Abstract: The authors present a mixed method for reducing the order of the large-scale dynamic systems. In this method, the denominator polynomial of the reduced order model is obtained by using the modified pole clustering technique while the coefficients of the numerator are obtained by Pade approximations. This method is conceptually simple and always generates stable reduced models if the original high-order system is stable. The proposed method is illustrated with the help of the numerical examples taken from the literature.
Abstract: The dome with ribs and rings, which covers the
ROMEXPO pavilion from Bucharest, was designed after the collapse
of the single layer reticulated dome. In this paper, it was made the
checking of the structure, under the dynamic loads with three
recorded accelerograms calibrated according to Romanian seismic
design code P100-1/2006. Under the action the dynamic loadings, it
was made a time-history analysis to determine the zones where the
plastic hinges appear, at what accelerations and their position on the
structure. The studied dome is formed by 32 spatial semi arches and
three rings: one circular ring located at the top of the dome and
another two rings, design as trusses, the first near the supports and the
second as an intermediate rings above the skylights. Above the
skylights up to the top, the dome is tight together with purlins and
bracings.
Abstract: In this paper, we propose a novel adaptive voltage control strategy for boost converter via Inverse LQ Servo-Control. Our presented strategy is based on an analytical formula of Inverse Linear Quadratic (ILQ) design method, which is not necessary to solve Riccati’s equation directly. The optimal and adaptive controller of the voltage control system is designed. The stability and the robust control are analyzed. Whereas, we can get the analytical solution for the optimal and robust voltage control is achieved through the natural angular velocity within a single parameter and we can change the responses easily via the ILQ control theory. Our method provides effective results as the stable responses and the response times are not drifted even if the condition is changed widely.
Abstract: Environmental awareness and depletion of the
petroleum resources are among vital factors that motivate a number
of researchers to explore the potential of reusing natural fiber as an
alternative composite material in industries such as packaging,
automotive and building constructions. Natural fibers are available in
abundance, low cost, lightweight polymer composite and most
importance its biodegradability features, which often called “ecofriendly"
materials. However, their applications are still limited due
to several factors like moisture absorption, poor wettability and large
scattering in mechanical properties. Among the main challenges on
natural fibers reinforced matrices composite is their inclination to
entangle and form fibers agglomerates during processing due to
fiber-fiber interaction. This tends to prevent better dispersion of the
fibers into the matrix, resulting in poor interfacial adhesion between
the hydrophobic matrix and the hydrophilic reinforced natural fiber.
Therefore, to overcome this challenge, fiber treatment process is one
common alternative that can be use to modify the fiber surface
topology by chemically, physically or mechanically technique.
Nevertheless, this paper attempt to focus on the effect of
mercerization treatment on mechanical properties enhancement of
natural fiber reinforced composite or so-called bio composite. It
specifically discussed on mercerization parameters, and natural fiber
reinforced composite mechanical properties enhancement.
Abstract: We report the results of an lattice Boltzmann
simulation of magnetohydrodynamic damping of sidewall convection
in a rectangular enclosure filled with a porous medium. In particular
we investigate the suppression of convection when a steady magnetic
field is applied in the vertical direction. The left and right vertical
walls of the cavity are kept at constant but different temperatures
while both the top and bottom horizontal walls are insulated. The
effects of the controlling parameters involved in the heat transfer and
hydrodynamic characteristics are studied in detail. The heat and mass
transfer mechanisms and the flow characteristics inside the enclosure
depended strongly on the strength of the magnetic field and Darcy
number. The average Nusselt number decreases with rising values of
the Hartmann number while this increases with increasing values of
the Darcy number.
Abstract: In the project FleGSens, a wireless sensor network
(WSN) for the surveillance of critical areas and properties is currently developed which incorporates mechanisms to ensure information
security. The intended prototype consists of 200 sensor nodes for
monitoring a 500m long land strip. The system is focused on ensuring
integrity and authenticity of generated alarms and availability in the
presence of an attacker who may even compromise a limited number
of sensor nodes. In this paper, two of the main protocols developed
in the project are presented, a tracking protocol to provide secure
detection of trespasses within the monitored area and a protocol for secure detection of node failures. Simulation results of networks
containing 200 and 2000 nodes as well as the results of the first prototype comprising a network of 16 nodes are presented. The focus of the simulations and prototype are functional testing of the protocols
and particularly demonstrating the impact and cost of several attacks.
Abstract: We try to give a solution of version control for
documents in web service, that-s why we propose a new approach
used specially for the XML documents. The new approach is applied
in a centralized repository, this repository coexist with other
repositories in a decentralized system. To achieve the activities of
this approach in a standard model we use the ECA active rules. We
also show how the Event-Condition-Action rules (ECA rules) have
been incorporated as a mechanism for the version control of
documents. The need to integrate ECA rules is that it provides a clear
declarative semantics and induces an immediate operational
realization in the system without the need for human intervention.
