Trapping Efficiency of Diesel Particles Through a Square Duct

Diesel Engines emit complex mixtures of inorganic and organic compounds in the form of both solid and vapour phase particles. Most of the particulates released are ultrafine nanoparticles which are detrimental to human health and can easily enter the body by respiration. The emissions standards on particulate matter release from diesel engines are constantly upgraded within the European Union and with future regulations based on the particles numbers released instead of merely mass, the need for effective aftertreatment devices will increase. Standard particulate filters in the form of wall flow filters can have problems with high soot accumulation, producing a large exhaust backpressure. A potential solution would be to combine the standard filter with a flow through filter to reduce the load on the wall flow filter. In this paper soot particle trapping has been simulated in different continuous flow filters of monolithic structure including the use of promoters, at laminar flow conditions. An Euler Lagrange model, the discrete phase model in Ansys used with user defined functions for forces acting on particles. A method to quickly screen trapping of 5 nm and 10 nm particles in different catalysts designs with tracers was also developed. Simulations of square duct monoliths with promoters show that the strength of the vortices produced are not enough to give a high amount of particle deposition on the catalyst walls. The smallest particles in the simulations, 5 and 10 nm particles were trapped to a higher extent, than larger particles up to 1000 nm, in all studied geometries with the predominant deposition mechanism being Brownian diffusion. The comparison of the different filters designed with a wall flow filter does show that the options for altering a design of a flow through filter, without imposing a too large pressure drop penalty are good.

Fingerprint Identification Keyless Entry System

Nowadays, keyless entry systems are widely adopted for vehicle immobilizer systems due to both advantages of security and convenience. Keyless entry systems could overcome brute-force key guessing attack, statistics attack and masquerade attack, however, they can't prevent from thieves stealing behavior. In this paper, we proposed a new architecture try to improve the existent flaws. The integration of the keyless entry system and the fingerprint identification technology is more suitable to implement on the portable transponder to achieve higher security needs. We also adopt and modify AES security protocol for life expectancy and security of the portable transponder. In addition, the identification of a driver's fingerprint makes the service of automatic reinstatement of a driver's preferences become possible. Our design can satisfy not only the three kinds of previous illegal attacks, but also the stealing situation. Furthermore, many practical factors, such as costs, life expectancy and performance, have been well considered in the design of portable transponder.

Effects of Human Factors on Workforce Scheduling

In today-s competitive market, most companies develop manufacturing systems that can help in cost reduction and maximum quality. Human issues are an important part of manufacturing systems, yet most companies ignore their effects on production performance. This paper aims to developing an integrated workforce planning system that incorporates the human being. Therefore, a multi-objective mixed integer nonlinear programming model is developed to determine the amount of hiring, firing, training, overtime for each worker type. This paper considers a workforce planning model including human aspects such as skills, training, workers- personalities, capacity, motivation, and learning rates. This model helps to minimize the hiring, firing, training and overtime costs, and maximize the workers- performance. The results indicate that the workers- differences should be considered in workforce scheduling to generate realistic plans with minimum costs. This paper also investigates the effects of human learning rates on the performance of the production systems.

Polyisoprene-coated Silica/Natural Rubber Composite

The commercial white tyres are usually used for forklifts in food and medicine industries. Conventionally, silica is used as reinforcement in the tyres. However, the adhesion between silica particles and rubber is remarkably poor. To improve the problem of adhesion and hence enhance wear resistance, modification of silica surface is one of the solutions. In this work, the natural rubber compound blending with polyisoprene-coated silica prepared by admicellar polymerization technique was studied to compare with the natural rubber compound of unmodified silica. The surface characterization of modified silica was also examined by SEM, FTIR, and TGA. The results show that polyisoprene-coated silica/natural rubber compound gave better overall mechanical properties, especially wear resistance with the improvement of the adhesion between silica and natural rubber matrix that can be seen in the SEM micrograph.

Flocking Behaviors for Multiple Groups with Heterogeneous Agents

Most of researches for conventional simulations were studied focusing on flocks with a single species. While there exist the flocking behaviors with a single species in nature, the flocking behaviors are frequently observed with multi-species. This paper studies on the flocking simulation for heterogeneous agents. In order to simulate the flocks for heterogeneous agents, the conventional method uses the identifier of flock, while the proposed method defines the feature vector of agent and uses the similarity between agents by comparing with those feature vectors. Based on the similarity, the paper proposed the attractive force and repulsive force and then executed the simulation by applying two forces. The results of simulation showed that flock formation with heterogeneous agents is very natural in both cases. In addition, it showed that unlike the existing method, the proposed method can not only control the density of the flocks, but also be possible for two different groups of agents to flock close to each other if they have a high similarity.

