time steps. In this study SPI was calculated for
1, 3, 6, 9, 12, and 24 months. Several drought events were detected
in the covered period, these events contain mild, moderate and severe
droughts. Also positive and negative trends in the SPI values were
observed.
Abstract: This paper presents an on-going research work on the
implementation of feature-based machining via macro programming.
Repetitive machining features such as holes, slots, pockets etc can
readily be encapsulated in macros. Each macro consists of methods
on how to machine the shape as defined by the feature. The macro
programming technique comprises of a main program and
subprograms. The main program allows user to select several
subprograms that contain features and define their important
parameters. With macros, complex machining routines can be
implemented easily and no post processor is required. A case study
on machining of a part that comprised of planar face, hole and pocket
features using the macro programming technique was carried out. It
is envisaged that the macro programming technique can be extended
to other feature-based machining fields such as the newly developed
STEP-NC domain.
Abstract: Data clustering is an important data exploration
technique with many applications in data mining. The k-means
algorithm is well known for its efficiency in clustering large data
sets. However, this algorithm is suitable for spherical shaped clusters
of similar sizes and densities. The quality of the resulting clusters
decreases when the data set contains spherical shaped with large
variance in sizes. In this paper, we introduce a competent procedure
to overcome this problem. The proposed method is based on shifting
the center of the large cluster toward the small cluster, and recomputing
the membership of small cluster points, the experimental
results reveal that the proposed algorithm produces satisfactory
results.
Abstract: Horizontal platform system (HPS) is popularly applied
in offshore and earthquake technology, but it is difficult and
time-consuming for regulation. In order to understand the nonlinear
dynamic behavior of HPS and reduce the cost when using it, this paper
employs differential transformation method to study the bifurcation
behavior of HPS. The numerical results reveal a complex dynamic
behavior comprising periodic, sub-harmonic, and chaotic responses.
Furthermore, the results reveal the changes which take place in the
dynamic behavior of the HPS as the external torque is increased.
Therefore, the proposed method provides an effective means of
gaining insights into the nonlinear dynamics of horizontal platform
system.
Abstract: This paper reports the findings of a research
conducted to evaluate the ownership and usage of technology devices
within Distance Education students- according to their age. This
research involved 45 Distance Education students from USM
Universiti Sains Malaysia (DEUSM) as its respondents. Data was
collected through questionnaire that had been developed by the
researchers based on some literature review. The data was analyzed
to find out the frequencies of respondents agreements towards
ownership of technology devices and the use of technology devices.
The findings shows that all respondents own mobile phone and
majority of them reveal that they use mobile on regular basis. The
student in the age 30-39 has the heist ownership of the technology
devices.
Abstract: The paper researched and presented a virtual simulation system based on a full-digital lunar terrain, integrated with kinematics and dynamics module as well as autonomous navigation simulation module. The system simulation models are established. Enabling technologies such as digital lunar surface module, kinematics and dynamics simulation, Autonomous navigation are investigated. A prototype system for lunar rover locomotion simulation is developed based on these technologies. Autonomous navigation is a key echnology in lunar rover system, but rarely involved in virtual simulation system. An autonomous navigation simulation module have been integrated in this prototype system, which was proved by the simulation results that the synthetic simulation and visualizing analysis system are established in the system, and the system can provide efficient support for research on the autonomous navigation of lunar rover.
Abstract: Avionics software is safe-critical embedded software
and its architecture is evolving from traditional federated architectures
to Integrated Modular Avionics (IMA) to improve resource usability.
ARINC 653 (Avionics Application Standard Software Interface) is a
software specification for space and time partitioning in Safety-critical
avionics Real-time operating systems. Arinc653 uses two-level
scheduling strategies, but current modeling tools only apply to simple
problems of Arinc653 two-level scheduling, which only contain time
property. In avionics industry, we are always manually allocating
tasks and calculating the timing table of a real-time system to ensure
it-s running as we design. In this paper we represent an automatically
generating strategy which applies to the two scheduling problems with
dependent constraints in Arinc653 partition run-time environment. It
provides the functionality of automatic generation from the task and partition models to scheduling policy through allocating the tasks to the partitions while following the constraints, and then we design a simulating mechanism to check whether our policy is schedulable or
not
Abstract: The theatre-auditorium under investigation following
the highly reflective characteristics of materials used in it (marble,
painted wood, smooth plaster, etc), architectural and structural
features of the Protocol and its intended use (very multifunctional:
Auditorium, theatre, cinema, musicals, conference room) from the
analysis of the statement of fact made by the acoustic simulation
software Ramsete and supported by data obtained through a
campaign of acoustic measurements of the state of fact made on the
spot by a Fonomet Svantek model SVAN 957, appears to be
acoustically inadequate. After the completion of the 3D model
according to the specifications necessary software used forecast in
order to be recognized by him, have made three simulations, acoustic
simulation of the state of and acoustic simulation of two design
solutions.
Improved noise characteristics found in the first design solution,
compared to the state in fact consists therefore in lowering
Reverberation Time that you turn most desirable value, while the
Indicators of Clarity, the Baricentric Time, the Lateral Efficiency,
Ratio of Low Tmedia BR and defined the Speech Intelligibility
improved significantly. Improved noise characteristics found instead
in the second design solution, as compared to first design solution, is
finally mostly in a more uniform distribution of Leq and in lowering
Reverberation Time that you turn the optimum values. Indicators of
Clarity, and the Lateral Efficiency improve further but at the expense
of a value slightly worse than the BR. Slightly vary the remaining
indices.
Abstract: In the present study, a support vector machine (SVM) learning approach to character recognition is proposed. Simple
feature detectors, similar to those found in the human visual system, were used in the SVM classifier. Alphabetic characters were rotated
to 8 different angles and using the proposed cognitive model, all characters were recognized with 100% accuracy and specificity.
These same results were found in psychiatric studies of human character recognition.