Abstract: This paper describes the challenges on the requirements engineering for developing an enterprise applications in higher
education environment. The development activities include software implementation, maintenance, and enhancement and support for online
transaction processing and overnight batch processing.
Generally, an enterprise application for higher education environment
may include Student Information System (SIS), HR/Payroll system,
Financial Systems etc. By the way, there are so many challenges in
requirement engineering phases in order to provide two distinctive
services that are production processing support and systems
development.
Abstract: This article investigates a contribution of synthesized visual speech. Synthesis of visual speech expressed by a computer consists in an animation in particular movements of lips. Visual speech is also necessary part of the non-manual component of a sign language. Appropriate methodology is proposed to determine the quality and the accuracy of synthesized visual speech. Proposed methodology is inspected on Czech speech. Hence, this article presents a procedure of recording of speech data in order to set a synthesis system as well as to evaluate synthesized speech. Furthermore, one option of the evaluation process is elaborated in the form of a perceptual test. This test procedure is verified on the measured data with two settings of the synthesis system. The results of the perceptual test are presented as a statistically significant increase of intelligibility evoked by real and synthesized visual speech. Now, the aim is to show one part of evaluation process which leads to more comprehensive evaluation of the sign speech synthesis system.
Abstract: Since large power transformers are the most
expensive and strategically important components of any power
generator and transmission system, their reliability is crucially
important for the energy system operation. Also, Circuit breakers are
very important elements in the power transmission line so monitoring
the events gives a knowledgebase to determine time to the next
maintenance. This paper deals with the introduction of the
comparative method of the state estimation of transformers and
Circuit breakers using continuous monitoring of voltage, current.
This paper gives details a new method based on wavelet to apparatus
insulation monitoring. In this paper to insulation monitoring of
transformer, a new method based on wavelet transformation and
neutral point analysis is proposed. Using the EMTP tools, fault in
transformer winding and the detailed transformer winding model
were simulated. The current of neutral point of winding was analyzed
by wavelet transformation. It is shown that the neutral current of the
transformer winding has useful information about fault in insulation
of the transformer.
Abstract: The Informational Infrastructures of small and medium-sized manufacturing enterprises are relatively poor, there are serious shortages of capitals which can be invested in informatization construction, computer hardware and software resources, and human resources. To address the informatization issue in small and medium-sized manufacturing enterprises, and enable them to the application of advanced management thinking and enhance their competitiveness, the paper establish a manufacturing-oriented small and medium-sized enterprises informatization platform based on the ASP business intelligence technology, which effectively improves the scientificity of enterprises decision and management informatization.
Abstract: Methanol-to-olefins (MTO) coupled with
transformation of coal or natural gas to methanol gives an interesting
and promising way to produce ethylene and propylene. To investigate
solid concentration in gas-solid fluidized bed for methanol-to-olefins
process catalyzed by SAPO-34, a cold model experiment system is
established in this paper. The system comprises a gas distributor in a
300mm internal diameter and 5000mm height acrylic column, the
fiber optic probe system and series of cyclones. The experiments are
carried out at ambient conditions and under different superficial gas
velocity ranging from 0.3930m/s to 0.7860m/s and different initial bed
height ranging from 600mm to 1200mm. The effects of radial
distance, axial distance, superficial gas velocity, initial bed height on
solid concentration in the bed are discussed. The effects of distributor
shape and porosity on solid concentration are also discussed. The
time-averaged solid concentration profiles under different conditions
are obtained.
Abstract: In aerospace applications, interactions of airflow with
aircraft structures can result in undesirable structural deformations.
This structural deformation in turn, can be predicted if the natural
modes of the structure are known. This can be achieved through
conventional modal testing that requires a known excitation force in
order to extract these dynamic properties. This technique can be
experimentally complex because of the need for artificial excitation
and it is also does not represent actual operational condition. The
current work presents part of research work that address the practical
implementation of operational modal analysis (OMA) applied to a
cantilevered hybrid composite plate employing single contactless
sensing system via laser vibrometer. OMA technique extracts the
modal parameters based only on the measurements of the dynamic
response. The OMA results were verified with impact hammer modal
testing and good agreement was obtained.
Abstract: Ants are fascinating creatures that demonstrate the
ability to find food and bring it back to their nest. Their ability as a
colony, to find paths to food sources has inspired the development of
algorithms known as Ant Colony Systems (ACS). The principle of
cooperation forms the backbone of such algorithms, commonly used
to find solutions to problems such as the Traveling Salesman
Problem (TSP). Ants communicate to each other through chemical
substances called pheromones. Modeling individual ants- ability to
manipulate this substance can help an ACS find the best solution.
This paper introduces a Dynamic Ant Colony System with threelevel
updates (DACS3) that enhance an existing ACS. Experiments
were conducted to observe single ant behavior in a colony of
Malaysian House Red Ants. Such behavior was incorporated into the
DACS3 algorithm. We benchmark the performance of DACS3 versus
DACS on TSP instances ranging from 14 to 100 cities. The result
shows that the DACS3 algorithm can achieve shorter distance in
most cases and also performs considerably faster than DACS.
