Abstract: The Automatic Speech Recognition (ASR) applied to
Arabic language is a challenging task. This is mainly related to the
language specificities which make the researchers facing multiple
difficulties such as the insufficient linguistic resources and the very
limited number of available transcribed Arabic speech corpora. In
this paper, we are interested in the development of a HMM-based
ASR system for Standard Arabic (SA) language. Our fundamental
research goal is to select the most appropriate acoustic parameters
describing each audio frame, acoustic models and speech recognition
unit. To achieve this purpose, we analyze the effect of varying frame
windowing (size and period), acoustic parameter number resulting
from features extraction methods traditionally used in ASR, speech
recognition unit, Gaussian number per HMM state and number of
embedded re-estimations of the Baum-Welch Algorithm. To evaluate
the proposed ASR system, a multi-speaker SA connected-digits
corpus is collected, transcribed and used throughout all experiments.
A further evaluation is conducted on a speaker-independent continue
SA speech corpus. The phonemes recognition rate is 94.02% which is
relatively high when comparing it with another ASR system
evaluated on the same corpus.
Abstract: There was a high rate of corrosion in Pyrolysis
Gasoline Hydrogenation (PGH) unit of Arak Petrochemical Company
(ARPC), and it caused some operational problem in this plant. A
commercial chemical had been used as anti-corrosion in the
depentanizer column overhead in order to control the corrosion rate.
Injection of commercial corrosion inhibitor caused some
operational problems such as fouling in some heat exchangers. It was
proposed to replace this commercial material with another more
effective trouble free, and well-known additive by R&D and
operation specialists.
At first, the system was simulated by commercial simulation
software in electrolytic system to specify low pH points inside the
plant. After a very comprehensive study of the situation and technical
investigations ,ammonia / monoethanol amine solution was proposed
as neutralizer or corrosion inhibitor to be injected in a suitable point
of the plant. For this purpose, the depentanizer column and its
accessories system was simulated again in case of this solution
injection.
According to the simulation results, injection of new anticorrosion
substance has no any side effect on C5 cut product and
operating conditions of the column. The corrosion rate will be
cotrolled, if the pH remains at the range of 6.5 to 8 . Aactual plant
test run was also carried out by injection of ammonia / monoethanol
amine solution at the rate of 0.6 Kg/hr and the results of iron content
of water samples and corrosion test coupons confirmed the
simulation results.
Now, ammonia / monoethanol amine solution is injected to a
suitable pint inside the plant and corrosion rate has decreased
significantly.
Abstract: As a matter of the fact that online social networks like
Twitter, Facebook and MySpace have experienced an extensive
growth in recent years. Social media offers individuals with a tool for
communicating and interacting with one another. These social
networks enable people to stay in touch with other people and
express themselves. This process makes the users of online social
networks active creators of content rather than being only consumers
of traditional media. That’s why millions of people show strong
desire to learn the methods and tools of digital content production
and necessary communication skills. However, the booming interest
in communication and interaction through online social networks and
high level of eagerness to invent and implement the ways to
participate in content production raise some privacy and security
concerns.
This presentation aims to open the assumed revolutionary,
democratic and liberating nature of the online social media up for
discussion by reviewing some recent political developments in
Turkey. Firstly, the role of Internet and online social networks in
mobilizing collective movements through social interactions and
communications will be questioned. Secondly, some cases from Gezi
and Okmeydanı Protests and also December 17-25 period will be
presented in order to illustrate misinformation and manipulation in
social media and violation of individual privacy through online social
networks in order to damage social unity and stability contradictory
to democratic nature of online social networking.
Abstract: The purpose is to study the model and characteristic of
participation of the suitable community to lead to develop permanent
water marketing in Bang Noi Floating Market, Bangkonti District,
Samutsongkhram Province. A total of 342 survey questionnaire was
administered to potential respondents. The researchers interviewed
the leader of the community. Appreciation Influence Control (AIC)
was used to talk with 20 villagers on arena. The findings revealed
that overall, most people had the middle level of the participation in
developing the durable Bang Noi Floating Market, Bangkonti,
Samutsongkhram Province and in aspects of gaining benefits from
developing it with atmosphere and a beautiful view for tourism. For
example, the landscape is beautiful with public utilities. The
participation in preserving and developing Bang Noi Floating Market
remains in the former way of life. The basic factor of person affects
to the participation of people such as age, level of education, career,
and income per month. Most participants are the original hosts that
have houses and shops located in the marketing and neighbor. These
people involve with the benefits and have the power to make a water
marketing strategy, the major role to set the information database. It
also found that the leader and the villagers play the important role in
setting a five-physical database. Data include level of information
such as position of village, territory of village, road, river, and
premises. Information of culture consists of a two-level of
information, interesting point, and Itinerary. The information occurs
from presenting and practicing by the leader and villagers in the
community.All of phases are presented for listening and investigating
database together in both the leader and villagers in the process of
participation.