Abstract: Majority of Business Software Systems (BSS)
Development and Enhancement Projects (D&EP) fail to meet criteria
of their effectiveness, what leads to the considerable financial losses.
One of the fundamental reasons for such projects- exceptionally low
success rate are improperly derived estimates for their costs and time.
In the case of BSS D&EP these attributes are determined by the work
effort, meanwhile reliable and objective effort estimation still appears
to be a great challenge to the software engineering. Thus this paper is
aimed at presenting the most important synthetic conclusions coming
from the author-s own studies concerning the main factors of
effective BSS D&EP work effort estimation. Thanks to the rational
investment decisions made on the basis of reliable and objective
criteria it is possible to reduce losses caused not only by abandoned
projects but also by large scale of overrunning the time and costs of
BSS D&EP execution.
Abstract: We present analysis of spatial patterns of generic
disease spread simulated by a stochastic long-range correlation SIR
model, where individuals can be infected at long distance in a power
law distribution. We integrated various tools, namely perimeter,
circularity, fractal dimension, and aggregation index to characterize
and investigate spatial pattern formations. Our primary goal was to
understand for a given model of interest which tool has an advantage
over the other and to what extent. We found that perimeter and
circularity give information only for a case of strong correlation–
while the fractal dimension and aggregation index exhibit the growth
rule of pattern formation, depending on the degree of the correlation
exponent (β). The aggregation index method used as an alternative
method to describe the degree of pathogenic ratio (α). This study may
provide a useful approach to characterize and analyze the pattern
formation of epidemic spreading
Abstract: Computational fluid dynamics (CFD) simulations
carried out in this paper show that spacer orientation has a major
influence on temperature patterns and on the heat transfer rates. The
local heat flux values significantly vary from high to very low values
at each filament when spacer touches the membrane surface. The
heat flux profile is more uniform when spacer filaments are not in
contact with the membrane thus making this arrangement more
beneficial. The temperature polarization is also found to be less in
this case when compared to the empty channel.
Abstract: To successfully provide a fast FIR filter with FTT algorithms, overlapped-save algorithms can be used to lower the computational complexity and achieve the desired real-time processing. As the length of the input block increases in order to improve the efficiency, a larger volume of zero padding will greatly increase the computation length of the FFT. In this paper, we use the overlapped block digital filtering to construct a parallel structure. As long as the down-sampling (or up-sampling) factor is an exact multiple lengths of the impulse response of a FIR filter, we can process the input block by using a parallel structure and thus achieve a low-complex fast FIR filter with overlapped-save algorithms. With a long filter length, the performance and the throughput of the digital filtering system will also be greatly enhanced.
Abstract: The paper presents a one-dimensional transient
mathematical model of thermal oil-water two-phase emulsion flows
in pipes. The set of the mass, momentum and enthalpy conservation
equations for the continuous fluid and droplet phases are solved. Two
friction correlations for the continuous fluid phase to wall friction are
accounted for in the model and tested. The aerodynamic drag force
between the continuous fluid phase and droplets is modeled, too. The
density and viscosity of both phases are assumed to be constant due
to adiabatic experimental conditions. The proposed mathematical
model is validated on the experimental measurements of oil-water
emulsion flows in horizontal pipe [1,2]. Numerical analysis on
single- and two-phase oil-water flows in a pipe is presented in the
paper. The continuous oil flow having water droplets is simulated.
Predictions, which are performed by using the presented model, show
excellent agreement with the experimental data if the water fraction is
equal or less than 10%. Disagreement between simulations and
measurements is increased if the water fraction is larger than 10%.
Abstract: The fundamental objective of the university is to
genuinely provide a higher education to mankind and society. Higher
education institutions earn billions of dollars in research funds, granted
by national government or related institutions, which literally came
from taxpayers. Everyday universities consume those grants; in return,
provide society with a human resource and research developments.
However, not all taxpayers have their major concerns on those
researches, other than that they are more curiously to see the project
being build tangibly and evidently to certify what they pay for. This
paper introduces the concept of University – Community Business
Continuity Management for Disaster – Resilient City, which modified
the concept of Business Continuity Management (BCM) toward
university community to create advancing collaboration leading to the
disaster – resilient community and city. This paper focuses on
describing in details the backgrounds and principles of the concept and
discussing the advantages and limitations of the concept.
Abstract: In this paper we present a new method for coin
identification. The proposed method adopts a hybrid scheme using
Eigenvalues of covariance matrix, Circular Hough Transform (CHT)
and Bresenham-s circle algorithm. The statistical and geometrical
properties of the small and large Eigenvalues of the covariance
matrix of a set of edge pixels over a connected region of support are
explored for the purpose of circular object detection. Sparse matrix
technique is used to perform CHT. Since sparse matrices squeeze
zero elements and contain only a small number of non-zero elements,
they provide an advantage of matrix storage space and computational
time. Neighborhood suppression scheme is used to find the valid
Hough peaks. The accurate position of the circumference pixels is
identified using Raster scan algorithm which uses geometrical
symmetry property. After finding circular objects, the proposed
method uses the texture on the surface of the coins called texton,
which are unique properties of coins, refers to the fundamental micro
structure in generic natural images. This method has been tested on
several real world images including coin and non-coin images. The
performance is also evaluated based on the noise withstanding
capability.