Abstract: In the normal operation conditions of a pico satellite,
conventional Unscented Kalman Filter (UKF) gives sufficiently good
estimation results. However, if the measurements are not reliable
because of any kind of malfunction in the estimation system, UKF
gives inaccurate results and diverges by time. This study, introduces
Robust Unscented Kalman Filter (RUKF) algorithms with the filter
gain correction for the case of measurement malfunctions. By the use
of defined variables named as measurement noise scale factor, the
faulty measurements are taken into the consideration with a small
weight and the estimations are corrected without affecting the
characteristic of the accurate ones. Two different RUKF algorithms,
one with single scale factor and one with multiple scale factors, are
proposed and applied for the attitude estimation process of a pico
satellite. The results of these algorithms are compared for different
types of measurement faults in different estimation scenarios and
recommendations about their applications are given.
Abstract: In this paper we analyze the application of a formal proof system to the discrete logarithm problem used in publickey cryptography. That means, we explore a computer verification of the ElGamal encryption scheme with the formal proof system Isabelle/HOL. More precisely, the functional correctness of this algorithm is formally verified with computer support. Besides, we present a formalization of the DSA signature scheme in the Isabelle/HOL system. We show that this scheme is correct what is a necessary condition for the usefulness of any cryptographic signature scheme.
Abstract: In China, with the rapid urbanization and
industrialization, and highly accelerated economic development have
resulted in degradation of water resource. The water quality
deterioration usual result from eutrophication in most cases, so how to
dispose this type pollution water higher efficiently is an urgent task.
Hower, different with traditional technology, constructed wetlands are
effective treatment systems that can be very useful because they are
simple technology and low operational cost. A pilot-scale treatment
including constructed wetlands was constructed at XingYun Lake,
Yuxi, China, and operated as primary treatment measure before
eutrophic-lake water draining to riverine landscape. Water quality
indices were determined during the experiment, the results indicated
that treatment removal efficiencies were high for Nitrate nitrogen,
Chlorophyll–a and Algae, the final removal efficiency reached to
95.20%, 93.33% and 99.87% respectively, but the removal efficiency
of Total phosphorous and Total nitrogen only reach to 68.83% and
50.00% respectively.
Abstract: For a generalized Hermite sinosiodal / hyperbolic Gaussian beam passing through an ABCD system with a finite aperture, the propagation properties are derived using the Collins integral. The results are obtained in the form of intensity graphs indicating that previously demonstrated rules of reciprocity are applicable, while the existence of the aperture accelerates this transformation.
Abstract: In this study is presented a general methodology to
predict the performance of a continuous near-critical fluid extraction
process to remove compounds from aqueous solutions using hollow
fiber membrane contactors. A comprehensive 2D mathematical
model was developed to study Porocritical extraction process. The
system studied in this work is a membrane based extractor of ethanol
and acetone from aqueous solutions using near-critical CO2.
Predictions of extraction percentages obtained by simulations have
been compared to the experimental values reported by Bothun et al.
[5]. Simulations of extraction percentage of ethanol and acetone
show an average difference of 9.3% and 6.5% with the experimental
data, respectively. More accurate predictions of the extraction of
acetone could be explained by a better estimation of the transport
properties in the aqueous phase that controls the extraction of this
solute.
Abstract: The problem addressed herein is the efficient management of the Grid/Cluster intense computation involved, when the preconditioned Bi-CGSTAB Krylov method is employed for the iterative solution of the large and sparse linear system arising from the discretization of the Modified Helmholtz-Dirichlet problem by the Hermite Collocation method. Taking advantage of the Collocation ma-trix's red-black ordered structure we organize efficiently the whole computation and map it on a pipeline architecture with master-slave communication. Implementation, through MPI programming tools, is realized on a SUN V240 cluster, inter-connected through a 100Mbps and 1Gbps ethernet network,and its performance is presented by speedup measurements included.
Abstract: Today’s technology is heavily dependent on web applications. Web applications are being accepted by users at a very rapid pace. These have made our work efficient. These include webmail, online retail sale, online gaming, wikis, departure and arrival of trains and flights and list is very long. These are developed in different languages like PHP, Python, C#, ASP.NET and many more by using scripts such as HTML and JavaScript. Attackers develop tools and techniques to exploit web applications and legitimate websites. This has led to rise of web application security; which can be broadly classified into Declarative Security and Program Security. The most common attacks on the applications are by SQL Injection and XSS which give access to unauthorized users who totally damage or destroy the system. This paper presents a detailed literature description and analysis on Web Application Security, examples of attacks and steps to mitigate the vulnerabilities.
Abstract: The problem of mapping tasks onto a computational grid with the aim to minimize the power consumption and the makespan subject to the constraints of deadlines and architectural requirements is considered in this paper. To solve this problem, we propose a solution from cooperative game theory based on the concept of Nash Bargaining Solution. The proposed game theoretical technique is compared against several traditional techniques. The experimental results show that when the deadline constraints are tight, the proposed technique achieves superior performance and reports competitive performance relative to the optimal solution.
