Abstract: High building constructions are increasing in south
beaches of the Caspian Sea because of tourist attractions and limitation of residential areas. According to saturated alluvial fields transfer of load from high structures to the soil by piles is inevitable.
In spite of most of these piles are under compression forces, tension piles are used in special conditions. Few studies have been conducted
because of the limited use of these piles. Tension capacity of openended pipe piles in full scale was tested in this study. The length of the bored piles was 420 up to 480 cm and all were in 120 cm
diameter. The results of testing 7 piles were compared with the results of relations given by researches.
Abstract: In this paper, we propose disease diagnosis hardware
architecture by using Hypernetworks technique. It can be used to
diagnose 3 different diseases (SPECT Heart, Leukemia, Prostate
cancer). Generally, the disparate diseases require specified diagnosis
hardware model for each disease. Using similarities of three diseases
diagnosis processor, we design diagnosis processor that can diagnose
three different diseases. Our proposed architecture that is combining
three processors to one processor can reduce hardware size without
decrease of the accuracy.
Abstract: Both image steganography and image encryption have
advantages and disadvantages. Steganograhy allows us to hide a
desired image containing confidential information in a covered or
host image while image encryption is decomposing the desired image
to a non-readable, non-comprehended manner. The encryption
methods are usually much more robust than the steganographic ones.
However, they have a high visibility and would provoke the attackers
easily since it usually is obvious from an encrypted image that
something is hidden! The combination of steganography and
encryption will cover both of their weaknesses and therefore, it
increases the security. In this paper an image encryption method
based on sinc-convolution along with using an encryption key of 128
bit length is introduced. Then, the encrypted image is covered by a
host image using a modified version of JSteg steganography
algorithm. This method could be applied to almost all image formats
including TIF, BMP, GIF and JPEG. The experiment results show
that our method is able to hide a desired image with high security and
low visibility.
Abstract: The increasing importance of FlexRay systems in
automotive domain inspires unceasingly relative researches. One
primary issue among researches is to verify the reliability of FlexRay
systems either from protocol aspect or from system design aspect.
However, research rarely discusses the effect of network topology on
the system reliability. In this paper, we will illustrate how to model
the reliability of FlexRay systems with various network topologies by
a well-known probabilistic reasoning technology, Bayesian Network.
In this illustration, we especially investigate the effectiveness of error
containment built in star topology and fault-tolerant midpoint
synchronization algorithm adopted in FlexRay communication
protocol. Through a FlexRay steer-by-wire case study, the influence
of different topologies on the failure probability of the FlexRay steerby-
wire system is demonstrated. The notable value of this research is
to show that the Bayesian Network inference is a powerful and
feasible method for the reliability assessment of FlexRay systems.
Abstract: Mobiles are considered to be the most frequently used
electronic items in world after electricity. It is probably the only
device that can be used by any gender with no age limits depending
on its functionality. This paper present the interactive interface of
Mobile and particularly aiming the use of advanced phones which are
also called smart phones. With the changes in the trend where users
are now moving from ordinary mobiles to the one with touch screens
and facilities such as WiFi and internet browsing.
Abstract: In this work, axisymetric CFD simulation of fixed bed
GTL reactor has been conducted, using computational fluid dynamics
(CFD). In fixed bed CFD modeling, when N (tube-to-particle
diameter ratio) has a large value, it is common to consider the packed
bed as a porous media. Synthesis gas (a mixture of predominantly
carbon monoxide and hydrogen) was fed to the reactor. The reactor
length was 20 cm, divided to three sections. The porous zone was in
the middle section of the reactor. The model equations were solved
employing finite volume method. The effects of particle diameter,
bed voidage, fluid velocity and bed length on pressure drop have
been investigated. Simulation results showed these parameters could
have remarkable impacts on the reactor pressure drop.
Abstract: The objective of the paper was to understand the use
of an important element of design, namely color in a Semiotic
system. Semiotics is the study of signs and sign processes, it is often
divided into three branches namely (i) Semantics that deals with the
relation between signs and the things to which they refer to mean, (ii)
Syntactics which addresses the relations among signs in formal
structures and (iii) Pragmatics that relates between signs and its
effects on they have on the people who use them to create a plan for
an object or a system referred to as design. Cubism with its versatility
was the key design tool prevalent across the 20th century. In order to
analyze the user's understanding of interaction and appreciation of
color through the movement of Cubism, an exercise was undertaken
in Dept. of Design, IIT Guwahati. This included tasks to design a
composition using color and sign process to the theme 'Between the
Lines' on a given tessellation where the users relate their work to the
world they live in, which in this case was the college campus of IIT
Guwahati. The findings demonstrate impact of the key design
element color on the principles of visual perception based on image
analysis of specific compositions.
