Abstract: The flexible follower response of a translating cam with
four different profiles for rise-dwell-fall-dwell (RDFD) motion is
investigated. The cycloidal displacement motion, the modified
sinusoidal acceleration motion, the modified trapezoidal acceleration
motion, and the 3-4-5 polynomial motion are employed to describe the
rise and the fall motions of the follower and the associated four kinds of
cam profiles are studied. Since the follower flexibility is considered,
the contact point of the roller and the cam is an unknown. Two
geometric constraints formulated to restrain the unknown position are
substituted into Hamilton-s principle with Lagrange multipliers.
Applying the assumed mode method, one can obtain the governing
equations of motion as non-linear differential-algebraic equations. The
equations are solved using Runge-Kutta method. Then, the responses of
the flexible follower undergoing the four different motions are
investigated in time domain and in frequency domain.
Abstract: Personnel protection devices are cardinal in safety hazard applications. They are widely used in home, office and in industry environments to reduce the risk of lethal shock to human being and equipment safety. This paper briefly reviews various personnel protection devices also describes the basic working principle of conventional ground fault circuit interrupter (GFCI) or ground fault isolator (GFI), its disadvantages and ways to overcome the disadvantages with solid-state relay (SSR) based GFI with ultrafast response up on fault implemented in printed circuit board. This solid state GFI comprises discrete MOSFET based alternating current (AC) switches, linear optical amplifier, photovoltaic isolator and sense resistor. In conventional GFI, current transformer is employed as a sensing element to detect the difference in current flow between live and neutral conductor. If there is no fault in equipment powered through GFI, due to insulation failure of internal wires and windings of motors, both live and neutral currents will be equal in magnitude and opposite in phase.
Abstract: In this paper, we propose a new robust and secure
system that is based on the combination between two different
transforms Discrete wavelet Transform (DWT) and Contourlet
Transform (CT). The combined transforms will compensate the
drawback of using each transform separately. The proposed
algorithm has been designed, implemented and tested successfully.
The experimental results showed that selecting the best sub-band for
embedding from both transforms will improve the imperceptibility
and robustness of the new combined algorithm. The evaluated
imperceptibility of the combined DWT-CT algorithm which gave a
PSNR value 88.11 and the combination DWT-CT algorithm
improves robustness since it produced better robust against Gaussian
noise attack. In addition to that, the implemented system shored a
successful extraction method to extract watermark efficiently.
Abstract: Having done in this study, air-conditioning
automation for patisserie shopwindow was designed. In the cooling
sector it is quite important to cooling up the air temperature in the
shopwindow within short time interval. Otherwise the patisseries
inside of the shopwindow will be spoilt in a few days. Additionally
the humidity is other important parameter for the patisseries kept in
shopwindow. It must be raised up to desired level in a quite short
time. Traditional patisserie shopwindows only allow controlling
temperature manually. There is no humidity control and humidity is
supplied by fans that are directed to the water at the bottom of the
shopwindows. In this study, humidity and temperature sensors
(SHT11), PIC, AC motor controller, DC motor controller, ultrasonic
nebulizer and other electronic circuit members were used to simulate
air conditioning automation for patisserie shopwindow in proteus
software package. The simulation results showed that temperature
and humidity values are adjusted in desired time duration by openloop
control technique. Outer and inner temperature and humidity
values were used for control mechanism.
Abstract: The proliferation of user-generated content (UGC) results in huge opportunities to explore event patterns. However, existing event recommendation systems primarily focus on advanced information technology users. Little work has been done to address novice and low-literacy users. The next billion users providing and consuming UGC are likely to include communities from developing countries who are ready to use affordable technologies for subsistence goals. Therefore, we propose a design framework for providing event recommendations to address the needs of such users. Grounded in information integration theory (IIT), our framework advocates that effective event recommendation is supported by systems capable of (1) reliable information gathering through structured user input, (2) accurate sense making through spatial-temporal analytics, and (3) intuitive information dissemination through interactive visualization techniques. A mobile pest management application is developed as an instantiation of the design framework. Our preliminary study suggests a set of design principles for novice and low-literacy users.
