Abstract: This research evaluated and compared the thermodynamic performance of heat pump systems which can be run under two different modes as air to air and air to water by using only one compressor. To achieve this comparison an experimental performance study was made on a traditional vapor compressed heat pump system that can be run air to air mode and air to water mode by help of a valve. The experiments made under different thermal conditions. Thermodynamic performance of the systems are presented and compared with each other for different working conditions.
Abstract: The present work presents the extraction of copper(II)
from sulphuric acid solutions with Sodium diethyldithiocarbamate
(SDDT), and six different organic diluents: Dichloromethane,
Chloroform, Carbon tetrachloride, Toluene, xylene and Cyclohexane,
were tested. The pair SDDT/Chloroform showed to be the most
selective in removing the copper cations, and hence was considered
throughout the experimental study.
The effects of operating parameters such as the initial concentration
of the extracting agent, the agitation time, the agitation speed and the
acid concentration were considered.
For an initial concentration of Cu (II) of 63 ppm in a 0.5 M sulphuric
acid solution, both with a mass of the extracting agent of 20 mg, an
extraction percentage of about 97.8 % and a distribution coefficient
of 44.42 were obtained, respectively, confirming the performance
of the SDDT-Chloroform pair.
Abstract: The hydro-mechanical model for unsaturated soils has
been presented based on the effective stress principle taking into
account effects of drying-wetting process. The elasto-plastic
constitutive equations for stress-strain relations of the soil skeleton
have been established. A plasticity model is modified from modified
Cam-Clay model. The hardening rule has been established by
considering the isotropic consolidation paths. The effect of dryingwetting
process is introduced through the ¤ç parameter. All model
coefficients are identified in terms of measurable parameters. The
simulations from the proposed model are compared with the
experimental results. The model calibration was performed to extract
the model parameter from the experimental results. Good agreement
between the results predicted using proposed model and the
experimental results was obtained.
Abstract: In this paper, the processing of sonar signals has been
carried out using Minimal Resource Allocation Network (MRAN)
and a Probabilistic Neural Network (PNN) in differentiation of
commonly encountered features in indoor environments. The
stability-plasticity behaviors of both networks have been
investigated. The experimental result shows that MRAN possesses
lower network complexity but experiences higher plasticity than
PNN. An enhanced version called parallel MRAN (pMRAN) is
proposed to solve this problem and is proven to be stable in
prediction and also outperformed the original MRAN.
Abstract: Unlike general-purpose processors, digital signal
processors (DSP processors) are strongly application-dependent. To
meet the needs for diverse applications, a wide variety of DSP
processors based on different architectures ranging from the
traditional to VLIW have been introduced to the market over the
years. The functionality, performance, and cost of these processors
vary over a wide range. In order to select a processor that meets the
design criteria for an application, processor performance is usually
the major concern for digital signal processing (DSP) application
developers. Performance data are also essential for the designers of
DSP processors to improve their design. Consequently, several DSP
performance benchmarks have been proposed over the past decade or
so. However, none of these benchmarks seem to have included recent
new DSP applications.
In this paper, we use a new benchmark that we recently developed
to compare the performance of popular DSP processors from Texas
Instruments and StarCore. The new benchmark is based on the
Selectable Mode Vocoder (SMV), a speech-coding program from the
recent third generation (3G) wireless voice applications. All
benchmark kernels are compiled by the compilers of the respective
DSP processors and run on their simulators. Weighted arithmetic
mean of clock cycles and arithmetic mean of code size are used to
compare the performance of five DSP processors.
In addition, we studied how the performance of a processor is
affected by code structure, features of processor architecture and
optimization of compiler. The extensive experimental data gathered,
analyzed, and presented in this paper should be helpful for DSP
processor and compiler designers to meet their specific design goals.
Abstract: Shipping comb is mounted on Head Stack Assembly
(HSA) to prevent collision of the heads, maintain the gap between
suspensions and protect HSA tips from unintentional contact
damaged in the manufacturing process. Failure analysis of shipping
comb in hard disk drive production processes is proposed .Field
observations were performed to determine the fatal areas on shipping
comb and their failure fraction. Root cause failure analysis (RCFA) is
applied to specify the failure causes subjected to various loading
conditions. For reliability improvement, failure mode and effects
analysis (FMEA) procedure to evaluate the risk priority is performed.
Consequently, the more suitable information design criterions were
obtained.
Abstract: Previous studies have indicated that one of the most
critical failure reasons of enterprise systems is the lack of knowledge
sharing and utilization across organizations. As a consequence, many
information systems researchers have paid attention to examining the
effect of absorptive capacity closely associated with knowledge
sharing and transferring on IS usage performance. A lack of
communications and interactions due to a lack of organizational
citizenship behavior might lead to weak absorptive capacity and thus
negatively influence knowledge sharing across organizations. In this
study, a theoretical model which delves into the relationship between
usage performance of enterprise systems and its determinants was
established.
