Abstract: Today, Hydroforming technology provides an
attractive alternative to conventional matched die forming, especially
for cost-sensitive, lower volume production, and for parts with
irregular contours. In this study the critical fluid pressures which lead
to rupture in the workpiece has been investigated by theoretical and
finite element methods. The axisymmetric analysis was developed to
investigate the tearing phenomenon in cylindrical Hydroforming
Deep Drawing (HDD). By use of obtained equations the effect of
anisotropy, drawing ratio, sheet thickness and strain hardening
exponent on tearing diagram were investigated.
Abstract: A key aspect of the design of any software system is
its architecture. An architecture description provides a formal model
of the architecture in terms of components and connectors and how
they are composed together. COSA (Component-Object based
Software Structures), is based on object-oriented modeling and
component-based modeling. The model improves the reusability by
increasing extensibility, evolvability, and compositionality of the
software systems. This paper presents the COSA modelling tool
which help architects the possibility to verify the structural coherence
of a given system and to validate its semantics with COSA approach.
Abstract: The effects of commercial or bovine yeasts on the
performance and blood variables of broiler chickens intoxicated with
aflatoxin were investigated in broilers. Four hundred eighty broilers
(Arbor Acres; 3-wk-old) were randomly assigned to 4 groups. Each
group (120 broiler chickens) was further randomly divided into 6
replicates of 20 chickens. The treatments were control diet without
additives (treatment 1), 250 ppb AFB1 (treatment 2), commercial
yeast, Saccharomyces cerevisiae, (CY 2.5 x 107 CFU/g) + 250 ppb
AFB1 (treatment 3) and bovine yeast, Saccharomyces cerevisiae,
(BY 2.5 x 107 CFU/g + 250 ppb AFB1 (treatment 4). Complete
randomized design (CRD) was used in the experiment. Feed
consumption and body weight were recorded at every five-day
period. On day 42, carcass compositions were determined from 30
birds per treatment. While chicks were sacrificed, 3-4 ml blood
sample was taken and stored frozen at (-20°C) for serum chemical
analysis to determine effects of consumption of diets on blood
chemistry (total protein, albumin, glucose, urea, cholesterol and
triglycerides). There were no significant differences in ADFI among
the treatments(P>0.05). However, BWG, FCR and mortality were
highly significantly different (P
Abstract: In this paper the problems associated with immunity
of embedded systems used in Motor-Drive systems are investigated
and appropriate solutions are presented. Integration of VSD motor
systems (Integral Motor) while partially reducing some of these
effects, adds to immunity problem of their embedded systems. Fail
safe operation of an Integral Motor in arduous industrial
environments is considered. In this paper an integral motor with a
unique design is proposed to overcome critical issues such as heat,
vibration and electromagnetic interference which are damaging to
sensitive electronics without requirement of any additional cooling
system. Advantages of the proposed Integral motor are compactness
of combo motor and drive system with no external cabling/wiring.
This motor provides a perfect shielding for least amount of radiated
emission. It has an inbuilt filter for EMC compliance and has been
designed to provide lower EMC noise for immunity of the internal
electronics as well as the other neighbouring systems.
Abstract: As the fossil fuels kept on depleting, intense research in developing hydrogen (H2) as the alternative fuel has been done to cater our tremendous demand for fuel. The potential of H2 as the ultimate clean fuel differs with the fossil fuel that releases significant amounts of carbon dioxide (CO2) into the surrounding and leads to the global warming. The experimental work was carried out to study the production of H2 from palm kernel shell steam gasification at different variables such as heating rate, steam to biomass ratio and adsorbent to biomass ratio. Maximum H2 composition which is 61% (volume basis) was obtained at heating rate of 100oCmin-1, steam/biomass of 2:1 ratio, and adsorbent/biomass of 1:1 ratio. The commercial adsorbent had been modified by utilizing the alcoholwater mixture. Characteristics of both adsorbents were investigated and it is concluded that flowability and floodability of modified CaO is significantly improved.
Abstract: A P0-matrix is a real square matrix all of whose principle minors are nonnegative. In this paper, we consider the class of P0-matrix. Our main aim is to determine which sign pattern matrices are admissible for this class of real matrices.
Abstract: we propose a new normalized LMS (NLMS) algorithm, which gives satisfactory performance in certain applications in comaprison with con-ventional NLMS recursion. This new algorithm can be treated as a block based simplification of NLMS algorithm with significantly reduced number of multi¬ply and accumulate as well as division operations. It is also shown that such a recursion can be easily implemented in block floating point (BFP) arithmetic, treating the implementational issues much efficiently. In particular, the core challenges of a BFP realization to such adaptive filters are mainly considered in this regard. A global upper bound on the step size control parameter of the new algorithm due to BFP implementation is also proposed to prevent overflow in filtering as well as weight updating operations jointly.