Abstract: The transition to sustainable development requires
considerable investments from stakeholders, both financial and
immaterial. However, accounting for such investments often poses a
challenge, as ventures with intangible or non-financial returns remain
oblivious to conventional accounting techniques and risk assessment.
That such investments may significantly contribute to the welfare of
those affected may act as a driving force behind attempting to bridge
this gap. This gains crucial importance as investments must be also
backed by governments and administrations; entities whose budget
depends on taxpayers- contributions and whose tasks are based on
securing the welfare of their citizens. Besides economic welfare,
citizens also require social and environmental wellbeing too.
However, administrations must also safeguard that welfare is
guaranteed not only to present, but to future generations too. With
already strained budgets and the requirement of sustainable
development, governments on all levels face the double challenge of
making both of these ends meet.
Abstract: A vast array of biological materials, especially algae have received increasing attention for heavy metal removal. Algae have been proven to be cheaper, more effective for the removal of metallic elements in aqueous solutions. A fresh water algal strain was isolated from Zoo Lake, Johannesburg, South Africa and identified as Desmodesmus sp. This paper investigates the efficacy of Desmodesmus sp.in removing heavy metals contaminating the Wonderfonteinspruit Catchment Area (WCA) water bodies. The biosorption data fitted the pseudo-second order and Langmuir isotherm models. The Langmuir maximum uptakes gave the sequence: Mn2+>Ni2+>Fe2+. The best results for kinetic study was obtained in concentration 120 ppm for Fe3+ and Mn2+, whilst for Ni2+ was at 20 ppm, which is about the same concentrations found in contaminated water in the WCA (Fe3+115 ppm, Mn2+ 121 ppm and Ni2+ 26.5 ppm).
Abstract: Research has suggested that implicit learning tasks
may rely on episodic processing to generate above chance
performance on the standard classification tasks. The current
research examines the invariant features task (McGeorge and Burton,
1990) and argues that such episodic processing is indeed important.
The results of the experiment suggest that both rejection and
similarity strategies are used by participants in this task to
simultaneously reject unfamiliar items and to accept (falsely) familiar
items. Primarily these decisions are based on the presence of low or
high frequency goal based features of the stimuli presented in the
incidental learning phase. It is proposed that a goal based analysis of
the incidental learning task provides a simple step in understanding
which features of the episodic processing are most important for
explaining the match between incidental, implicit learning and test
performance.
Abstract: Now-a-days, numbers of simulation software are
being used all over the world to solve Computational Fluid
Dynamics (CFD) related problems. In this present study, a
commercial CFD simulation software namely STAR-CCM+ is
applied to analyze the airflow characteristics inside a 2.5" hard
disk drive. Each step of the software is described adequately to
obtain the output and the data are verified with the theories to
justify the robustness of the simulation outcome. This study
gives an insight about the accuracy level of the CFD
simulation software to compute CFD related problems
although it largely depends upon the computer speed. Also
this study will open avenues for further research.
Abstract: This paper describes a concept of stereotype student
model in adaptive knowledge acquisition e-learning system. Defined
knowledge stereotypes are based on student's proficiency level and
on Bloom's knowledge taxonomy. The teacher module is responsible
for the whole adaptivity process: the automatic generation of
courseware elements, their dynamic selection and sorting, as well as
their adaptive presentation using templates for statements and
questions. The adaptation of courseware is realized according to
student-s knowledge stereotype.