Abstract: Educating effective architect designers is an important
goal of architectural education. But what contributes to students-
performance, and to critical and creative thinking in architectural
design education? Besides teaching architecture students how to
understand logical arguments, eliminate the inadequate solutions and
focus on the correct ones, it is also crucial to teach students how to
focus on exploring ideas and the alternative solutions and seeking for
other right answers rather than one. This paper focuses on the
enhancing architectural design education and may provide
implications for enhancing teaching design.
Abstract: Security is an interesting and significance issue for
popular virtual platforms, such as virtualization cluster and cloud
platforms. Virtualization is the powerful technology for cloud
computing services, there are a lot of benefits by using virtual machine
tools which be called hypervisors, such as it can quickly deploy all
kinds of virtual Operating Systems in single platform, able to control
all virtual system resources effectively, cost down for system platform
deployment, ability of customization, high elasticity and high
reliability. However, some important security problems need to take
care and resolved in virtual platforms that include terrible viruses, evil
programs, illegal operations and intrusion behavior. In this paper, we
present useful Intrusion Detection Mechanism (IDM) software that not
only can auto to analyze all system-s operations with the accounting
journal database, but also is able to monitor the system-s state for
virtual platforms.
Abstract: n-CdO/p-Si heterojunction diode was fabricated using
sol-gel spin coating technique which is a low cost and easily scalable
method for preparing of semiconductor films. The structural and
morphological properties of CdO film were investigated. The X-ray
diffraction (XRD) spectra indicated that the film was of
polycrystalline nature. The scanning electron microscopy (SEM)
images indicate that the surface morphology CdO film consists of the
clusters formed with the coming together of the nanoparticles. The
electrical characterization of Au/n-CdO/p–Si/Al heterojunction diode
was investigated by current-voltage. The ideality factor of the diode
was found to be 3.02 for room temperature. The reverse current of
the diode strongly increased with illumination intensity of 100
mWcm-2 and the diode gave a maximum open circuit voltage Voc of
0.04 V and short-circuits current Isc of 9.92×10-9 A.
Abstract: The impact of fixed speed squirrel cage type as well as
variable speed doubly fed induction generators (DFIG) on dynamic
performance of a multimachine power system has been investigated.
Detailed models of the various components have been presented and
the integration of asynchronous and synchronous generators has been
carried out through a rotor angle based transform. Simulation studies
carried out considering the conventional dynamic model of squirrel
cage asynchronous generators show that integration, as such, could
degrade to the AC system performance transiently. This article
proposes a frequency or power controller which can effectively
control the transients and restore normal operation of fixed speed
induction generator quickly. Comparison of simulation results
between classical cage and doubly-fed induction generators indicate
that the doubly fed induction machine is more adaptable to
multimachine AC system. Frequency controller installed in the DFIG
system can also improve its transient profile.
Abstract: A feeding trial was conducted to investigate the effect
of periodically use of garlic on performance and carcass
characteristics in broiler chickens. 240 1-day-old Ross broiler chicks
randomly allocated into the 10 dietary treatments (A, B, C, D, E, F,
G, H, I and J) for 6 wk. Treatment A or control group, received basal
diet (based on standards of Ross management guidelines) without
supplementation of garlic powder while B, C and D dietary
treatments were basal diet supplemented with 0.5, 1 and 3% garlic
powder, respectively for the whole time of experiment (6 weeks).
Birds in group E, F and G were fed control diet supplemented with
0.5, 1 and 3% garlic powder, respectively just in their starter diet (0-
21d). Birds in three other treatments (H, I and J) received control diet
for the first 21 days and 0.5, 1 and 3% of garlic powder was added to
their finisher diets, respectively. 1 and 3% supplemented groups in
finisher period had better performance as compared with other
groups. Since present study conducted in optimum and antiseptic
conditions, it seems that better or more responses could be expected
in performance if the raising conditions would not be healthy.
Abstract: Geographic Profiling has successfully assisted investigations for serial crimes. Considering the multi-cluster feature of serial criminal spots, we propose a Multi-point Centrography model as a natural extension of Single-point Centrography for geographic profiling. K-means clustering is first performed on the data samples and then Single-point Centrography is adopted to derive a probability distribution on each cluster. Finally, a weighted combinations of each distribution is formed to make next-crime spot prediction. Experimental study on real cases demonstrates the effectiveness of our proposed model.
Abstract: It is an important problem to compute the geodesics on
a surface in many fields. To find the geodesics in practice, however,
the traditional discrete algorithms or numerical approaches can only
find a list of discrete points. The first author proposed in 2010 a new,
elegant and accurate method, the geodesic-like method, for
approximating geodesics on a regular surface. This paper will present
by use of this method a computation of the Bezier geodesic-like curves
on spheres.
Abstract: This paper proposes the authentication method using
ESA algorithm instead of using CAVE algorithm in the CDMA
mobile communication systems including IS-95 and CDMA2000 1x.
