Abstract: Diesel Engines emit complex mixtures of inorganic
and organic compounds in the form of both solid and vapour phase
particles. Most of the particulates released are ultrafine nanoparticles
which are detrimental to human health and can easily enter the body
by respiration. The emissions standards on particulate matter release
from diesel engines are constantly upgraded within the European
Union and with future regulations based on the particles numbers
released instead of merely mass, the need for effective aftertreatment
devices will increase. Standard particulate filters in the form of wall
flow filters can have problems with high soot accumulation,
producing a large exhaust backpressure. A potential solution would
be to combine the standard filter with a flow through filter to reduce
the load on the wall flow filter. In this paper soot particle trapping has
been simulated in different continuous flow filters of monolithic
structure including the use of promoters, at laminar flow conditions.
An Euler Lagrange model, the discrete phase model in Ansys used
with user defined functions for forces acting on particles. A method
to quickly screen trapping of 5 nm and 10 nm particles in different
catalysts designs with tracers was also developed.
Simulations of square duct monoliths with promoters show that the
strength of the vortices produced are not enough to give a high
amount of particle deposition on the catalyst walls. The smallest
particles in the simulations, 5 and 10 nm particles were trapped to a
higher extent, than larger particles up to 1000 nm, in all studied
geometries with the predominant deposition mechanism being
Brownian diffusion. The comparison of the different filters designed
with a wall flow filter does show that the options for altering a design
of a flow through filter, without imposing a too large pressure drop
penalty are good.
Abstract: Nowadays, keyless entry systems are widely adopted
for vehicle immobilizer systems due to both advantages of security and
convenience. Keyless entry systems could overcome brute-force key
guessing attack, statistics attack and masquerade attack, however,
they can't prevent from thieves stealing behavior. In this paper, we
proposed a new architecture try to improve the existent flaws. The
integration of the keyless entry system and the fingerprint
identification technology is more suitable to implement on the
portable transponder to achieve higher security needs. We also adopt
and modify AES security protocol for life expectancy and security of
the portable transponder. In addition, the identification of a driver's
fingerprint makes the service of automatic reinstatement of a driver's
preferences become possible. Our design can satisfy not only the three
kinds of previous illegal attacks, but also the stealing situation.
Furthermore, many practical factors, such as costs, life expectancy and
performance, have been well considered in the design of portable
transponder.
Abstract: In today-s competitive market, most companies
develop manufacturing systems that can help in cost reduction and
maximum quality. Human issues are an important part of
manufacturing systems, yet most companies ignore their effects on
production performance. This paper aims to developing an integrated
workforce planning system that incorporates the human being.
Therefore, a multi-objective mixed integer nonlinear programming
model is developed to determine the amount of hiring, firing,
training, overtime for each worker type. This paper considers a
workforce planning model including human aspects such as skills,
training, workers- personalities, capacity, motivation, and learning
rates. This model helps to minimize the hiring, firing, training and
overtime costs, and maximize the workers- performance. The results
indicate that the workers- differences should be considered in
workforce scheduling to generate realistic plans with minimum costs.
This paper also investigates the effects of human learning rates on the
performance of the production systems.
Abstract: The commercial white tyres are usually used for forklifts in food and medicine industries. Conventionally, silica is used as reinforcement in the tyres. However, the adhesion between silica particles and rubber is remarkably poor. To improve the problem of adhesion and hence enhance wear resistance, modification of silica surface is one of the solutions. In this work, the natural rubber compound blending with polyisoprene-coated silica prepared by admicellar polymerization technique was studied to compare with the natural rubber compound of unmodified silica. The surface characterization of modified silica was also examined by SEM, FTIR, and TGA. The results show that polyisoprene-coated silica/natural rubber compound gave better overall mechanical properties, especially wear resistance with the improvement of the adhesion between silica and natural rubber matrix that can be seen in the SEM micrograph.
Abstract: Most of researches for conventional simulations were
studied focusing on flocks with a single species. While there exist the
flocking behaviors with a single species in nature, the flocking
behaviors are frequently observed with multi-species. This paper
studies on the flocking simulation for heterogeneous agents. In order
to simulate the flocks for heterogeneous agents, the conventional
method uses the identifier of flock, while the proposed method defines
the feature vector of agent and uses the similarity between agents by
comparing with those feature vectors. Based on the similarity, the
paper proposed the attractive force and repulsive force and then
executed the simulation by applying two forces. The results of
simulation showed that flock formation with heterogeneous agents is
very natural in both cases. In addition, it showed that unlike the
existing method, the proposed method can not only control the density
of the flocks, but also be possible for two different groups of agents to
flock close to each other if they have a high similarity.