Abstract: In order to achieve better road utilization and traffic
efficiency, there is an urgent need for a travel information delivery
mechanism to assist the drivers in making better decisions in the
emerging intelligent transportation system applications. In this paper,
we propose a relayed multicast scheme under heterogeneous networks
for this purpose. In the proposed system, travel information consisting
of summarized traffic conditions, important events, real-time traffic
videos, and local information service contents is formed into layers
and multicasted through an integration of WiMAX infrastructure and
Vehicular Ad hoc Networks (VANET). By the support of adaptive
modulation and coding in WiMAX, the radio resources can be
optimally allocated when performing multicast so as to dynamically
adjust the number of data layers received by the users. In addition to
multicast supported by WiMAX, a knowledge propagation and
information relay scheme by VANET is designed. The experimental
results validate the feasibility and effectiveness of the proposed
scheme.
Abstract: In many applications, magnetic suspension systems
are required to operate over large variations in air gap. As a result,
the nonlinearities inherent in most types of suspensions have a
significant impact on performance. Specifically, it may be difficult to
design a linear controller which gives satisfactory performance,
stability, and disturbance rejection over a wide range of operating
points. in this paper an optimal controller based on discontinuous
mathematical model of the system for an electromagnetic suspension
system which is applied in magnetic trains has been designed .
Simulations show that the new controller can adapt well to the
variance of suspension mass and gap, and keep its dynamic
performance, thus it is superior to the classic controller.
Abstract: The human knee joint has a three dimensional
geometry with multiple body articulations that produce complex
mechanical responses under loads that occur in everyday life and
sports activities. To produce the necessary joint compliance and
stability for optimal daily function various menisci and ligaments are
present while muscle forces are used to this effect. Therefore,
knowledge of the complex mechanical interactions of these load
bearing structures is necessary when treatment of relevant diseases is
evaluated and assisting devices are designed.
Numerical tools such as finite element analysis are suitable for
modeling such joints in order to understand their physics. They have
been used in the current study to develop an accurate human knee
joint and model its mechanical behavior. To evaluate the efficacy of
this articulated model, static load cases were used for comparison
purposes with previous experimentally verified modeling works
drawn from literature.
Abstract: This paper systematically investigates the timedependent
health outcomes for office staff during computer work
using the developed mathematical model. The model describes timedependent
health outcomes in multiple body regions associated with
computer usage. The association is explicitly presented with a doseresponse
relationship which is parametrized by body region
parameters. Using the developed model we perform extensive
investigations of the health outcomes statically and dynamically. We
compare the risk body regions and provide various severity rankings
of the discomfort rate changes with respect to computer-related
workload dynamically for the study population. Application of the
developed model reveals a wide range of findings. Such broad
spectrum of investigations in a single report literature is lacking.
Based upon the model analysis, it is discovered that the highest
average severity level of the discomfort exists in neck, shoulder, eyes,
shoulder joint/upper arm, upper back, low back and head etc. The
biggest weekly changes of discomfort rates are in eyes, neck, head,
shoulder, shoulder joint/upper arm and upper back etc. The fastest
discomfort rate is found in neck, followed by shoulder, eyes, head,
shoulder joint/upper arm and upper back etc. Most of our findings are
consistent with the literature, which demonstrates that the developed
model and results are applicable and valuable and can be utilized to
assess correlation between the amount of computer-related workload
and health risk.
Abstract: The present study has been conducted to characterize
the prophenoloxidase (PPO) system of the desert locust, Schistocerca
gregaria following injection of Bacillus thuringiensis kurstaki (Bt).
The bulk of PPO system was associated with haemocytes and a little
amount was found in plasma. This system was activated by different
activators such as laminarin, lipopolysaccharide (LPS) and trypsin
suggesting that the stimulatory mechanism may involve an enzyme
cascade of one or more associated molecules. These activators did
not activate all the molecules of the cascade. Presence of
phenoloxidase activity (PO) coincides with the appearance of protein
band with molecular weight (MW) 70.154 KD (Kilo Dalton).
