Abstract: To derive the fractional flow equation oil
displacement will be assumed to take place under the so-called
diffusive flow condition. The constraints are that fluid saturations at
any point in the linear displacement path are uniformly distributed
with respect to thickness; this allows the displacement to be described
mathematically in one dimension. The simultaneous flow of oil and
water can be modeled using thickness averaged relative permeability,
along the centerline of the reservoir. The condition for fluid potential
equilibrium is simply that of hydrostatic equilibrium for which the
saturation distribution can be determined as a function of capillary
pressure and therefore, height. That is the fluids are distributed in
accordance with capillary-gravity equilibrium.
This paper focused on the fraction flow of water versus
cumulative oil recoveries using Buckley Leverett method. Several
field cases have been developed to aid in analysis. Producing watercut
(at surface conditions) will be compared with the cumulative oil
recovery at breakthrough for the flowing fluid.
Abstract: IVE toolkit has been created for facilitating research,education and development in the ?eld of virtual storytelling andcomputer games. Primarily, the toolkit is intended for modellingaction selection mechanisms of virtual humans, investigating level-of-detail AI techniques for large virtual environments, and for exploringjoint behaviour and role-passing technique (Sec. V). Additionally, thetoolkit can be used as an AI middleware without any changes. Themain facility of IVE is that it serves for prototyping both the AI andvirtual worlds themselves. The purpose of this paper is to describeIVE?s features in general and to present our current work - includingan educational game - on this platform.Keywords? AI middleware, simulation, virtual world.
Abstract: The central recirculation zone (CRZ) in a swirl
stabilized gas turbine combustor has a dominant effect on the fuel air
mixing process and flame stability. Most of state of the art swirlers
share one disadvantage; the fixed swirl number for the same swirler
configuration. Thus, in a mathematical sense, Reynolds number
becomes the sole parameter for controlling the flow characteristics
inside the combustor. As a result, at low load operation, the
generated swirl is more likely to become feeble affecting the flame
stabilization and mixing process. This paper introduces a new swirler
concept which overcomes the mentioned weakness of the modern
configurations. The new swirler introduces air tangentially and
axially to the combustor through tangential vanes and an axial vanes
respectively. Therefore, it provides different swirl numbers for the
same configuration by regulating the ratio between the axial and
tangential flow momenta. The swirler aerodynamic performance was
investigated using four CFD simulations in order to demonstrate the
impact of tangential to axial flow rate ratio on the CRZ. It was found
that the length of the CRZ is directly proportional to the tangential to
axial air flow rate ratio.
Abstract: IP networks are evolving from data communication
infrastructure into many real-time applications such as video
conferencing, IP telephony and require stringent Quality of Service
(QoS) requirements. A rudimentary issue in QoS routing is to find a
path between a source-destination pair that satisfies two or more endto-
end constraints and termed to be NP hard or complete. In this
context, we present an algorithm Multi Constraint Path Problem
Version 3 (MCPv3), where all constraints are approximated and
return a feasible path in much quicker time. We present another
algorithm namely Delay Coerced Multi Constrained Routing
(DCMCR) where coerce one constraint and approximate the
remaining constraints. Our algorithm returns a feasible path, if exists,
in polynomial time between a source-destination pair whose first
weight satisfied by the first constraint and every other weight is
bounded by remaining constraints by a predefined approximation
factor (a). We present our experimental results with different
topologies and network conditions.
Abstract: This work presents a methodology for the selection
and design of propeller oriented to the experimental verification of
theoretical results. The problem of propeller selection and design
usually present itself in the following manner: a certain air volume
and static pressure are required for a certain system. Once the
necessity of fan design on a theoretical basis has been recognized, it
is possible to determinate the dimensions for a fan unit so that it will
perform in accordance with a certain set of specifications. The same
procedures in this work then can be applied in other propeller
selection.
Abstract: A Space Vector based Pulse Width Modulation
control technique for the three-phase PWM converter is proposed in
this paper. The proposed control scheme is based on a synchronous
reference frame model. High performance and efficiency is obtained
with regards to the DC bus voltage and the power factor
considerations of the PWM rectifier thus leading to low losses.
