Abstract: This paper proposes a three-phase four-wire currentcontrolled
Voltage Source Inverter (CC-VSI) for both power quality
improvement and PV energy extraction. For power quality
improvement, the CC-VSI works as a grid current-controlling shunt
active power filter to compensate for harmonic and reactive power of
loads. Then, the PV array is coupled to the DC bus of the CC-VSI
and supplies active power to the grid. The MPPT controller employs
the particle swarm optimization technique. The output of the MPPT
controller is a DC voltage that determines the DC-bus voltage
according to PV maximum power. The PSO method is simple and
effective especially for a partially shaded PV array. From computer
simulation results, it proves that grid currents are sinusoidal and inphase
with grid voltages, while the PV maximum active power is
delivered to loads.
Abstract: Health problems linked to urban growth are current
major concerns of developing countries. In 2002 and 2005, an
interdisciplinary program “Populations et Espaces ├á Risques
SANitaires" (PERSAN) was set up under the patronage of the
Development and Research Institute. Centered on health in
Cameroon-s urban environment, the program mainly sought to (i)
identify diarrhoea risk factors in Yaoundé, (ii) to measure their
prevalence and apprehend their spatial distribution. The crosssectional
epidemiological study that was carried out revealed a
diarrheic prevalence of 14.4% (437 cases of diarrhoea on the 3,034
children examined). Also, among risk factors studied, household
refuse management methods used by city dwellers were statistically
associated to these diarrhoeas. Moreover, it happened that levels of
diarrhoeal attacks varied consistently from one neighbourhood to
another because of the discrepancy urbanization process of the
Yaoundé metropolis.
Abstract: Warehousing is commonly used in factories for the
storage of products until delivery of orders. As the amount of
products stored increases it becomes tedious to be carried out
manually. In recent years, the manual storing has converted into fully
or partially computer controlled systems, also known as Automated
Storage and Retrieval Systems (AS/RS). This paper discusses an
ASRS system, which was designed such that the best storage location
for the products is determined by utilizing a fuzzy control system.
The design maintains the records of the products to be/already in
store and the storage/retrieval times along with the availability status
of the storage locations. This paper discusses on the maintenance of
the above mentioned records and the utilization of the concept of
fuzzy logic in order to determine the optimum storage location for
the products. The paper will further discuss on the dynamic splitting
and merging of the storage locations depending on the product sizes.
Abstract: The curves, of which the square of the distance
between the two points equal to zero, are called minimal or isotropic
curves [4]. In this work, first, necessary and sufficient conditions to
be a Pseudo Helix, which is a special case of such curves, are
presented. Thereafter, it is proven that an isotropic curve-s position
vector and pseudo curvature satisfy a vector differential equation of
fourth order. Additionally, In view of solution of mentioned
equation, position vector of pseudo helices is obtained.
Abstract: The leaching behavior and structure of Li2O-CeO2- Fe2O3-P2O5 glasses incorporated with simulated high level nuclear wastes (HLW) were studied. The leach rates of gross and each constituent element were determined from the total weight loss of the specimen and the leachate analyses by inductively coupled argon plasma spectroscopy (ICP). The gross leach rate of the 4.5Li2O- 9.7CeO2-34.7Fe2O3-51.5P2O5 glass waste form containing 45 mass% simulated HLW is of the order of 10
Abstract: Transferring information developed by other peoples is an ordinary event that happens during daily conversations, for example when employees sea each other in the organization, or when they are having lunch together, or attending a meeting, they use to talk about their experience, and discuss about their current projects, and talk about their successes over some specific problems. Despite the potential value of leveraging organizational memory and expertise by using OMS and ER, still small organizations haven-t been able to capitalize on its promised value. Each organization has its internal knowledge management system, in some of organizations the system face the lack of expert people to save their experience in the repository and in another hand on some other organizations there are lots of expert people but the organization doesn-t have the maximum use of their knowledge.
Abstract: One of object oriented software developing problem
is the difficulty of searching the appropriate and suitable objects for
starting the system. In this work, ontologies appear in the part of
supporting the object discovering in the initial of object oriented
software developing. There are many researches try to demonstrate
that there is a great potential between object model and ontologies.
Constructing ontology from object model is called ontology
engineering can be done; On the other hand, this research is aiming to
support the idea of building object model from ontology is also
promising and practical. Ontology classes are available online in any
specific areas, which can be searched by semantic search engine.
There are also many helping tools to do so; one of them which are
used in this research is Protégé ontology editor and Visual Paradigm.
To put them together give a great outcome. This research will be
shown how it works efficiently with the real case study by using
ontology classes in travel/tourism domain area. It needs to combine
classes, properties, and relationships from more than two ontologies
in order to generate the object model. In this paper presents a simple
methodology framework which explains the process of discovering
objects. The results show that this framework has great value while
there is possible for expansion. Reusing of existing ontologies offers
a much cheaper alternative than building new ones from scratch.
