Abstract: A mathematical model for the hydrodynamic
lubrication of parabolic slider bearings with couple stress lubricants
is presented. A numerical solution for the mathematical model using
finite element scheme is obtained using three nodes isoparametric
quadratic elements. Stiffness integrals obtained from the weak form
of the governing equations were solved using Gauss Quadrature to
obtain a finite number of stiffness matrices. The global system of
equations was obtained for the bearing and solved using Gauss Seidel
iterative scheme. The converged pressure solution was used to obtain
the load capacity of the bearing. Parametric studies were carried out
and it was shown that the effect of couple stresses and profile
parameter are to increase the load carrying capacity of the parabolic
slider bearing. Numerical experiments reveal that the magnitude of
the profile parameter at which maximum load is obtained increases
with decrease in couple stress parameter. The results are presented in
graphical form.
Abstract: This paper proposes a methodology for mitigating the occurrence of cascading failure in stressed power systems. The methodology is essentially based on predicting voltage instability in the power system using a voltage stability index and then devising a corrective action in order to increase the voltage stability margin. The paper starts with a brief description of the cascading failure mechanism which is probable root cause of severe blackouts. Then, the voltage instability indices are introduced in order to evaluate stability limit. The aim of the analysis is to assure that the coordination of protection, by adopting load shedding scheme, capable of enhancing performance of the system after the major location of instability is determined. Finally, the proposed method to generate instability prediction is introduced.
Abstract: In this paper, the differential quadrature method is applied to simulate natural convection in an inclined cubic cavity using velocity-vorticity formulation. The numerical capability of the present algorithm is demonstrated by application to natural convection in an inclined cubic cavity. The velocity Poisson equations, the vorticity transport equations and the energy equation are all solved as a coupled system of equations for the seven field variables consisting of three velocities, three vorticities and temperature. The coupled equations are simultaneously solved by imposing the vorticity definition at boundary without requiring the explicit specification of the vorticity boundary conditions. Test results obtained for an inclined cubic cavity with different angle of inclinations for Rayleigh number equal to 103, 104, 105 and 106 indicate that the present coupled solution algorithm could predict the benchmark results for temperature and flow fields. Thus, it is convinced that the present formulation is capable of solving coupled Navier-Stokes equations effectively and accurately.
Abstract: Noise has adverse effect on human health and
comfort. Noise not only cause hearing impairment, but it also acts as
a causal factor for stress and raising systolic pressure. Additionally it
can be a causal factor in work accidents, both by marking hazards
and warning signals and by impeding concentration. Industry
workers also suffer psychological and physical stress as well as
hearing loss due to industrial noise. This paper proposes an approach
to enable engineers to point out quantitatively the noisiest source for
modification, while multiple machines are operating simultaneously.
The model with the point source and spherical radiation in a free field
was adopted to formulate the problem. The procedure works very
well in ideal cases (point source and free field). However, most of the
industrial noise problems are complicated by the fact that the noise is
confined in a room. Reflections from the walls, floor, ceiling, and
equipment in a room create a reverberant sound field that alters the
sound wave characteristics from those for the free field. So the model
was validated for relatively low absorption room at NIT Kurukshetra
Central Workshop. The results of validation pointed out that the
estimated sound power of noise sources under simultaneous
conditions were on lower side, within the error limits 3.56 - 6.35 %.
Thus suggesting the use of this methodology for practical
implementation in industry. To demonstrate the application of the
above analytical procedure for estimating the sound power of noise
sources under simultaneous operating conditions, a manufacturing
facility (Railway Workshop at Yamunanagar, India) having five
sound sources (machines) on its workshop floor is considered in this
study. The findings of the case study had identified the two most
effective candidates (noise sources) for noise control in the Railway
Workshop Yamunanagar, India. The study suggests that the
modification in the design and/or replacement of these two identified
noisiest sources (machine) would be necessary so as to achieve an
effective reduction in noise levels. Further, the estimated data allows
engineers to better understand the noise situations of the workplace
and to revise the map when changes occur in noise level due to a
workplace re-layout.