Abstract: Due to their high power-to-weight ratio and low cost,
pneumatic actuators are attractive for robotics and automation
applications; however, achieving fast and accurate control of their
position have been known as a complex control problem. A
methodology for obtaining high position accuracy with a linear
pneumatic actuator is presented. During experimentation with a
number of PID classical control approaches over many operations of
the pneumatic system, the need for frequent manual re-tuning of the
controller could not be eliminated. The reason for this problem is
thermal and energy losses inside the cylinder body due to the
complex friction forces developed by the piston displacements.
Although PD controllers performed very well over short periods, it
was necessary in our research project to introduce some form of
automatic gain-scheduling to achieve good long-term performance.
We chose a fuzzy logic system to do this, which proved to be an
easily designed and robust approach. Since the PD approach showed
very good behaviour in terms of position accuracy and settling time,
it was incorporated into a modified form of the 1st order Tagaki-
Sugeno fuzzy method to build an overall controller. This fuzzy gainscheduler
uses an input variable which automatically changes the PD
gain values of the controller according to the frequency of repeated
system operations. Performance of the new controller was
significantly improved and the need for manual re-tuning was
eliminated without a decrease in performance. The performance of
the controller operating with the above method is going to be tested
through a high-speed web network (GRID) for research purposes.
Abstract: In this paper, we construct and implement a new
Steganography algorithm based on learning system to hide a large
amount of information into color BMP image. We have used adaptive
image filtering and adaptive non-uniform image segmentation with
bits replacement on the appropriate pixels. These pixels are selected
randomly rather than sequentially by using new concept defined by
main cases with sub cases for each byte in one pixel. According to
the steps of design, we have been concluded 16 main cases with their
sub cases that covere all aspects of the input information into color
bitmap image. High security layers have been proposed through four
layers of security to make it difficult to break the encryption of the
input information and confuse steganalysis too. Learning system has
been introduces at the fourth layer of security through neural
network. This layer is used to increase the difficulties of the statistical
attacks. Our results against statistical and visual attacks are discussed
before and after using the learning system and we make comparison
with the previous Steganography algorithm. We show that our
algorithm can embed efficiently a large amount of information that
has been reached to 75% of the image size (replace 18 bits for each
pixel as a maximum) with high quality of the output.
Abstract: Biological evolution has generated a rich variety of
successful solutions; from nature, optimized strategies can be
inspired. One interesting example is the ant colonies, which are able
to exhibit a collective intelligence, still that their dynamic is simple.
The emergence of different patterns depends on the pheromone trail,
leaved by the foragers. It serves as positive feedback mechanism for
sharing information.
In this paper, we use the dynamic of TASEP as a model of
interaction at a low level of the collective environment in the ant-s
traffic flow. This work consists of modifying the movement rules of
particles “ants" belonging to the TASEP model, so that it adopts with
the natural movement of ants. Therefore, as to respect the constraints
of having no more than one particle per a given site, and in order to
avoid collision within a bidirectional circulation, we suggested two
strategies: decease strategy and waiting strategy. As a third work
stage, this is devoted to the study of these two proposed strategies-
stability. As a final work stage, we applied the first strategy to the
whole environment, in order to get to the emergence of traffic flow,
which is a way of learning.
Abstract: Pentachlorophenol (PCP) is a polychlorinated
aromatic compound that is widespread in industrial effluents and is
considered to be a serious pollutant. Among the variety of industrial
effluents encountered, effluents from tanning industry are very
important and have a serious pollution potential. PCP is also formed
unintentionally in effluents of paper and pulp industries. It is highly
persistent in soils and is lethal to a wide variety of beneficial
microorganisms and insects, human beings and animals. The natural
processes that breakdown toxic chemicals in the environment have
become the focus of much attention to develop safe and environmentfriendly
deactivation technologies. Microbes and plants are among
the most important biological agents that remove and degrade waste
materials to enable their recycling in the environment. The present
investigation was carried out with the aim of developing a microbial
system for bioremediation of PCP polluted soils. A number of plant
species were evaluated for their ability to tolerate different
concentrations of pentachlorophenol (PCP) in the soil. The
experiment was conducted for 30 days under pot culture conditions.