More ontologies are becoming available on the web, and online
ontologies libraries for storing and indexing ontologies are increasing
in number and demand. Semantic and Ontologies search engines have
also started to appear, to facilitate search and retrieval of online
ontologies.
Abstract: This paper reports on investigations into capacity of a
Multiple Input Multiple Output (MIMO) wireless communication
system employing a uniform linear array (ULA) at the transmitter and
either a uniform linear array (ULA) or a uniform circular array (UCA)
antenna at the receiver. The transmitter is assumed to be surrounded by
scattering objects while the receiver is postulated to be free from
scattering objects. The Laplacian distribution of angle of arrival
(AOA) of a signal reaching the receiver is postulated. Calculations of
the MIMO system capacity are performed for two cases without and
with the channel estimation errors. For estimating the MIMO channel,
the scaled least square (SLS) and minimum mean square error
(MMSE) methods are considered.
Abstract: Brucellosis is a zoonotic disease; its symptoms and appearances are not exclusive in human and its traditional diagnosis is based on culture, serological methods and conventional PCR. For more sensitive, specific detection and differentiation of Brucella spp., the real time PCR method is recommended. This research has performed to determine the presence and prevalence of Brucella spp. and differentiation of Brucella abortus and Brucella melitensis in house mouse (Mus musculus) in west of Iran. A TaqMan analysis and single-step PCR was carried out in total 326 DNA of Mouse's spleen samples. From the total number of 326 samples, 128 (39.27%) gave positive results for Brucella spp. by conventional PCR, also 65 and 32 out of the 128 specimens were positive for B. melitensis, B. abortus, respectively. These results indicate a high presence of this pathogen in this area and that real time PCR is considerably faster than current standard methods for identification and differentiation of Brucella species. To our knowledge, this study is the first prevalence report of direct identification and differentiation of B. abortus and B. melitensis by real time PCR in mouse tissue samples in Iran.
Abstract: Nowadays, many manufacturing companies try to
reinforce their competitiveness or find a breakthrough by considering
collaboration. In Korea, more than 900 manufacturing companies are
using web-based collaboration systems developed by the
government-led project, referred to as i-Manufacturing. The system
supports some similar functions of Product Data Management (PDM)
as well as Project Management System (PMS). A web-based
collaboration system provides many useful functions for collaborative
works. This system, however, does not support new linking services
between buyers and suppliers. Therefore, in order to find new
collaborative partners, this paper proposes a framework which creates
new connections between buyers and suppliers facilitating their
collaboration, referred to as Excellent Manufacturer Scouting System
(EMSS). EMSS plays a role as a bridge between overseas buyers and
suppliers. As a part of study on EMSS, we also propose an evaluation
method of manufacturability of potential partners with six main factors.
Based on the results of evaluation, buyers may get a good guideline to
choose their new partners before getting into negotiation processes
with them.
Abstract: The controllable electrical loss which consists of the
copper loss and iron loss can be minimized by the optimal control of
the armature current vector. The control algorithm of current vector
minimizing the electrical loss is proposed and the optimal current
vector can be decided according to the operating speed and the load
conditions. The proposed control algorithm is applied to the
experimental PM motor drive system and this paper presents a
modern approach of speed control for permanent magnet
synchronous motor (PMSM) applied for Electric Vehicle using a
nonlinear control. The regulation algorithms are based on the
feedback linearization technique. The direct component of the current
is controlled to be zero which insures the maximum torque operation.
The near unity power factor operation is also achieved. More over,
among EV-s motor electric propulsion features, the energy efficiency
is a basic characteristic that is influenced by vehicle dynamics and
system architecture. For this reason, the EV dynamics are taken into
account.
Abstract: This paper investigates experimentally and
analytically the torsion behavior of steel fibered high strength self
compacting concrete beams reinforced by GFRP bars. Steel fibered
high strength self compacting concrete (SFHSSCC) and GFRP bars
became in the recent decades a very important materials in the
structural engineering field. The use of GFRP bars to replace steel
bars has emerged as one of the many techniques put forward to
enhance the corrosion resistance of reinforced concrete structures.
High strength concrete and GFRP bars attract designers and
architects as it allows improving the durability as well as the esthetics
of a construction. One of the trends in SFHSSCC structures is to
provide their ductile behavior and additional goal is to limit
development and propagation of macro-cracks in the body of
SFHSSCC elements. SFHSSCC and GFRP bars are tough, improve
the workability, enhance the corrosion resistance of reinforced
concrete structures, and demonstrate high residual strengths after
appearance of the first crack. Experimental studies were carried out
to select effective fiber contents. Three types of volume fraction from
hooked shape steel fibers are used in this study, the hooked steel
fibers were evaluated in volume fractions ranging between 0.0%,
0.75% and 1.5%. The beams shape is chosen to create the required
forces (i.e. torsion and bending moments simultaneously) on the test
zone. A total of seven beams were tested, classified into three groups.