Abstract: At present, dictionary attack has been the basic tool for
recovering key passwords. In order to avoid dictionary attack, users
purposely choose another character strings as passwords. According to
statistics, about 14% of users choose keys on a keyboard (Kkey, for
short) as passwords. This paper develops a framework system to attack
the password chosen from Kkeys and analyzes its efficiency. Within
this system, we build up keyboard rules using the adjacent and parallel
relationship among Kkeys and then use these Kkey rules to generate
password databases by depth-first search method. According to the
experiment results, we find the key space of databases derived from
these Kkey rules that could be far smaller than the password databases
generated within brute-force attack, thus effectively narrowing down
the scope of attack research. Taking one general Kkey rule, the
combinations in all printable characters (94 types) with Kkey adjacent
and parallel relationship, as an example, the derived key space is about
240 smaller than those in brute-force attack. In addition, we
demonstrate the method's practicality and value by successfully
cracking the access password to UNIX and PC using the password
databases created
Abstract: Textile structures are engineered and fabricated to
meet worldwide structural applications. Nevertheless, research
varying textile structure on natural fibre as composite reinforcement
was found to be very limited. Most of the research is focusing on
short fibre and random discontinuous orientation of the reinforcement
structure. Realizing that natural fibre (NF) composite had been
widely developed to be used as synthetic fibre composite
replacement, this research attempted to examine the influence of
woven and cross-ply laminated structure towards its mechanical
performances. Laminated natural fibre composites were developed
using hand lay-up and vacuum bagging technique. Impact and
flexural strength were investigated as a function of fibre type (coir
and kenaf) and reinforcement structure (imbalanced plain woven,
0°/90° cross-ply and +45°/-45° cross-ply). Multi-level full factorial
design of experiment (DOE) and analysis of variance (ANOVA) was
employed to impart data as to how fibre type and reinforcement
structure parameters affect the mechanical properties of the
composites. This systematic experimentation has led to determination
of significant factors that predominant influences the impact and
flexural properties of the textile composites. It was proven that both
fibre type and reinforcement structure demonstrated significant
difference results. Overall results indicated that coir composite and
woven structure exhibited better impact and flexural strength. Yet,
cross-ply composite structure demonstrated better fracture resistance.
Abstract: Two geometrically nonlinear plate theories, based either on first- or third-order transverse shear deformation theory are used for finite element modeling and simulation of the transient response of smart structures incorporating piezoelectric layers. In particular the time histories of nonlinear vibrations and sensor voltage output of a thin beam with a piezoelectric patch bonded to the surface due to an applied step force are studied.
Abstract: Here we have considered non uniform microstrip
leaky-wave antenna implemented on a dielectric waveguide by a
sinusoidal profile of periodic metallic grating. The non distribution of
the attenuation constant α along propagation axis, optimize the
radiating characteristics and performances of such antennas. The
method developped here is based on an integral method where the
formalism of the admittance operator is combined to a BKW
approximation. First, the effect of the modeling in the modal analysis
of complex waves is studied in detail. Then, the BKW model is used
for the dispersion analysis of the antenna of interest. According to
antenna theory, a forced continuity of the leaky-wave magnitude at
discontinuities of the non uniform structure is established. To test the
validity of our dispersion analysis, computed radiation patterns are
presented and compared in the millimeter band.
Abstract: Calcite aCalcite and aragonite are the two common
polymorphs of CaCO3 observed as biominerals. It is universal that
the sea water contents a high Mg2+ (50mM) relative to Ca2+ (10mM).