MATLAB/SIMULINK are used as a platform for the simulations and
a SIMULINK model is presented in the paper. The results show that
the proposed model demonstrates better performance and properties
compared to the traditional SPWM method and the method improves
the dynamic performance of the closed loop drastically.
For the Space Vector based Pulse Width Modulation, Sine signal
is the reference waveform and triangle waveform is the carrier
waveform. When the value sine signal is large than triangle signal,
the pulse will start produce to high. And then when the triangular
signals higher than sine signal, the pulse will come to low. SPWM
output will changed by changing the value of the modulation index
and frequency used in this system to produce more pulse width. The
more pulse width produced, the output voltage will have lower
harmonics contents and the resolution increase.
Abstract: One of the main objectives of order reduction is to
design a controller of lower order which can effectively control the
original high order system so that the overall system is of lower
order and easy to understand. In this paper, a simple method is
presented for controller design of a higher order discrete system.
First the original higher order discrete system in reduced to a lower
order model. Then a Proportional Integral Derivative (PID)
controller is designed for lower order model. An error minimization
technique is employed for both order reduction and controller
design. For the error minimization purpose, Differential Evolution
(DE) optimization algorithm has been employed. DE method is
based on the minimization of the Integral Squared Error (ISE)
between the desired response and actual response pertaining to a
unit step input. Finally the designed PID controller is connected to
the original higher order discrete system to get the desired
specification. The validity of the proposed method is illustrated
through a numerical example.
Abstract: MM-Path, an acronym for Method/Message Path, describes the dynamic interactions between methods in object-oriented systems. This paper discusses the classifications of MM-Path, based on the characteristics of object-oriented software. We categorize it according to the generation reasons, the effect scope and the composition of MM-Path. A formalized representation of MM-Path is also proposed, which has considered the influence of state on response method sequences of messages. .Moreover, an automatic MM-Path generation approach based on UML Statechart diagram has been presented, and the difficulties in identifying and generating MM-Path can be solved. . As a result, it provides a solid foundation for further research on test cases generation based on MM-Path.
Abstract: This paper presents design and implements a voltage
source inverter type space vector pulse width modulation (SVPWM)
for control a speed of induction motor. This scheme leads to be able
to adjust the speed of the motor by control the frequency and
amplitude of the stator voltage, the ratio of stator voltage to
frequency should be kept constant. The fuzzy logic controller is also
introduced to the system for keeping the motor speed to be constant
when the load varies. The experimental results in testing the 0.22 kW
induction motor from no-load condition to rated condition show the
effectiveness of the proposed control scheme.
Abstract: Decentralized Tuple Space (DTS) implements tuple
space model among a series of decentralized hosts and provides the
logical global shared tuple repository. Replication has been introduced
to promote performance problem incurred by remote tuple access. In
this paper, we propose a replication approach of DTS allowing
replication policies self-adapting. The accesses from users or other
nodes are monitored and collected to contribute the decision making.
The replication policy may be changed if the better performance is
expected. The experiments show that this approach suitably adjusts the
replication policies, which brings negligible overhead.
Abstract: This paper investigates the encryption efficiency of RC6 block cipher application to digital images, providing a new mathematical measure for encryption efficiency, which we will call the encryption quality instead of visual inspection, The encryption quality of RC6 block cipher is investigated among its several design parameters such as word size, number of rounds, and secret key length and the optimal choices for the best values of such design parameters are given. Also, the security analysis of RC6 block cipher for digital images is investigated from strict cryptographic viewpoint. The security estimations of RC6 block cipher for digital images against brute-force, statistical, and differential attacks are explored. Experiments are made to test the security of RC6 block cipher for digital images against all aforementioned types of attacks. Experiments and results verify and prove that RC6 block cipher is highly secure for real-time image encryption from cryptographic viewpoint. Thorough experimental tests are carried out with detailed analysis, demonstrating the high security of RC6 block cipher algorithm. So, RC6 block cipher can be considered to be a real-time secure symmetric encryption for digital images.