Abstract: Flight management system (FMS) is a specialized
computer system that automates a wide variety of in-flight tasks,
reducing the workload on the flight crew to the point that modern
aircraft no longer carry flight engineers or navigators. The primary
function of FMS is to perform the in-flight management of the flight
plan using various sensors (such as GPS and INS often backed up by
radio navigation) to determine the aircraft's position. From the
cockpit FMS is normally controlled through a Control Display Unit
(CDU) which incorporates a small screen and keyboard or touch
screen. This paper investigates the performance of GPS/ INS
integration techniques in which the data fusion process is done using
Kalman filtering. This will include the importance of sensors
calibration as well as the alignment of the strap down inertial
navigation system. The limitations of the inertial navigation systems
are investigated in order to understand why INS sometimes is
integrated with other navigation aids and not just operating in standalone
mode. Finally, both the loosely coupled and tightly coupled
configurations are analyzed for several types of situations and
operational conditions.
Abstract: This paper discusses a design of nonlinear observer by
a formal linearization method using an application of Chebyshev Interpolation
in order to facilitate processes for synthesizing a nonlinear
observer and to improve the precision of linearization.
A dynamic nonlinear system is linearized with respect to a linearization
function, and a measurement equation is transformed into
an augmented linear one by the formal linearization method which is
based on Chebyshev interpolation. To the linearized system, a linear
estimation theory is applied and a nonlinear observer is derived. To
show effectiveness of the observer design, numerical experiments
are illustrated and they indicate that the design shows remarkable
performances for nonlinear systems.
Abstract: Can biometrics do what everyone is expecting it will?
And more importantly, should it be doing it? Biometrics is the
buzzword “on the mouth" of everyone, who are trying to use this
technology in a variety of applications. But all this “hype" about
biometrics can be dangerous without a careful evaluation of the real
needs of each application. In this paper I-ll try to focus on the
dangers of using the right technology at the right time in the wrong
place.
Abstract: The data is available in abundance in any business
organization. It includes the records for finance, maintenance,
inventory, progress reports etc. As the time progresses, the data keep
on accumulating and the challenge is to extract the information from
this data bank. Knowledge discovery from these large and complex
databases is the key problem of this era. Data mining and machine
learning techniques are needed which can scale to the size of the
problems and can be customized to the application of business. For
the development of accurate and required information for particular
problem, business analyst needs to develop multidimensional models
which give the reliable information so that they can take right
decision for particular problem. If the multidimensional model does
not possess the advance features, the accuracy cannot be expected.
The present work involves the development of a Multidimensional
data model incorporating advance features. The criterion of
computation is based on the data precision and to include slowly
change time dimension. The final results are displayed in graphical
form.
Abstract: A sequential treatment of ozonation followed by a
Fenton or photo-Fenton process, using black light lamps (365 nm) in
this latter case, has been applied to remove a mixture of
pharmaceutical compounds and the generated by-products both in
ultrapure and secondary treated wastewater. The scientifictechnological
innovation of this study stems from the in situ
generation of hydrogen peroxide from the direct ozonation of
pharmaceuticals, and can later be used in the application of Fenton
and photo-Fenton processes. The compounds selected as models
were sulfamethoxazol and acetaminophen. It should be remarked that
the use of a second process is necessary as a result of the low
mineralization yield reached by the exclusive application of ozone.
Therefore, the influence of the water matrix has been studied in terms
of hydrogen peroxide concentration, individual compound
concentration and total organic carbon removed. Moreover, the
concentration of different iron species in solution has been measured.
Abstract: Automatic Extraction of Event information from
social text stream (emails, social network sites, blogs etc) is a vital
requirement for many applications like Event Planning and
Management systems and security applications. The key information
components needed from Event related text are Event title, location,
participants, date and time. Emails have very unique distinctions over
other social text streams from the perspective of layout and format
and conversation style and are the most commonly used
communication channel for broadcasting and planning events.