Abstract: The Partitioned Global Address Space (PGAS) programming
paradigm offers ease-of-use in expressing parallelism
through a global shared address space while emphasizing performance
by providing locality awareness through the partitioning of
this address space. Therefore, the interest in PGAS programming
languages is growing and many new languages have emerged and
are becoming ubiquitously available on nearly all modern parallel
architectures. Recently, new parallel machines with multiple cores
are designed for targeting high performance applications. Most of the
efforts have gone into benchmarking but there are a few examples of
real high performance applications running on multicore machines.
In this paper, we present and evaluate a parallelization technique
for implementing a local DNA sequence alignment algorithm using
a PGAS based language, UPC (Unified Parallel C) on a chip
multithreading architecture, the UltraSPARC T1.
Abstract: This paper presents an architecture to assist in the
development of tools to perform experimental analysis. Existing
implementations of tools based on this architecture are also described
in this paper. These tools are applied to the real world problem of
fault attack emulation and detection in cryptographic algorithms.
Abstract: For a variety of safety and economic reasons, engineering undergraduates in Australia have experienced diminishing access to the real hardware that is typically the embodiment of their theoretical studies. This trend will delay the development of practical competence, decrease the ability to model and design, and suppress motivation. The author has attempted to address this concern by creating a software tool that contains both photographic images of real machinery, and sets of graphical modeling 'tools'. Academics from a range of disciplines can use the software to set tutorial tasks, and incorporate feedback comments for a range of student responses. An evaluation of the software demonstrated that students who had solved modeling problems with the aid of the electronic tutor performed significantly better in formal examinations with similar problems. The 2-D graphical diagnostic routines in the Tutor have the potential to be used in a wider range of problem-solving tasks.
Abstract: This paper presents the new results of energy plant –
rye and triticale at yellow ripeness and ripe, pre-treatment in high
pressure steam reactor and monosaccharide extraction. There were
investigated the influence of steam pressure (20 to 22 bar), retention
duration (180 to 240 s) and catalytic sulphuric acid concentration
strength (0 to 0.5 %) on the pre-treatment process, contents of
monosaccharides (glucose, arabinose, xylose, mannose) and
undesirable by-compounds (furfural and HMF) in the reactor. The
study has determined that the largest amount of monosaccharides
(37.2 % of glucose, 2.7 % of arabinose, 8.4 % of xylose, and 1.3 %
of mannose) was received in the rye at ripe, the samples of which
were mixed with 0.5 % concentration of catalytic sulphuric acid, and
hydrolysed in the reactor, where the pressure was 20 bar, whereas the
reaction time – 240 s.
Abstract: This paper describes a paradigmatic approach to develop architecture of secure systems by describing the requirements from four different points of view: that of the owner, the administrator, the user, and the network. Deriving requirements and developing architecture implies the joint elicitation and describing the problem and the structure of the solution. The view points proposed in this paper are those we consider as requirements towards their contributions as major parties in the design, implementation, usage and maintenance of secure systems. The dramatic growth of the technology of Internet and the applications deployed in World Wide Web have lead to the situation where the security has become a very important concern in the development of secure systems. Many security approaches are currently being used in organizations. In spite of the widespread use of many different security solutions, the security remains a problem. It is argued that the approach that is described in this paper for the development of secure architecture is practical by all means. The models representing these multiple points of view are termed the requirements model (views of owner and administrator) and the operations model (views of user and network). In this paper, this multiple view paradigm is explained by first describing the specific requirements and or characteristics of secure systems (particularly in the domain of networks) and the secure architecture / system development methodology.
Abstract: This paper describes an expanded system for a servo
system design by using the Loop Shaping Design Procedure (LSDP).
LSDP is one of the H∞ design procedure. By conducting Loop
Shaping with a compensator and robust stabilization to satisfy the
index function, we get the feedback controller that makes the control
system stable. In this paper, we propose an expanded system for a
servo system design and apply to the DC motor. The proposed method
performs well in the DC motor positioning control. It has no
steady-state error in the disturbance response and it has robust
stability.