Abstract: Vortices can develop in intakes of turbojet and turbo
fan aero engines during high power operation in the vicinity of solid
surfaces. These vortices can cause catastrophic damage to the engine.
The factors determining the formation of the vortex include both
geometric dimensions as well as flow parameters. It was shown that
the threshold at which the vortex forms or disappears is also
dependent on the initial flow condition (i.e. whether a vortex forms
after stabilised non vortex flow or vice-versa). A computational fluid
dynamics study was conducted to determine the difference in
thresholds between the two conditions. This is the first reported
numerical investigation of the “memory effect". The numerical
results reproduce the phenomenon reported in previous experimental
studies and additional factors, which had not been previously studied,
were investigated. They are the rate at which ambient velocity
changes and the initial value of ambient velocity. The former was
found to cause a shift in the threshold but not the later. It was also
found that the varying condition thresholds are not symmetrical about
the neutral threshold. The vortex to no vortex threshold lie slightly
further away from the neutral threshold compared to the no vortex to
vortex threshold. The results suggests that experimental investigation
of vortex formation threshold performed either in vortex to no vortex
conditions, or vice versa, solely may introduce mis-predictions
greater than 10%.
Abstract: Software Reusability is primary attribute of software
quality. There are metrics for identifying the quality of reusable
components but the function that makes use of these metrics to find
reusability of software components is still not clear. These metrics if
identified in the design phase or even in the coding phase can help us
to reduce the rework by improving quality of reuse of the component
and hence improve the productivity due to probabilistic increase in
the reuse level. In this paper, we have devised the framework of
metrics that uses McCabe-s Cyclometric Complexity Measure for
Complexity measurement, Regularity Metric, Halstead Software
Science Indicator for Volume indication, Reuse Frequency metric
and Coupling Metric values of the software component as input
attributes and calculated reusability of the software component. Here,
comparative analysis of the fuzzy, Neuro-fuzzy and Fuzzy-GA
approaches is performed to evaluate the reusability of software
components and Fuzzy-GA results outperform the other used
approaches. The developed reusability model has produced high
precision results as expected by the human experts.
Abstract: In this paper the principle, basic torque theory and design optimisation of a six-phase reluctance dc machine are considered. A trapezoidal phase current waveform for the machine drive is proposed and evaluated to minimise ripple torque. Low cost normal laminated salient-pole rotors with and without slits and chamfered poles are investigated. The six-phase machine is optimised in multi-dimensions by linking the finite-element analysis method directly with an optimisation algorithm; the objective function is to maximise the torque per copper losses of the machine. The armature reaction effect is investigated in detail and found to be severe. The measured and calculated torque performances of a 35 kW optimum designed six-phase reluctance dc machine drive are presented.
Abstract: The use of neural networks for recognition application is generally constrained by their inherent parameters inflexibility after the training phase. This means no adaptation is accommodated for input variations that have any influence on the network parameters. Attempts were made in this work to design a neural network that includes an additional mechanism that adjusts the threshold values according to the input pattern variations. The new approach is based on splitting the whole network into two subnets; main traditional net and a supportive net. The first deals with the required output of trained patterns with predefined settings, while the second tolerates output generation dynamically with tuning capability for any newly applied input. This tuning comes in the form of an adjustment to the threshold values. Two levels of supportive net were studied; one implements an extended additional layer with adjustable neuronal threshold setting mechanism, while the second implements an auxiliary net with traditional architecture performs dynamic adjustment to the threshold value of the main net that is constructed in dual-layer architecture. Experiment results and analysis of the proposed designs have given quite satisfactory conducts. The supportive layer approach achieved over 90% recognition rate, while the multiple network technique shows more effective and acceptable level of recognition. However, this is achieved at the price of network complexity and computation time. Recognition generalization may be also improved by accommodating capabilities involving all the innate structures in conjugation with Intelligence abilities with the needs of further advanced learning phases.