Therefore we have chosen emails as our dataset. In our work, we
have employed two statistical NLP methods, named as Finite State
Machines (FSM) and Hidden Markov Model (HMM) for the
extraction of event related contextual information. An application
has been developed providing a comparison among the two methods
over the event extraction task. It comprises of two modules, one for
each method, and works for both bulk as well as direct user input.
The results are evaluated using Precision, Recall and F-Score.
Experiments show that both methods produce high performance and
accuracy, however HMM was good enough over Title extraction and
FSM proved to be better for Venue, Date, and time.
Abstract: In this paper, a low noise microwave bandpass filter
(BPF) is presented. This filter is fabricated by modifying the
conventional cross-coupled structure. The spurious response is
improved by using the end open coupled lines, and the influence of the
noise is minimized. Impedance matrix of the open end coupled circuit
clarifies the characteristic of the suppression of the spurious response.
The rejection of spurious suppression region of the proposed filter is
greater than 20 dB from 3-13 GHz. The measured results of the
fabricated filter confirm the concepts of the proposed design and
exhibits high performance.
Abstract: This paper deals with an on-line identification method
of continuous-time Hammerstein systems by using the radial basis
function (RBF) networks and immune algorithm (IA). An unknown
nonlinear static part to be estimated is approximately represented
by the RBF network. The IA is efficiently combined with the
recursive least-squares (RLS) method. The objective function for the
identification is regarded as the antigen. The candidates of the RBF
parameters such as the centers and widths are coded into binary bit
strings as the antibodies and searched by the IA. On the other hand,
the candidates of both the weighting parameters of the RBF network
and the system parameters of the linear dynamic part are updated
by the RLS method. Simulation results are shown to illustrate the
proposed method.
Abstract: Unified Modeling Language (UML) extensions for real time embedded systems (RTES) co-design, are taking a growing interest by a great number of industrial and research communities. The extension mechanism is provided by UML profiles for RTES. It aims at improving an easily-understood method of system design for non-experts. On the other hand, one of the key items of the co- design methods is the Hardware/Software partitioning and scheduling tasks. Indeed, it is mandatory to define where and when tasks are implemented and run. Unfortunately the main goals of co-design are not included in the usual practice of UML profiles. So, there exists a need for mapping used models to an execution platform for both schedulability test and HW/SW partitioning. In the present work, test schedulability and design space exploration are performed at an early stage. The proposed approach adopts Model Driven Engineering MDE. It starts from UML specification annotated with the recent profile for the Modeling and Analysis of Real Time Embedded systems MARTE. Following refinement strategy, transformation rules allow to find a feasible schedule that satisfies timing constraints and to define where tasks will be implemented. The overall approach is experimented for the design of a football player robot application.
Abstract: This paper includes a positive analysis to quantitatively grasp the relationship among vulnerability, information security incidents, and the countermeasures by using data based on a 2007 questionnaire survey for Japanese ISPs (Internet Service Providers). To grasp the relationships, logistic regression analysis is used. The results clarify that there are relationships between information security incidents and the countermeasures. Concretely, there is a positive relationship between information security incidents and the number of information security systems introduced as well as a negative relationship between information security incidents and information security education. It is also pointed out that (especially, local) ISPs do not execute efficient information security countermeasures/ investment concerned with systems, and it is suggested that they should positively execute information security education. In addition, to further heighten the information security level of Japanese telecommunication infrastructure, the necessity and importance of the government to implement policy to support the countermeasures of ISPs is insisted.
Abstract: Insufficient Quality of Service (QoS) of Voice over
Internet Protocol (VoIP) is a growing concern that has lead the need
for research and study. In this paper we investigate the performance
of VoIP and the impact of resource limitations on the performance of
Access Networks. The impact of VoIP performance in Access
Networks is particularly important in regions where Internet
resources are limited and the cost of improving these resources is
prohibitive. It is clear that perceived VoIP performance, as measured
by mean opinion score [2] in experiments, where subjects are asked
to rate communication quality, is determined by end-to-end delay on
the communication path, delay variation, packet loss, echo, the
coding algorithm in use and noise. These performance indicators can
be measured and the affect in the Access Network can be estimated.