Abstract: In this paper, we first show a relationship between two
stabilizing controllers, which presents an extended feedback system
using two stabilizing controllers. Then, we apply this relationship to
the two-stage compensator design. In this paper, we consider singleinput
single-output plants. On the other hand, we do not assume the
coprime factorizability of the model. Thus, the results of this paper
are based on the factorization approach only, so that they can be
applied to numerous linear systems.
Abstract: This paper presents comparative emission study of
newly introduced gasoline/LPG bifuel automotive engine in Indian
market. Emissions were tested as per LPG-Bharat stage III driving
cycle. Emission tests were carried out for urban cycle and extra urban
cycle. Total time for urban and extra urban cycle was 1180 sec.
Engine was run in LPG mode by using conversion system. Emissions
were tested as per standard procedure and were compared. Corrected
emissions were computed by deducting ambient reading from sample
reading. Paper describes detail emission test procedure and results
obtained. CO emissions were in the range of38.9 to 111.3 ppm. HC
emissions were in the range of 18.2 to 62.6 ppm. Nox emissions were
08 to 3.9 ppm and CO2 emissions were from 6719.2 to 8051 ppm.
Paper throws light on emission results of LPG vehicles recently
introduced in Indian automobile market. Objectives of this
experimental study were to measure emissions of engines in gasoline
& LPG mode and compare them.
Abstract: Organizational structure of the Turkish state
universities is a form of bureaucracy, a high efficient system in
rational and formal control. According to the dimensional approach
bureaucracy can occur in an organization in a degree, as some
bureaucracy characteristics can be stronger than others. In addition,
the units of an organization due to their different specific
characteristic properties can perceive the bureaucracy differently. In
the study, Hall-s Organizational Inventory, which was developed for
evaluating the degree of bureaucratization from the dimensional
perspective, is used to find out if there is a difference in the
perception of the bureaucracy between the academicians working in
three different departments and two faculties in the same university.
Abstract: This paper discusses a new, systematic approach to
the synthesis of a NP-hard class of non-regenerative Boolean
networks, described by FON[FOFF]={mi}[{Mi}], where for every
mj[Mj]∈{mi}[{Mi}], there exists another mk[Mk]∈{mi}[{Mi}], such
that their Hamming distance HD(mj, mk)=HD(Mj, Mk)=O(n), (where
'n' represents the number of distinct primary inputs). The method
automatically ensures exact minimization for certain important selfdual
functions with 2n-1 points in its one-set. The elements meant for
grouping are determined from a newly proposed weighted incidence
matrix. Then the binary value corresponding to the candidate pair is
correlated with the proposed binary value matrix to enable direct
synthesis. We recommend algebraic factorization operations as a post
processing step to enable reduction in literal count. The algorithm
can be implemented in any high level language and achieves best
cost optimization for the problem dealt with, irrespective of the
number of inputs. For other cases, the method is iterated to
subsequently reduce it to a problem of O(n-1), O(n-2),.... and then
solved. In addition, it leads to optimal results for problems exhibiting
higher degree of adjacency, with a different interpretation of the
heuristic, and the results are comparable with other methods.
In terms of literal cost, at the technology independent stage, the
circuits synthesized using our algorithm enabled net savings over
AOI (AND-OR-Invert) logic, AND-EXOR logic (EXOR Sum-of-
Products or ESOP forms) and AND-OR-EXOR logic by 45.57%,
41.78% and 41.78% respectively for the various problems.
Circuit level simulations were performed for a wide variety of
case studies at 3.3V and 2.5V supply to validate the performance of
the proposed method and the quality of the resulting synthesized
circuits at two different voltage corners. Power estimation was
carried out for a 0.35micron TSMC CMOS process technology. In
comparison with AOI logic, the proposed method enabled mean
savings in power by 42.46%. With respect to AND-EXOR logic, the
proposed method yielded power savings to the tune of 31.88%, while
in comparison with AND-OR-EXOR level networks; average power
savings of 33.23% was obtained.
Abstract: Automatic Vehicle Identification (AVI) has many
applications in traffic systems (highway electronic toll collection, red
light violation enforcement, border and customs checkpoints, etc.).
License Plate Recognition is an effective form of AVI systems. In
this study, a smart and simple algorithm is presented for vehicle-s
license plate recognition system. The proposed algorithm consists of
three major parts: Extraction of plate region, segmentation of
characters and recognition of plate characters. For extracting the
plate region, edge detection algorithms and smearing algorithms are
used. In segmentation part, smearing algorithms, filtering and some
morphological algorithms are used. And finally statistical based
template matching is used for recognition of plate characters. The
performance of the proposed algorithm has been tested on real
images. Based on the experimental results, we noted that our
algorithm shows superior performance in car license plate
recognition.