Abstract: Software security testing is an important means to ensure software security and trustiness. This paper first mainly discusses the definition and classification of software security testing, and investigates methods and tools of software security testing widely. Then it analyzes and concludes the advantages and disadvantages of various methods and the scope of application, presents a taxonomy of security testing tools. Finally, the paper points out future focus and development directions of software security testing technology.
Abstract: An on-demand routing protocol for wireless ad hoc
networks is one that searches for and attempts to discover a route to
some destination node only when a sending node originates a data
packet addressed to that node. In order to avoid the need for such a
route discovery to be performed before each data packet is sent, such
routing protocols must cache routes previously discovered. This
paper presents an analysis of the effect of intelligent caching in a non
clustered network, using on-demand routing protocols in wireless ad
hoc networks. The analysis carried out is based on the Dynamic
Source Routing protocol (DSR), which operates entirely on-demand.
DSR uses the cache in every node to save the paths that are learnt
during route discovery procedure. In this implementation, caching
these paths only at intermediate nodes and using the paths from these
caches when required is tried. This technique helps in storing more
number of routes that are learnt without erasing the entries in the
cache, to store a new route that is learnt.
The simulation results on DSR have shown that this technique
drastically increases the available memory for caching the routes
discovered without affecting the performance of the DSR routing
protocol in any way, except for a small increase in end to end delay.
Abstract: Medical image registration is the key technology in image guided radiation therapy (IGRT) systems. On the basis of the previous work on our IGRT prototype with a biorthogonal x-ray imaging system, we described a method focused on the 2D/2D rigid-body registration using multiresolution pyramid based mutual information in this paper. Three key steps were involved in the method : firstly, four 2D images were obtained including two x-ray projection images and two digital reconstructed radiographies(DRRs ) as the input for the registration ; Secondly, each pair of the corresponding x-ray image and DRR image were matched using multiresolution pyramid based mutual information under the ITK registration framework ; Thirdly, we got the final couch offset through a coordinate transformation by calculating the translations acquired from the two pairs of the images. A simulation example of a parotid gland tumor case and a clinical example of an anthropomorphic head phantom were employed in the verification tests. In addition, the influence of different CT slice thickness were tested. The simulation results showed that the positioning errors were 0.068±0.070, 0.072±0.098, 0.154±0.176mm along three axes which were lateral, longitudinal and vertical. The clinical test indicated that the positioning errors of the planned isocenter were 0.066, 0.07, 2.06mm on average with a CT slice thickness of 2.5mm. It can be concluded that our method with its verified accuracy and robustness can be effectively used in IGRT systems for patient setup.
Abstract: This paper describes the authorization system
architecture for Pervasive Grid environment. It discusses the
characteristics of classical authorization system and requirements of
the authorization system in pervasive grid environment as well.
Based on our analysis of current systems and taking into account the
main requirements of such pervasive environment, we propose new
authorization system architecture as an extension of the existing grid
authorization mechanisms. This architecture not only supports user
attributes but also context attributes which act as a key concept for
context-awareness thought. The architecture allows authorization of
users dynamically when there are changes in the pervasive grid
environment. For this, we opt for hybrid authorization method that
integrates push and pull mechanisms to combine the existing grid
authorization attributes with dynamic context assertions. We will
investigate the proposed architecture using a real testing environment
that includes heterogeneous pervasive grid infrastructures mapped
over multiple virtual organizations. Various scenarios are described
in the last section of the article to strengthen the proposed mechanism
with different facilities for the authorization procedure.
Abstract: The current research paper is an implementation of
Eigen Faces and Karhunen-Loeve Algorithm for face recognition.
The designed program works in a manner where a unique
identification number is given to each face under trial. These faces
are kept in a database from where any particular face can be matched
and found out of the available test faces. The Karhunen –Loeve
Algorithm has been implemented to find out the appropriate right
face (with same features) with respect to given input image as test
data image having unique identification number. The procedure
involves usage of Eigen faces for the recognition of faces.