How Efficiency of Password Attack Based on a Keyboard

At present, dictionary attack has been the basic tool for recovering key passwords. In order to avoid dictionary attack, users purposely choose another character strings as passwords. According to statistics, about 14% of users choose keys on a keyboard (Kkey, for short) as passwords. This paper develops a framework system to attack the password chosen from Kkeys and analyzes its efficiency. Within this system, we build up keyboard rules using the adjacent and parallel relationship among Kkeys and then use these Kkey rules to generate password databases by depth-first search method. According to the experiment results, we find the key space of databases derived from these Kkey rules that could be far smaller than the password databases generated within brute-force attack, thus effectively narrowing down the scope of attack research. Taking one general Kkey rule, the combinations in all printable characters (94 types) with Kkey adjacent and parallel relationship, as an example, the derived key space is about 240 smaller than those in brute-force attack. In addition, we demonstrate the method's practicality and value by successfully cracking the access password to UNIX and PC using the password databases created

Influence of Laminated Textile Structures on Mechanical Performance of NF-Epoxy Composites

Textile structures are engineered and fabricated to meet worldwide structural applications. Nevertheless, research varying textile structure on natural fibre as composite reinforcement was found to be very limited. Most of the research is focusing on short fibre and random discontinuous orientation of the reinforcement structure. Realizing that natural fibre (NF) composite had been widely developed to be used as synthetic fibre composite replacement, this research attempted to examine the influence of woven and cross-ply laminated structure towards its mechanical performances. Laminated natural fibre composites were developed using hand lay-up and vacuum bagging technique. Impact and flexural strength were investigated as a function of fibre type (coir and kenaf) and reinforcement structure (imbalanced plain woven, 0°/90° cross-ply and +45°/-45° cross-ply). Multi-level full factorial design of experiment (DOE) and analysis of variance (ANOVA) was employed to impart data as to how fibre type and reinforcement structure parameters affect the mechanical properties of the composites. This systematic experimentation has led to determination of significant factors that predominant influences the impact and flexural properties of the textile composites. It was proven that both fibre type and reinforcement structure demonstrated significant difference results. Overall results indicated that coir composite and woven structure exhibited better impact and flexural strength. Yet, cross-ply composite structure demonstrated better fracture resistance.

Comparative Finite Element Simulation of Nonlinear Vibrations and Sensor Output Voltage of Smart Piezolaminated Structures

Two geometrically nonlinear plate theories, based either on first- or third-order transverse shear deformation theory are used for finite element modeling and simulation of the transient response of smart structures incorporating piezoelectric layers. In particular the time histories of nonlinear vibrations and sensor voltage output of a thin beam with a piezoelectric patch bonded to the surface due to an applied step force are studied.

Determination of Non Uniform Sinusoidal Microstrip Leaky-Wave Antenna Radiating Performances in Millimeter Band

Here we have considered non uniform microstrip leaky-wave antenna implemented on a dielectric waveguide by a sinusoidal profile of periodic metallic grating. The non distribution of the attenuation constant α along propagation axis, optimize the radiating characteristics and performances of such antennas. The method developped here is based on an integral method where the formalism of the admittance operator is combined to a BKW approximation. First, the effect of the modeling in the modal analysis of complex waves is studied in detail. Then, the BKW model is used for the dispersion analysis of the antenna of interest. According to antenna theory, a forced continuity of the leaky-wave magnitude at discontinuities of the non uniform structure is established. To test the validity of our dispersion analysis, computed radiation patterns are presented and compared in the millimeter band.

Influence of Cell-free Proteins in the Nucleation of CaCO3 Crystals in Calcified Endoskeleton

Calcite aCalcite and aragonite are the two common polymorphs of CaCO3 observed as biominerals. It is universal that the sea water contents a high Mg2+ (50mM) relative to Ca2+ (10mM). In vivo crystallization, Mg2+ inhibits calcite formation. For this reason, stony corals skeleton may be formed only aragonite crystals in the biocalcification. It is special in case of soft corals of which formed only calcite crystal; however, this interesting phenomenon, still uncharacterized in the marine environment, has been explored in this study using newly purified cell-free proteins isolated from the endoskeletal sclerites of soft coral. By recording the decline of pH in vitro, the control of CaCO3 nucleation and crystal growth by the cellfree proteins was revealed. Using Atomic Force Microscope, here we find that these endoskeletal cell-free proteins significantly design the morphological shape in the molecular-scale kinetics of crystal formation and those proteins act as surfactants to promote ion attachment at calcite steps.nd aragonite are the two common polymorphs of CaCO3 observed as biominerals. It is universal that the sea water contents a high Mg2+ (50mM) relative to Ca2+ (10mM). In vivo crystallization, Mg2+ inhibits calcite formation. For this reason, stony corals skeleton may be formed only aragonite crystals in the biocalcification. It is special in case of soft corals of which formed only calcite crystal; however, this interesting phenomenon, still uncharacterized in the marine environment, has been explored in this study using newly purified cell-free proteins isolated from the endoskeletal sclerites of soft coral. By recording the decline of pH in vitro, the control of CaCO3 nucleation and crystal growth by the cell-free proteins was revealed. Using Atomic Force Microscope, here we find that these endoskeletal cell-free proteins significantly design the morphological shape in the molecular-scale kinetics of crystal formation and those proteins act as surfactants to promote ion attachment at calcite steps. KeywordsBiomineralization, Calcite, Cell-free protein, Soft coral

Technological Environment - International Marketing Strategy Relationship

International trade involves both large and small firms engaged in business overseas. Possible drivers that force companies to enter international markets include increasing competition at the domestic market, maturing domestic markets, and limited domestic market opportunities. Technology is an important driving factor in shaping international marketing strategy as well as in driving force towards a more global marketplace, especially technology in communication. It includes telephones, the internet, computer systems and e-mail. There are three main marketing strategy choices, namely standardization approach, adaptation approach and middleof- the-road approach that companies implement to overseas markets. The decision depends on situations and factors facing the companies in the international markets. In this paper, the contingency concept is considered that no single strategy can be effective in all contexts. The effect of strategy on performance depends on specific situational variables. Strategic fit is employed to investigate export marketing strategy adaptation under certain environmental conditions, which in turn can lead to superior performance.