Abstract: SIP (Session Initiation Protocol), using HTML based
call control messaging which is quite simple and efficient, is being
replaced for VoIP networks recently. As for authentication and
authorization purposes there are many approaches and considerations
for securing SIP to eliminate forgery on the integrity of SIP
messages. On the other hand Elliptic Curve Cryptography has
significant advantages like smaller key sizes, faster computations on
behalf of other Public Key Cryptography (PKC) systems that obtain
data transmission more secure and efficient. In this work a new
approach is proposed for secure SIP authentication by using a public
key exchange mechanism using ECC. Total execution times and
memory requirements of proposed scheme have been improved in
comparison with non-elliptic approaches by adopting elliptic-based
key exchange mechanism.
Abstract: The compressive strength development through
polymerization process of alkaline solution and fly ash blended with Microwave Incinerated Rice Husk Ash (MIRHA) is described in this
paper. Three curing conditions, which are hot gunny curing, ambient
curing, and external humidity curing are investigated to obtain the suitable curing condition for cast in situ provision. Fly ash was
blended with MIRHA at 3%, 5%, and 7% to identify the effect of blended mixes to the compressive strength and microstructure
properties of geopolymer concrete. Compressive strength results
indicated an improvement in the strength development with external humidity curing concrete samples compared to hot gunny curing and
ambient curing. Blended mixes also presented better performance
than control mixes. Improvement of interfacial transition zone (ITZ)
and micro structure in external humidity concrete samples were also
identified compared to hot gunny and ambient curing.
Abstract: Wireless Sensor Networks can be used to monitor the
physical phenomenon in such areas where human approach is nearly
impossible. Hence the limited power supply is the major constraint of
the WSNs due to the use of non-rechargeable batteries in sensor
nodes. A lot of researches are going on to reduce the energy
consumption of sensor nodes. Energy map can be used with
clustering, data dissemination and routing techniques to reduce the
power consumption of WSNs. Energy map can also be used to know
which part of the network is going to fail in near future. In this paper,
Energy map is constructed using the prediction based approach.
Adaptive alpha GM(1,1) model is used as the prediction model.
GM(1,1) is being used worldwide in many applications for predicting
future values of time series using some past values due to its high
computational efficiency and accuracy.
Abstract: Low-density parity-check (LDPC) codes have been shown to deliver capacity approaching performance; however, problematic graphical structures (e.g. trapping sets) in the Tanner graph of some LDPC codes can cause high error floors in bit-error-ratio (BER) performance under conventional sum-product algorithm (SPA). This paper presents a serial concatenation scheme to avoid the trapping sets and to lower the error floors of LDPC code. The outer code in the proposed concatenation is the LDPC, and the inner code is a high rate array code. This approach applies an interactive hybrid process between the BCJR decoding for the array code and the SPA for the LDPC code together with bit-pinning and bit-flipping techniques. Margulis code of size (2640, 1320) has been used for the simulation and it has been shown that the proposed concatenation and decoding scheme can considerably improve the error floor performance with minimal rate loss.
Abstract: Studies have shown that the SnAgCu solder family has been widely used as a replacement for conventional Sn-Pb solders. An attractive approach is by introducing alloying additives (rare earth elements (RE), Zn, Co, Fe, Ni, Sb) into the SnAgCu solder, which helps in refining the microstructure also improving the mechanical and wetting properties of the solder. The present work focuses on the effect of additions of 0.5% Ce and Fe into Sn-3.0Ag-0.5Cu solder, in attempt to reduce the intermetallic compound (IMC) growth and reflow properties of the solder on Cu and Ni (P) surface finish, as well as effects thermal aging on the formation of intermetallic compound (IMC) on different surface finish. Excessive intermetallic compound growth may effect the interface and solder joint due to the brittle nature of the intermetallic compounds. Thus, by introducing alloying elements, IMC layer thickness can be decrease, resulting in better joint and solder reliability.
Abstract: Mixed-traffic (e.g., pedestrians, bicycles, and vehicles)
data at an intersection is one of the essential factors for intersection
design and traffic control. However, some data such as pedestrian
volume cannot be directly collected by common detectors (e.g.
inductive loop, sonar and microwave sensors). In this paper, a video
based detection algorithm is proposed for mixed-traffic data collection
at intersections using surveillance cameras. The algorithm is derived
from Gaussian Mixture Model (GMM), and uses a mergence time
adjustment scheme to improve the traditional algorithm. Real-world
video data were selected to test the algorithm. The results show that
the proposed algorithm has the faster processing speed and more
accuracy than the traditional algorithm. This indicates that the
improved algorithm can be applied to detect mixed-traffic at
signalized intersection, even when conflicts occur.
Abstract: Despite extensive study on wireless sensor network
security, defending internal attacks and finding abnormal behaviour
of the sensor are still difficult and unsolved task. The conventional
cryptographic technique does not give the robust security or detection
process to save the network from internal attacker that cause by
abnormal behavior. The insider attacker or abnormally behaved
sensor identificationand location detection framework using false
massage detection and Time difference of Arrival (TDoA) is
presented in this paper. It has been shown that the new framework
can efficiently identify and detect the insider attacker location so that
the attacker can be reprogrammed or subside from the network to
save from internal attack.