The toxic effect of PCP on plants was studied by monitoring seed
germination, plant growth and biomass. As the concentration of PCP
was increased to 50 ppm, the inhibition of seed germination, plant
growth and biomass was also increased. Although PCP had a
negative effect on all plant species tested, maize and groundnut
showed the maximum tolerance to PCP. Other tolerating crops
included wheat, safflower, sunflower, and soybean. From the
rhizosphere soil of the tolerant seedlings, as many as twenty seven
PCP tolerant bacteria were isolated. From soybean, 8; sunflower, 3;
safflower 8; maize 2; groundnut and wheat, 3 each isolates were
made. They were screened for their PCP degradation potentials.
HPLC analyses of PCP degradation revealed that the isolate MAZ-2
degraded PCP completely. The isolate MAZ-1 was the next best
isolate with 90 per cent PCP degradation. These strains hold promise
to be used in the bioremediation of PCP polluted soils.
Abstract: In a wind power generator using doubly fed induction
generator (DFIG), the three-phase pulse width modulation (PWM)
voltage source converter (VSC) is used as grid side converter (GSC)
and rotor side converter (RSC). The standard linear control laws
proposed for GSC provides not only instablity against comparatively
large-signal disturbances, but also the problem of stability due to
uncertainty of load and variations in parameters. In this paper, a
nonlinear controller is designed for grid side converter (GSC) of a
DFIG for wind power application. The nonlinear controller is
designed based on the input-output feedback linearization control
method. The resulting closed-loop system ensures a sufficient
stability region, make robust to variations in circuit parameters and
also exhibits good transient response. Computer simulations and
experimental results are presented to confirm the effectiveness of the
proposed control strategy.
Abstract: In this paper we present a new approach to detecting a
flaw in T.O.F.D (Time Of Flight Diffraction) type ultrasonic image
based on texture features. Texture is one of the most important
features used in recognizing patterns in an image. The paper
describes texture features based on 2D Gabor functions, i.e.,
Gaussian shaped band-pass filters, with dyadic treatment of the radial
spatial frequency range and multiple orientations, which represent an
appropriate choice for tasks requiring simultaneous measurement in
both space and frequency domains. The most relevant features are
used as input data on a Fuzzy c-mean clustering classifier. The
classes that exist are only two: 'defects' or 'no defects'. The proposed
approach is tested on the T.O.F.D image achieved at the laboratory
and on the industrial field.
Abstract: The new semi-experimental method for simulation of
the turbine flow meters rotation in the transitional flow has been
developed. The method is based on the experimentally established
exponential low of changing of dimensionless relative turbine gas
meter rotation frequency and meter inertia time constant. For
experimental evaluation of the meter time constant special facility
has been developed. The facility ensures instant switching of turbine
meter under test from one channel to the other channel with different
flow rate and measuring the meter response. The developed method
can be used for evaluation and predication of the turbine meters
response and dynamic error in the transitional flow with any arbitrary
law of flow rate changing. The examples of the method application
are presented.
Abstract: The article examines the methods of protection of
citizens' personal data on the Internet using biometric identity
authentication technology. It`s celebrated their potential danger due
to the threat of loss of base biometric templates. To eliminate the
threat of compromised biometric templates is proposed to use neural
networks large and extra-large sizes, which will on the one hand
securely (Highly reliable) to authenticate a person by his biometrics,
and on the other hand make biometrics a person is not available for
observation and understanding. This article also describes in detail
the transformation of personal biometric data access code. It`s formed
the requirements for biometrics converter code for his work with the
images of "Insider," "Stranger", all the "Strangers". It`s analyzed the
effect of the dimension of neural networks on the quality of
converters mystery of biometrics in access code.
Abstract: The software system goes through a number of stages
during its life and a software process model gives a standard format
for planning, organizing and running a project. The article presents a
new software development process model named as “Divide and
Conquer Process Model", based on the idea first it divides the things
to make them simple and then gathered them to get the whole work
done. The article begins with the backgrounds of different software
process models and problems in these models. This is followed by a
new divide and conquer process model, explanation of its different
stages and at the end edge over other models is shown.
Abstract: In the paper a detailed analysis of the dynamic
response of a cooling tower shell to mining tremors originated from
two main regions of mining activity in Poland (Upper Silesian Coal
Basin and Legnica-Glogow Copper District) was presented. The
representative time histories registered in the both regions were used
as ground motion data in calculations of the dynamic response of the
structure. It was proved that the dynamic response of the shell is
strongly dependent not only on the level of vibration amplitudes but
on the dominant frequency range of the mining shock typical for the
mining region as well. Also a vertical component of vibrations
occurred to have considerable influence on the total dynamic
response of the shell. Finally, it turned out that non-uniformity of
kinematic excitation resulting from spatial variety of ground motion
plays a significant role in dynamic analysis of large-dimensional
shells under mining shocks.