Abstract: Team distillation assisted by microwave extraction
(SDAM) considered as accelerated technique extraction is a
combination of microwave heating and steam distillation, performed
at atmospheric pressure. SDAM has been compared with the same
technique coupled with the cryogrinding of seeds (SDAM -CG).
Isolation and concentration of volatile compounds are performed by a
single stage for the extraction of essential oil from Cuminum
cyminum seeds. The essential oils extracted by these two methods for
5 min were quantitatively (yield) and qualitatively (aromatic profile)
no similar. These methods yield an essential oil with higher amounts
of more valuable oxygenated compounds, and allow substantial
savings of costs, in terms of time, energy and plant material. SDAM
and SDAM-CG is a green technology and appears as a good
alternative for the extraction of essential oils from aromatic plants.
Abstract: In this paper, real-coded genetic algorithm (RCGA) optimization technique has been applied for large-scale linear dynamic multi-input-multi-output (MIMO) system. The method is based on error minimization technique where the integral square error between the transient responses of original and reduced order models has been minimized by RCGA. The reduction procedure is simple computer oriented and the approach is comparable in quality with the other well-known reduction techniques. Also, the proposed method guarantees stability of the reduced model if the original high-order MIMO system is stable. The proposed approach of MIMO system order reduction is illustrated with the help of an example and the results are compared with the recently published other well-known reduction techniques to show its superiority.
Abstract: Rockfall is a kind of irregular geological disaster. Its
destruction time, space and movements are highly random. The impact
force is determined by the way and velocity rocks move. The
movement velocity of a rockfall depends on slope gradient of its
moving paths, height, slope surface roughness and rock shapes. For
effectively mitigate and prevent disasters brought by rockfalls, it is
required to precisely calculate the moving paths of a rockfall so as to
provide the best protective design. This paper applies Colorado
Rockfall Simulation Program (CRSP) as our study tool to discuss the
impact of slope shape and surface roughness on the moving paths of a
single rockfall. The analytical results showed that the slope, m=1:1,
acted as the threshold for rockfall bounce height on a monoclinal slight
slope. When JRC ´╝£ 1.2, movement velocity reduced and bounce
height increased as JCR increased. If slope fixed and JRC increased,
the bounce height of rocks increased gradually with reducing
movement velocity. Therefore, the analysis on the moving paths of
rockfalls with CRSP could simulate bouncing of falling rocks. By
analyzing moving paths, velocity, and bounce height of falling rocks,
we could effectively locate impact points of falling rocks on a slope.
Such analysis can be served as a reference for future disaster
prevention and control.
Abstract: In this work a novel approach for color image
segmentation using higher order entropy as a textural feature for
determination of thresholds over a two dimensional image histogram
is discussed. A similar approach is applied to achieve multi-level
thresholding in both grayscale and color images. The paper discusses
two methods of color image segmentation using RGB space as the
standard processing space. The threshold for segmentation is decided
by the maximization of conditional entropy in the two dimensional
histogram of the color image separated into three grayscale images of
R, G and B. The features are first developed independently for the
three ( R, G, B ) spaces, and combined to get different color
component segmentation. By considering local maxima instead of the
maximum of conditional entropy yields multiple thresholds for the
same image which forms the basis for multilevel thresholding.
Abstract: The goal of this work is to improve the efficiency and the reliability of the automatic artifact rejection, in particular from the Electroencephalographic (EEG) recordings. Artifact rejection is a key topic in signal processing. The artifacts are unwelcome signals that may occur during the signal acquisition and that may alter the analysis of the signals themselves. A technique for the automatic artifact rejection, based on the Independent Component Analysis (ICA) for the artifact extraction and on some high order statistics such as kurtosis and Shannon-s entropy, was proposed some years ago in literature. In this paper we enhance this technique introducing the Renyi-s entropy. The performance of our method was tested exploiting the Independent Component scalp maps and it was compared to the performance of the method in literature and it showed to outperform it.
Abstract: The aim of this paper is to explore the security issues
that significantly affect the performance of Mobile Adhoc Networks
(MANET)and limit the services provided to their intended users. The
MANETs are more vulnerable to Distributed Denial of Service
attacks (DDoS) because of their properties like shared medium,
dynamic topologies etc. A DDoS attack is a coordinated attempt
made by malicious users to flood the victim network with the large
amount of data such that the resources of the victim network are
exhausted resulting in the deterioration of the network performance.
This paper highlights the effects of different types of DDoS attacks
in MANETs and categorizes them according to their behavior.