Abstract: The paper shows some ability to manage two-phase
flows arising from the use of unsteady effects. In one case, we
consider the condition of fragmentation of the interface between the
two components leads to the intensification of mixing. The problem
is solved when the temporal and linear scale are small for the
appearance of the developed mixing layer. Showing that exist such
conditions for unsteady flow velocity at the surface of the channel,
which will lead to the creation and fragmentation of vortices at Re
numbers of order unity. Also showing that the Re is not a criterion of
similarity for this type of flows, but we can introduce a criterion that
depends on both the Re, and the frequency splitting of the vortices. It
turned out that feature of this situation is that streamlines behave
stable, and if we analyze the behavior of the interface between the
components it satisfies all the properties of unstable flows. The other
problem we consider the behavior of solid impurities in the extensive
system of channels. Simulated unsteady periodic flow modeled
breaths. Consider the behavior of the particles along the trajectories.
It is shown that, depending on the mass and diameter of the particles,
they can be collected in a caustic on the channel walls, stop in a
certain place or fly back. Of interest is the distribution of particle
velocity in frequency. It turned out that by choosing a behavior of the
velocity field of the carrier gas can affect the trajectory of individual
particles including force them to fly back.
Abstract: The objective of this research was to study the factors
related to the satisfaction of consumers who purchased a Toyota
SUV Fortuner. This paper was a survey data which collected 400
samples from 65 car dealerships. The survey was conducted mainly
in Bangkok, Thailand. The statistics utilized in this paper included
percentage, mean, standard deviation and Pearson Product-Moment.
The findings revealed that the majority of respondent were male with
an undergraduate degree, married and live together. The average
income of the respondents was between 20,001 - 30,000 baht. Most
of them worked for private companies. Most of them had a family
with the average of 4 members. The hypotheses testing revealed that
the factors of marketing mix in terms of product (ability, gas
mileage, and safety) were related to overall satisfaction at the
medium level. However, the findings also revealed that the factors of
marketing mix in terms of product (image), price, and promotion, and
service center were related to the overall satisfaction at the low level.
Abstract: The paper focuses on the area of context modeling with respect to the specification of context-aware systems supporting ubiquitous applications. The proposed approach, followed within the SIMPLICITY IST project, uses a high-level system ontology to derive context models for system components which consequently are mapped to the system's physical entities. For the definition of user and device-related context models in particular, the paper suggests a standard-based process consisting of an analysis phase using the Common Information Model (CIM) methodology followed by an implementation phase that defines 3GPP based components. The benefits of this approach are further depicted by preliminary examples of XML grammars defining profiles and components, component instances, coupled with descriptions of respective ubiquitous applications.
Abstract: A study was carried out to determine the effect of water quality on flotation performance. The experimental test work comprised of batch flotation tests using Denver lab cell for a period of 10 minutes. Nine different test runs were carried out in triplicates to ensure reproducibility using different water types from different thickener overflows, return and sewage effluent water (process water) and portable water. The water sources differed in pH, total dissolved solids, total suspended solids and conductivity. Process water was found to reduce the concentrate recovery and mass pull, while portable water increased the concentrate recovery and mass pull. Portable water reduced the concentrate grade while process water increased the concentrate grade. It is proposed that a combination of process water and portable water supply be used in flotation circuits to balance the different effects that the different water types have on the flotation efficiency.
Abstract: Digital watermarking is one of the techniques for
copyright protection. In this paper, a normalization-based robust
image watermarking scheme which encompasses singular value
decomposition (SVD) and discrete cosine transform (DCT)
techniques is proposed. For the proposed scheme, the host image is
first normalized to a standard form and divided into non-overlapping
image blocks. SVD is applied to each block. By concatenating the
first singular values (SV) of adjacent blocks of the normalized image,
a SV block is obtained. DCT is then carried out on the SV blocks to
produce SVD-DCT blocks. A watermark bit is embedded in the highfrequency
band of a SVD-DCT block by imposing a particular
relationship between two pseudo-randomly selected DCT
coefficients. An adaptive frequency mask is used to adjust local
watermark embedding strength. Watermark extraction involves
mainly the inverse process. The watermark extracting method is blind
and efficient. Experimental results show that the quality degradation
of watermarked image caused by the embedded watermark is visually
transparent. Results also show that the proposed scheme is robust
against various image processing operations and geometric attacks.
Abstract: Document image processing has become an
increasingly important technology in the automation of office
documentation tasks. During document scanning, skew is inevitably
introduced into the incoming document image. Since the algorithm
for layout analysis and character recognition are generally very
sensitive to the page skew. Hence, skew detection and correction in
document images are the critical steps before layout analysis. In this
paper, a novel skew detection method is presented for binary
document images. The method considered the some selected
characters of the text which may be subjected to thinning and Hough
transform to estimate skew angle accurately. Several experiments
have been conducted on various types of documents such as
documents containing English Documents, Journals, Text-Book,
Different Languages and Document with different fonts, Documents
with different resolutions, to reveal the robustness of the proposed
method. The experimental results revealed that the proposed method
is accurate compared to the results of well-known existing methods.