In vivo crystallization, Mg2+ inhibits calcite formation. For this
reason, stony corals skeleton may be formed only aragonite crystals
in the biocalcification. It is special in case of soft corals of which
formed only calcite crystal; however, this interesting phenomenon,
still uncharacterized in the marine environment, has been explored in
this study using newly purified cell-free proteins isolated from the
endoskeletal sclerites of soft coral. By recording the decline of pH in
vitro, the control of CaCO3 nucleation and crystal growth by the cellfree
proteins was revealed. Using Atomic Force Microscope, here we
find that these endoskeletal cell-free proteins significantly design the
morphological shape in the molecular-scale kinetics of crystal
formation and those proteins act as surfactants to promote ion
attachment at calcite steps.nd aragonite are the two common polymorphs of CaCO3 observed as biominerals. It is universal that the sea water contents a high Mg2+ (50mM) relative to Ca2+ (10mM). In vivo crystallization, Mg2+ inhibits calcite formation. For this reason, stony corals skeleton may be formed only aragonite crystals in the biocalcification. It is special in case of soft corals of which formed only calcite crystal; however, this interesting phenomenon, still uncharacterized in the marine environment, has been explored in this study using newly purified cell-free proteins isolated from the endoskeletal sclerites of soft coral. By recording the decline of pH in vitro, the control of CaCO3 nucleation and crystal growth by the cell-free proteins was revealed. Using Atomic Force Microscope, here we find that these endoskeletal cell-free proteins significantly design the morphological shape in the molecular-scale kinetics of crystal formation and those proteins act as surfactants to promote ion attachment at calcite steps. KeywordsBiomineralization, Calcite, Cell-free protein, Soft coral
Abstract: International trade involves both large and small firms
engaged in business overseas. Possible drivers that force companies
to enter international markets include increasing competition at the
domestic market, maturing domestic markets, and limited domestic
market opportunities. Technology is an important driving factor in
shaping international marketing strategy as well as in driving force
towards a more global marketplace, especially technology in
communication. It includes telephones, the internet, computer
systems and e-mail. There are three main marketing strategy choices,
namely standardization approach, adaptation approach and middleof-
the-road approach that companies implement to overseas markets.
The decision depends on situations and factors facing the companies
in the international markets. In this paper, the contingency concept is
considered that no single strategy can be effective in all contexts.
The effect of strategy on performance depends on specific situational
variables. Strategic fit is employed to investigate export marketing
strategy adaptation under certain environmental conditions, which in
turn can lead to superior performance.
Abstract: In this article, the flow behavior around a NACA 0012 airfoil which is oscillating with different Reynolds numbers and in various amplitudes has been investigated numerically. Numerical simulations have been performed with ANSYS software. First, the 2- D geometry has been studied in different Reynolds numbers and angles of attack with various numerical methods in its static condition. This analysis was to choose the best turbulent model and comparing the grids to have the optimum one for dynamic simulations. Because the analysis was to study the blades of wind turbines, the Reynolds numbers were not arbitrary. They were in the range of 9.71e5 to 22.65e5. The angle of attack was in the range of -41.81° to 41.81°. By choosing the forward wind speed as the independent parameter, the others like Reynolds and the amplitude of the oscillation would be known automatically. The results show that the SST turbulent model is the best choice that leads the least numerical error with respect the experimental ones. Also, a dynamic stall phenomenon is more probable at lower wind speeds in which the lift force is less.
Abstract: Machine tools are improved capacity remarkably during the 20th century. Improving the precision of machine tools are related with precision of products and accurate processing is always associated with the subject of interest. There are a lot of the elements that determine the precision of the machine, as guides, motors, structure, control, etc. In this paper we focused on the phenomenon that vertical movement system has worse precision than horizontal movement system even they were made up with same components. The vertical movement system needs to be studied differently from the horizontal movement system to develop its precision. The vertical movement system has load on its transfer direction and it makes the movement system weak in precision than the horizontal one. Some machines have mechanical counter balance, hydraulic or pneumatic counter balance to compensate the weight of the machine head. And there is several type of compensating the weight. It can push the machine head and also can use chain or wire lope to transfer the compensating force from counter balance to machine head. According to the type of compensating, there could be error from friction, pressure error of hydraulic or pressure control error. Also according to what to use for transferring the compensating force, transfer error of compensating force could be occur.
Abstract: A three-dimensional and pulsatile blood flow in the left ventricle of heart model has been studied numerically. The geometry was derived from a simple approximation of the left ventricle model and the numerical simulations were obtained using a formulation of the Navier-Stokes equations. In this study, simulation was used to investigate the pattern of flow velocity in 3D model of heart with consider the left ventricle based on critical parameter of blood under steady condition. Our results demonstrate that flow velocity focused from mitral valve channel and continuous linearly to left ventricle wall but this skewness progresses into outside wall in atrium through aortic valve with random distribution that is irregular due to force subtract from ventricle wall during cardiac cycle. The findings are the prediction of the behavior of the blood flow velocity pattern in steady flow condition which can assist the medical practitioners in their decision on the patients- treatments.