Abstract: This work attempts to improve the permselectivity of poly-ortho-phenylenediamine (PPD) coating for glutamate biosensor applications on Pt microelectrode, using constant potential amperometry and cyclic voltammetry. Percentage permeability of the modified PPD microelectrode was carried out towards hydrogen peroxide (H2O2) and ascorbic acid (AA) whereas permselectivity represents the percentage interference by AA in H2O2 detection. The 50-μm diameter Pt disk microelectrode showed a good permeability value toward H2O2 (95%) and selectivity against AA (0.01%) compared to other sizes of electrode studied here. The electrode was further modified with glutamate oxidase (GluOx) that was immobilized and cross linked with glutaraldehyde (GA, 0.125%), resulting in Pt/PPD/GluOx-GA electrode design. The maximum current density Jmax and apparent Michaelis constant, KM, obtained on Pt/PPD/GluOx-GA electrodes were 48 μA cm-2 and 50 μM, respectively. The linear region slope (LRS) was 0.96 μA cm-2 mM-1. The detection limit (LOD) for glutamate was 3.0 ± 0.6 μM. This study shows a promising glutamate microbiosensor for brain glutamate detection.
Abstract: This paper focuses on a critical component of the situational awareness (SA), the neural control of autonomous constant depth flight of an autonomous underwater vehicle (AUV). Autonomous constant depth flight is a challenging but important task for AUVs to achieve high level of autonomy under adverse conditions. The fundamental requirement for constant depth flight is the knowledge of the depth, and a properly designed controller to govern the process. The AUV, named VORAM, is used as a model for the verification of the proposed hybrid control algorithm. Three neural network controllers, named NARMA-L2 controllers, are designed for fast and stable diving maneuvers of chosen AUV model. This hybrid control strategy for chosen AUV model has been verified by simulation of diving maneuvers using software package Simulink and demonstrated good performance for fast SA in real-time searchand- rescue operations.
Abstract: Point quad tree is considered as one of the most
common data organizations to deal with spatial data & can be used to
increase the efficiency for searching the point features. As the
efficiency of the searching technique depends on the height of the
tree, arbitrary insertion of the point features may make the tree
unbalanced and lead to higher time of searching. This paper attempts
to design an algorithm to make a nearly balanced quad tree. Point
pattern analysis technique has been applied for this purpose which
shows a significant enhancement of the performance and the results
are also included in the paper for the sake of completeness.
Abstract: Variable digital filters are useful for various signal processing and communication applications where the frequency characteristics, such as fractional delays and cutoff frequencies, can be varied. In this paper, we propose a design method of variable FIR digital filters with an approximate linear phase characteristic in the passband. The proposed variable FIR filters have some large attenuation in stopband and their large attenuation can be varied by spectrum parameters. In the proposed design method, a quasi-equiripple characteristic can be obtained by using an iterative weighted least square method. The usefulness of the proposed design method is verified through some examples.
Abstract: Active network was developed to solve the problem of
the current sharing-based network–difficulty in applying new
technology, service or standard, and duplicated operation at several
protocol layers. Active network can transport the packet loaded with
the executable codes, which enables to change the state of the network
node. However, if the network node is placed in the sharing-based
network, security and safety issues should be resolved. To satisfy this
requirement, various security aspects are required such as
authentication, authorization, confidentiality and integrity. Among
these security components, the core factor is the encryption key. As a
result, this study is designed to propose the scheme that manages the
encryption key, which is used to provide security of the
comprehensive active directory, based on the domain.
Abstract: A lightpipe is an about 99 percent specular reflective
mirror pipe or duct that is used for the transmission of the daylight
from the outside into a building. The lightpipes are usually used in
the daylighting buildings, in the residential, industrial and
commercial sectors. This paper is about the performances of a
lightpipe installed in a laboratory (3 m x 2.6 m x 3 m) without
windows. The aim is to analyse the luminous intensity distribution
for several sky/sun conditions. The lightpipe was monitored during
the year 2006. The lightpipe is 1 m long and the diameter of the top
collector and of the internal diffuser device is 0.25 m. In the
laboratory there are seven illuminance sensors: one external is
located on the roof of the laboratory and six internal sensors are
connected to a data acquisition system. The internal sensors are
positioned under the internal diffusive device at an height of 0.85 m
from the floor to simulate a working plane. The numerical data are
obtained through a simulation software. This paper shows the
comparison between the experimental and numerical results
concerning the behavior of the lightpipe.
Abstract: This paper presents unified theory for local (Savitzky-
Golay) and global polynomial smoothing. The algebraic framework
can represent any polynomial approximation and is seamless from
low degree local, to high degree global approximations. The representation
of the smoothing operator as a projection onto orthonormal
basis functions enables the computation of: the covariance matrix
for noise propagation through the filter; the noise gain and; the
frequency response of the polynomial filters. A virtually perfect Gram
polynomial basis is synthesized, whereby polynomials of degree
d = 1000 can be synthesized without significant errors. The perfect
basis ensures that the filters are strictly polynomial preserving. Given
n points and a support length ls = 2m + 1 then the smoothing
operator is strictly linear phase for the points xi, i = m+1. . . n-m.
The method is demonstrated on geometric surfaces data lying on an
invariant 2D lattice.