And, we analyze to apply ESA mechanism on behalf of CAVE
mechanism without the change of message format and air interface in
the existing CDMA systems. If ESA algorithm can be used as the
substitution of CAVE algorithm, security strength of authentication
algorithm is intensified without protocol change. An algorithm
replacement proposed in this paper is not to change an authentication
mechanism, but to configure input of ESA algorithm and to produce
output. Therefore, our proposal can be the compatible to the existing
systems.
Abstract: This paper presents an exploration into the structure of the corporate governance network and interlocking directorates in the Czech Republic. First a literature overview and a basic terminology of the network theory is presented. Further in the text, statistics and other calculations relevant to corporate governance networks are presented. For this purpose an empirical data set consisting of 2 906 joint stock companies in the Czech Republic was examined. Industries with the highest average number of interlocks per company were healthcare, and energy and utilities. There is no observable link between the financial performance of the company and the number of its interlocks. Also interlocks with financial companies are very rare.
Abstract: Eye localization is necessary for face recognition and
related application areas. Most of eye localization algorithms reported
so far still need to be improved about precision and computational
time for successful applications. In this paper, we propose an eye
location method based on multi-scale Gabor feature vectors, which is
more robust with respect to initial points. The eye localization based
on Gabor feature vectors first needs to constructs an Eye Model Bunch
for each eye (left or right eye) which consists of n Gabor jets and
average eye coordinates of each eyes obtained from n model face
images, and then tries to localize eyes in an incoming face image by
utilizing the fact that the true eye coordinates is most likely to be very
close to the position where the Gabor jet will have the best Gabor jet
similarity matching with a Gabor jet in the Eye Model Bunch. Similar
ideas have been already proposed in such as EBGM (Elastic Bunch
Graph Matching). However, the method used in EBGM is known to be
not robust with respect to initial values and may need extensive search
range for achieving the required performance, but extensive search
ranges will cause much more computational burden. In this paper, we
propose a multi-scale approach with a little increased computational
burden where one first tries to localize eyes based on Gabor feature
vectors in a coarse face image obtained from down sampling of the
original face image, and then localize eyes based on Gabor feature
vectors in the original resolution face image by using the eye
coordinates localized in the coarse scaled image as initial points.
Several experiments and comparisons with other eye localization
methods reported in the other papers show the efficiency of our
proposed method.
Abstract: Radio frequency identification (RFID) applications have grown rapidly in many industries, especially in indoor location identification. The advantage of using received signal strength indicator (RSSI) values as an indoor location measurement method is a cost-effective approach without installing extra hardware. Because the accuracy of many positioning schemes using RSSI values is limited by interference factors and the environment, thus it is challenging to use RFID location techniques based on integrating positioning algorithm design. This study proposes the location estimation approach and analyzes a scheme relying on RSSI values to minimize location errors. In addition, this paper examines different factors that affect location accuracy by integrating the backpropagation neural network (BPN) with the LANDMARC algorithm in a training phase and an online phase. First, the training phase computes coordinates obtained from the LANDMARC algorithm, which uses RSSI values and the real coordinates of reference tags as training data for constructing an appropriate BPN architecture and training length. Second, in the online phase, the LANDMARC algorithm calculates the coordinates of tracking tags, which are then used as BPN inputs to obtain location estimates. The results show that the proposed scheme can estimate locations more accurately compared to LANDMARC without extra devices.
Abstract: It is suggested to evaluate environmental performance
of energy sector using Data Envelopment Analysis with nondiscretionary
factors (DEA-ND) with relative indicators as inputs and
outputs. The latter allows for comparison of the objects essentially
different in size. Inclusion of non-discretionary factors serves
separation of the indicators that are beyond the control of the objects.
A virtual perfect object comprised of maximal outputs and minimal
inputs was added to the group of actual ones. In this setting, explicit
solution of the DEA-ND problem was obtained. Energy sector of the
United States was analyzed using suggested approach for the period
of 1980 – 2006 with expected values of economic indicators for 2030
used for forming the perfect object. It was obtained that
environmental performance has been increasing steadily for the
period from 7.7% through 50.0% but still remains well below the
prospected level
Abstract: The purpose of this research is to develop a security model for voice eavesdropping protection over digital networks. The proposed model provides an encryption scheme and a personal secret key exchange between communicating parties, a so-called voice data transformation system, resulting in a real-privacy conversation. The operation of this system comprises two main steps as follows: The first one is the personal secret key exchange for using the keys in the data encryption process during conversation. The key owner could freely make his/her choice in key selection, so it is recommended that one should exchange a different key for a different conversational party, and record the key for each case into the memory provided in the client device. The next step is to set and record another personal option of encryption, either taking all frames or just partial frames, so-called the figure of 1:M. Using different personal secret keys and different sets of 1:M to different parties without the intervention of the service operator, would result in posing quite a big problem for any eavesdroppers who attempt to discover the key used during the conversation, especially in a short period of time. Thus, it is quite safe and effective to protect the case of voice eavesdropping. The results of the implementation indicate that the system can perform its function accurately as designed. In this regard, the proposed system is suitable for effective use in voice eavesdropping protection over digital networks, without any requirements to change presently existing network systems, mobile phone network and VoIP, for instance.