Abstract: In this paper, we propose a fast and efficient method for drawing very large-scale graph data. The conventional force-directed method proposed by Fruchterman and Rheingold (FR method) is well-known. It defines repulsive forces between every pair of nodes and attractive forces between connected nodes on a edge and calculates corresponding potential energy. An optimal layout is obtained by iteratively updating node positions to minimize the potential energy. Here, the positions of the nodes are updated every global timestep at the same time. In the proposed method, each node has its own individual time and time step, and nodes are updated at different frequencies depending on the local situation. The proposed method is inspired by the hierarchical individual time step method used for the high accuracy calculations for dense particle fields such as star clusters in astrophysical dynamics. Experiments show that the proposed method outperforms the original FR method in both speed and accuracy. We implement the proposed method on the MDGRAPE-3 PCI-X special purpose parallel computer and realize a speed enhancement of several hundred times.
Abstract: During the past several years, face recognition in video
has received significant attention. Not only the wide range of
commercial and law enforcement applications, but also the availability
of feasible technologies after several decades of research contributes
to the trend. Although current face recognition systems have reached a
certain level of maturity, their development is still limited by the
conditions brought about by many real applications. For example,
recognition images of video sequence acquired in an open
environment with changes in illumination and/or pose and/or facial
occlusion and/or low resolution of acquired image remains a largely
unsolved problem. In other words, current algorithms are yet to be
developed. This paper provides an up-to-date survey of video-based
face recognition research. To present a comprehensive survey, we
categorize existing video based recognition approaches and present
detailed descriptions of representative methods within each category.
In addition, relevant topics such as real time detection, real time
tracking for video, issues such as illumination, pose, 3D and low
resolution are covered.
Abstract: In the context of spectrum surveillance, a method to
recover the code of spread spectrum signal is presented, whereas the
receiver has no knowledge of the transmitter-s spreading sequence.
The approach is based on a genetic algorithm (GA), which is forced to
model the received signal. Genetic algorithms (GAs) are well known
for their robustness in solving complex optimization problems.
Experimental results show that the method provides a good
estimation, even when the signal power is below the noise power.
Abstract: A welded structure must be inspected to guarantee that the weld quality meets the design requirements to assure safety and reliability. However, X-ray image analyses and defect recognition with the computer vision techniques are very complex. Most difficulties lie in finding the small, irregular defects in poor contrast images which requires pre processing to image, extract, and classify features from strong background noise. This paper addresses the issue of designing methodology to extract defect from noisy background radiograph with image processing. Based on the use of actives contours this methodology seems to give good results
Abstract: The purpose of the article is to illustrate the main
characteristics of the corporate governance challenge facing the
countries of South-Eastern Europe (SEE) and to subsequently
determine and assess the extensiveness and effectiveness of corporate
governance regulations in these countries. Therefore, we start with an
overview on the subject of the key problems of corporate governance
in transition. We then address the issue of corporate governance
measurement for SEE countries. To this end, we include a review of
the methodological framework for determining both the
extensiveness and the effectiveness of corporate governance
legislation. We then focus on the actual analysis of the quality of
corporate governance codes, as well as of legal institutions
effectiveness and provide a measure of corporate governance in
Romania and other SEE emerging markets. The paper concludes by
emphasizing the corporate governance enforcement gap and by
identifying research issues that require further study.
Abstract: Adsorption of CS2 vapors has been studied on
different types of activated carbons obtained from different source
raw materials. The activated carbons have different surface areas and
are associated with varying amounts of the carbon-oxygen surface
groups. The adsorption of CS2 vapors is not directly related to surface
area, but is considerably influenced by the presence of carbonoxygen
surface groups. The adsorption decreases on increasing the
amount of carbon-oxygen surface groups on oxidation and increases
when these surface groups are eliminated on degassing. The
adsorption is maximum in case of the 950°-degassed carbon sample
which is almost completely free of any associated oxygen. The
kinetic data as analysed by Empirical diffusion model and Linear
driving force mass transfer model indicate that the adsorption does
not involve Fickian diffusion but may be considered as a pseudo first
order mass transfer process. The activation energy of adsorption and
isosteric enthalpies of adsorption indicate that the adsorption does not
involve interaction between CS2 and carbon-oxygen surface groups,
but hydrophobic interactions between CS2 and C-C atoms in the
carbon lattice.