All beams, have 200cm length, cross section of 10×20cm,
longitudinal bottom reinforcement of 3
Abstract: Firms have invested heavily in knowledge
management (KM) with the aim to build a knowledge capability and
use it to achieve a competitive advantage. Research has shown,
however, that not all knowledge management projects succeed. Some
studies report that about 84% of knowledge management projects
fail. This paper has integrated studies on the impediments to
knowledge management into a theoretical framework. Based on this
framework, five cases documenting failed KM initiatives were
analysed. The analysis gave us a clear picture about why certain KM
projects fail. The high failure rate of KM can be explained by the
gaps that exist between users and management in terms of KM
perceptions and objectives
Abstract: This paper proposes a visual cryptography by random
grids scheme with identifiable shares. The method encodes an image
O in two shares that exhibits the following features: (1) each generated
share has the same scale as O, (2) any share singly has noise-like
appearance that reveals no secret information on O, (3) the secrets can
be revealed by superimposing the two shares, (4) folding a share up
can disclose some identification patterns, and (5) both of the secret
information and the designated identification patterns are recognized
by naked eye without any computation. The property to show up
identification patterns on folded shares establishes a simple and
friendly interface for users to manage the numerous shares created by
VC schemes.
Abstract: The aim of the study is to determine the effects of
perceived organizational support on organizational identification. In
accordance with this purpose was applied on 131 family physicians in
Konya. The data obtained by means of the survey method were
analyzed. According to the results of correlation analysis, while
positive relationship between perceived organizational support,
organizational identification and supervisor support was revealed.
Also, with the scope of the research, relationships between these
variables and certain demographic variables were detected.
According to difference analysis results of the research, significant
differences between organizational identification and gender variable
were determined. However, significant differences were not
determined between demographic variables and perceived
organizational support.
Abstract: Thermal water hammer is a special type of water
hammer which rarely occurs in heat exchangers. In biphasic fluids, if
steam bubbles are surrounded by condensate, regarding lower
condensate temperature than steam, they will suddenly collapse. As a
result, the vacuum caused by an extreme change in volume lead to
movement of the condensates in all directions and their collision the
force produced by this collision leads to a severe stress in the pipe
wall. This phenomenon is a special type of water hammer. According
to fluid mechanics, this phenomenon is a particular type of transient
flows during which abrupt change of fluid leads to sudden pressure
change inside the tube. In this paper, the mechanism of abrupt failure
of 80 tubes of 481 tubes of a methanol heat exchanger is discussed.
Initially, due to excessive temperature differences between heat
transfer fluids and simultaneous failure of 80 tubes, thermal shock
was presupposed as the reason of failure. Deeper investigation on
cross-section of failed tubes showed that failure was, ductile type of
failure, so the first hypothesis was rejected. Further analysis and more
accurate experiments revealed that failure of tubes caused by thermal
water hammer. Finally, the causes of thermal water hammer and
various solutions to avoid such mechanism are discussed.
Abstract: The research focuses on the effects of polyphenols
extracted from Sambucus nigra fruit, using an experimental arterial
hypertension pattern, as well as their influence on the oxidative
stress. The results reveal the normalization of the reduced glutathion
concentration, as well as a considerable reduction in the
malondialdehide serum concentration by the polyphenolic protection.
The rat blood pressure values were recorded using a CODATM
system, which uses a non-invasive blood pressure measuring method.
All the measured blood pressure components revealed a biostatistically
significant (p
Abstract: In this paper, we propose a method of alter duration in
frequency domain that control prosody in real time after pitch
alteration. If there has a method to alteration duration freely among
prosody information, that may used in several fields such as speech
impediment person's pronunciation proof reading or language study.
The pitch alteration method used control prosody altered by PSOLA
synthesis method which is in time domain processing method.
However, the duration of pitch alteration speech is changed by the
frequency domain. In this paper, we altered the duration with the
method of duration alteration by Fast Fourier Transformation in
frequency domain. Consequently, the intelligibility of the pitch and
duration are controlled has a slight decrease than the case when only
pitch is changed, but the proposed algorithm obtained the higher MOS
score about naturalness.
Abstract: The design of methods of the 20 K large dimension cold shield used for infrared radiation demarcating in space environment simulation test were introduced in this paper. The cold shield were cooled by five G-M cryocoolers , and the dimension of the cold shield is the largest in our country.Cold shield installation and distribution and compensator for contraction on cooling were introduced detailedly. The temperature distribution and cool-down time of cold shield surface were also calculated and analysed in this paper. The design of cold shield resolves the difficulty of compensator for contraction on cooling successfully. Test results show that the actual technical performance indicators of cold shield met and exceeded the design requirements.
Abstract: Resistance of denial of service attacks is a key security requirement in voting protocols. Acquisti protocol plays an important role in development of internet voting protocols and claims its security without strong physical assumptions. In this study firstly Acquisti protocol is modeled in extended applied pi calculus, and then resistance of denial of service attacks is proved with ProVerif. The result is that it is not resistance of denial of service attacks because two denial of service attacks are found. Finally we give the method against the denial of service attacks.