Abstract: The hydrodynamic and thermal lattice Boltzmann
methods are applied to investigate the turbulent convective heat
transfer in the wavy channel flows. In this study, the turbulent
phenomena are modeling by large-eddy simulations with the
Smagorinsky model. As a benchmark, the laminar and turbulent
backward-facing step flows are simulated first. The results give good
agreement with other numerical and experimental data. For wavy
channel flows, the distribution of Nusselt number and the skin-friction
coefficients are calculated to evaluate the heat transfer effect and the
drag force. It indicates that the vortices at the trough would affect the
magnitude of drag and weaken the heat convection effects on the wavy
surface. In turbulent cases, if the amplitude of the wavy boundary is
large enough, the secondary vortices would be generated at troughs
and contribute to the heat convection. Finally, the effects of different
Re on the turbulent transport phenomena are discussed.
Abstract: The PRAF family of proteins is a plant specific family of proteins with distinct domain architecture and various unique sequence/structure traits. We have carried out an extensive search of the Arabidopsis genome using an automated pipeline and manual methods to verify previously known and identify unknown instances of PRAF proteins, characterize their sequence and build 3D structures of their individual domains. Integrating the sequence, structure and whatever little known experimental details for each of these proteins and their domains, we present a comprehensive characterization of the different domains in these proteins and their variant properties.
Abstract: Due to the increasing penetration of wind energy, it is
necessary to possess design tools that are able to simulate the impact
of these installations in utility grids. In order to provide a net
contribution to this issue a detailed wind park model has been
developed and is briefly presented. However, the computational costs
associated with the performance of such a detailed model in
describing the behavior of a wind park composed by a considerable
number of units may render its practical application very difficult. To
overcome this problem integral manifolds theory has been applied to
reduce the order of the detailed wind park model, and therefore
create the conditions for the development of a dynamic equivalent
which is able to retain the relevant dynamics with respect to the
existing a.c. system. In this paper integral manifold method has been
introduced for order reduction. Simulation results of the proposed
method represents that integral manifold method results fit the
detailed model results with a higher precision than singular
perturbation method.
Abstract: Real-time embedded systems should benefit from
component-based software engineering to handle complexity and
deal with dependability. In these systems, applications should not
only be logically correct but also behave within time windows.
However, in the current component based software engineering
approaches, a few of component models handles time properties in
a manner that allows efficient analysis and checking at the
architectural level. In this paper, we present a meta-model for
component-based software description that integrates timing
issues. To achieve a complete functional model of software
components, our meta-model focuses on four functional aspects:
interface, static behavior, dynamic behavior, and interaction
protocol. With each aspect we have explicitly associated a time
model. Such a time model can be used to check a component-s
design against certain properties and to compute the timing
properties of component assemblies.
Abstract: The stab resistance performance of newly developed
fabric composites composed of hexagonal paper honeycombs, filled
with shear thickening fluid (STF), and woven Kevlar® fabric or
UHMPE was investigated in this study. The STF was prepared by
dispersing submicron SiO2 particles into polyethylene glycol (PEG).
Our results indicate that the STF-Kevlar composite possessed lower
penetration depth than that of neat Kevlar. In other words, the
STF-Kevlar composite can attain the same energy level in
stab-resistance test with fewer layers of Kevlar fabrics than that of the
neat Kevlar fabrics. It also indicates that STF can be used for the
fabrication of flexible body armors and can provide improved
protection against stab threats. We found that the stab resistance of the
STF-Kevlar composite increases with the increase of SiO2
concentration in STF. Moreover, the silica particles functionalized
with silane coupling agent can further improve the stab resistance.
Abstract: Because today-s media centric students have adopted
digital as their native form of communication, teachers are having
increasingly difficult time motivating reluctant readers to read and
write. Our research has shown these text-averse individuals can learn
to understand the importance of reading and writing if the instruction
is based on digital narratives. While these students are naturally
attracted to story, they are better at consuming them than creating
them. Therefore, any intervention that utilizes story as its basis needs
to include instruction on the elements of story making. This paper
presents a series of digitally-based tools to identify potential
weaknesses of visually impaired visual learners and to help motivate
these and other media-centric students to select and complete books
that are assigned to them