Abstract: Vehicular Ad-hoc Network (VANET) is taking more
attention in automotive industry due to the safety concern of human
lives on roads. Security is one of the safety aspects in VANET. To be
secure, network availability must be obtained at all times since
availability of the network is critically needed when a node sends any
life critical information to other nodes. However, it can be expected
that security attacks are likely to increase in the coming future due to
more and more wireless applications being developed and deployed
onto the well-known expose nature of the wireless medium. In this
respect, the network availability is exposed to many types of attacks.
In this paper, Denial of Service (DOS) attack on network availability
is presented and its severity level in VANET environment is
elaborated. A model to secure the VANET from the DOS attacks has
been developed and some possible solutions to overcome the attacks
have been discussed.
Abstract: This paper describes the design of new method of
propagation delay measurement in micro and nanostructures during
characterization of ASIC standard library cell. Providing more
accuracy timing information about library cell to the design team we
can improve a quality of timing analysis inside of ASIC design flow
process. Also, this information could be very useful for semiconductor
foundry team to make correction in technology process. By
comparison of the propagation delay in the CMOS element and result
of analog SPICE simulation. It was implemented as digital IP core for
semiconductor manufacturing process. Specialized method helps to
observe the propagation time delay in one element of the standard-cell
library with up-to picoseconds accuracy and less. Thus, the special
useful solutions for VLSI schematic to parameters extraction, basic
cell layout verification, design simulation and verification are
announced.
Abstract: In the 1980s, companies began to feel the effect of three major influences on their product development: newer and innovative technologies, increasing product complexity and larger organizations. And therefore companies were forced to look for new product development methods. This paper tries to focus on the two of new product development methods (DFM and CE). The aim of this paper is to see and analyze different product development methods specifically on Design for Manufacturability and Concurrent Engineering. Companies can achieve and be benefited by minimizing product life cycle, cost and meeting delivery schedule. This paper also presents simplified models that can be modified and used by different companies based on the companies- objective and requirements. Methodologies that are followed to do this research are case studies. Two companies were taken and analysed on the product development process. Historical data, interview were conducted on these companies in addition to that, Survey of literatures and previous research works on similar topics has been done during this research. This paper also tries to show the implementation cost benefit analysis and tries to calculate the implementation time. From this research, it has been found that the two companies did not achieve the delivery time to the customer. Some of most frequently coming products are analyzed and 50% to 80 % of their products are not delivered on time to the customers. The companies are following the traditional way of product development that is sequentially design and production method, which highly affect time to market. In the case study it is found that by implementing these new methods and by forming multi disciplinary team in designing and quality inspection; the company can reduce the workflow steps from 40 to 30.
Abstract: By the end of XX century in the structure of humanity some changes have been provoked: a new ethnos - Ethnos of Intellect is formed and is still being formed, beside the historical types of ethnoses: open ethnos, closed ethnos, wandering ethnos, dead ethnos, - and this event was caused by the technical progress, development of informational and transport communications, especially - by creation of Internet. The Ethnos of Intellect is something very close to the ÔÇ×Information Society“ described by J. Ellule and Y. Masuda that was regarded as the culture of XXI century, being an antithesis for technical and technicistical civilizations, but it-s necessary to indicate also the essential difference between these concepts: the Ethnos of Intellect is the antithesis of Socium. The existence of such an ethnos within human society that has already become an Information Society itself is extremely important in observing legally and informatically a new kind of reins in the hands of the political power, revealing every attempt to violate the human rights of simple citizens. A concrete example of some conjunction points of legal informatics and informatical law in a certain kind of ambiental studies of the project ''State Registre of Population'' in Russia is very eloquent.
Abstract: Information systems practitioners are frequently
required to master new technology, often without the aid of formal
training. They require the skill to manage their own learning and,
when this skill is developed in their formal training, their adaptability
to new technology may be improved. Self- directed learning is the
ability of the learner to manage his or her own learning experience
with some guidance from a facilitator. Self-directed learning skills
are best improved when practiced. This paper reflects on a critical
social research project to improve the self-directed learning skills of
fourth year Information Systems students. Critical social research
differs from other research paradigms in that the researcher is viewed
as the agent of change to achieve the desired outcome in the problem
situation.