This paper investigates the congestion in the Access Network to the
overall performance of VoIP services with the presence of other
substantial uses of internet and ways in which Access Networks can
be designed to improve VoIP performance. Methods for analyzing
the impact of the Access Network on VoIP performance will be
surveyed and reviewed. This paper also considers some approaches
for improving performance of VoIP by carrying out experiments
using Network Simulator version 2 (NS2) software with a view to
gaining a better understanding of the design of Access Networks.
Abstract: The possibilities of mobile technology generate new
demands for vocational teacher trainers to transform their approach
to work and to incorporate its usage into their ordinary educational
practice. This paper presents findings of a focus discussion group
(FDG) session on the usage of iPads within a school of vocational
teacher education (SoVTE). It aims to clarify how the teacher
trainers are using iPads and what has changed in their work during
the usage of iPads. The analytical framework bases on content
analysis and expansive learning cycle. It was not only found what
kind of a role iPads played in their daily practices but it brought also
into attention how a cultural change regarding the usage of social
media and mobile technology was desperately needed in the whole
work community. Thus, the FGD was abducted for developing the
knowledge practices of the community of the SoVTE.
Abstract: In this paper we investigate how wide-ranging
organizational support and the more specific form of support,
namely management support, may influence on tourism workers
satisfaction with a cash transaction system. The IS continuance
theory, proposed by Bhattacherjee in 2001, is utilized as a
theoretical framework. This implies that both perceived usefulness
and ease of use is included in the research model, in addition to
organizational and management support. The sample consists of
500 workers from 10 cruise and tourist ferries in Scandinavia that
use a cash transaction system to perform their work tasks. Using
structural equation modelling, results indicate that organizational
support and ease of use perceptions is critical for the users- level of
satisfaction with the cash transaction system.The findings have
implications for business managers and IS practitioners that want
to increase the quality of IT-based business processes within the
tourism industry.
Abstract: In recent times, the problem of Unsolicited Bulk
Email (UBE) or commonly known as Spam Email, has increased at a
tremendous growth rate. We present an analysis of survey based on
classifications of UBE in various research works. There are many
research instances for classification between spam and non-spam
emails but very few research instances are available for classification
of spam emails, per se. This paper does not intend to assert some
UBE classification to be better than the others nor does it propose
any new classification but it bemoans the lack of harmony on number
and definition of categories proposed by different researchers. The
paper also elaborates on factors like intent of spammer, content of
UBE and ambiguity in different categories as proposed in related
research works of classifications of UBE.
Abstract: The existing information system (IS) developments
methods are not met the requirements to resolve the security related
IS problems and they fail to provide a successful integration of
security and systems engineering during all development process
stages. Hence, the security should be considered during the whole
software development process and identified with the requirements
specification. This paper aims to propose an integrated security and
IS engineering approach in all software development process stages
by using i* language. This proposed framework categorizes into three
separate parts: modelling business environment part, modelling
information technology system part and modelling IS security part.
The results show that considering security IS goals in the whole
system development process can have a positive influence on system
implementation and better meet business expectations.
Abstract: Leo Breimans Random Forests (RF) is a recent
development in tree based classifiers and quickly proven to be one of
the most important algorithms in the machine learning literature. It
has shown robust and improved results of classifications on standard
data sets. Ensemble learning algorithms such as AdaBoost and
Bagging have been in active research and shown improvements in
classification results for several benchmarking data sets with mainly
decision trees as their base classifiers. In this paper we experiment to
apply these Meta learning techniques to the random forests. We
experiment the working of the ensembles of random forests on the
standard data sets available in UCI data sets. We compare the
original random forest algorithm with their ensemble counterparts
and discuss the results.