A Numerical Investigation on the Dynamic Stall of a Wind Turbine Section Using Different Turbulent Models

In this article, the flow behavior around a NACA 0012 airfoil which is oscillating with different Reynolds numbers and in various amplitudes has been investigated numerically. Numerical simulations have been performed with ANSYS software. First, the 2- D geometry has been studied in different Reynolds numbers and angles of attack with various numerical methods in its static condition. This analysis was to choose the best turbulent model and comparing the grids to have the optimum one for dynamic simulations. Because the analysis was to study the blades of wind turbines, the Reynolds numbers were not arbitrary. They were in the range of 9.71e5 to 22.65e5. The angle of attack was in the range of -41.81° to 41.81°. By choosing the forward wind speed as the independent parameter, the others like Reynolds and the amplitude of the oscillation would be known automatically. The results show that the SST turbulent model is the best choice that leads the least numerical error with respect the experimental ones. Also, a dynamic stall phenomenon is more probable at lower wind speeds in which the lift force is less.

Error Factors in Vertical Positioning System

Machine tools are improved capacity remarkably during the 20th century. Improving the precision of machine tools are related with precision of products and accurate processing is always associated with the subject of interest. There are a lot of the elements that determine the precision of the machine, as guides, motors, structure, control, etc. In this paper we focused on the phenomenon that vertical movement system has worse precision than horizontal movement system even they were made up with same components. The vertical movement system needs to be studied differently from the horizontal movement system to develop its precision. The vertical movement system has load on its transfer direction and it makes the movement system weak in precision than the horizontal one. Some machines have mechanical counter balance, hydraulic or pneumatic counter balance to compensate the weight of the machine head. And there is several type of compensating the weight. It can push the machine head and also can use chain or wire lope to transfer the compensating force from counter balance to machine head. According to the type of compensating, there could be error from friction, pressure error of hydraulic or pressure control error. Also according to what to use for transferring the compensating force, transfer error of compensating force could be occur.

Modeling of Blood Flow Velocity into the Main Artery via Left Ventricle of Heart during Steady Condition

A three-dimensional and pulsatile blood flow in the left ventricle of heart model has been studied numerically. The geometry was derived from a simple approximation of the left ventricle model and the numerical simulations were obtained using a formulation of the Navier-Stokes equations. In this study, simulation was used to investigate the pattern of flow velocity in 3D model of heart with consider the left ventricle based on critical parameter of blood under steady condition. Our results demonstrate that flow velocity focused from mitral valve channel and continuous linearly to left ventricle wall but this skewness progresses into outside wall in atrium through aortic valve with random distribution that is irregular due to force subtract from ventricle wall during cardiac cycle. The findings are the prediction of the behavior of the blood flow velocity pattern in steady flow condition which can assist the medical practitioners in their decision on the patients- treatments.

A Force-directed Graph Drawing based on the Hierarchical Individual Timestep Method

In this paper, we propose a fast and efficient method for drawing very large-scale graph data. The conventional force-directed method proposed by Fruchterman and Rheingold (FR method) is well-known. It defines repulsive forces between every pair of nodes and attractive forces between connected nodes on a edge and calculates corresponding potential energy. An optimal layout is obtained by iteratively updating node positions to minimize the potential energy. Here, the positions of the nodes are updated every global timestep at the same time. In the proposed method, each node has its own individual time and time step, and nodes are updated at different frequencies depending on the local situation. The proposed method is inspired by the hierarchical individual time step method used for the high accuracy calculations for dense particle fields such as star clusters in astrophysical dynamics. Experiments show that the proposed method outperforms the original FR method in both speed and accuracy. We implement the proposed method on the MDGRAPE-3 PCI-X special purpose parallel computer and realize a speed enhancement of several hundred times.

Video-based Face Recognition: A Survey

During the past several years, face recognition in video has received significant attention. Not only the wide range of commercial and law enforcement applications, but also the availability of feasible technologies after several decades of research contributes to the trend. Although current face recognition systems have reached a certain level of maturity, their development is still limited by the conditions brought about by many real applications. For example, recognition images of video sequence acquired in an open environment with changes in illumination and/or pose and/or facial occlusion and/or low resolution of acquired image remains a largely unsolved problem. In other words, current algorithms are yet to be developed. This paper provides an up-to-date survey of video-based face recognition research. To present a comprehensive survey, we categorize existing video based recognition approaches and present detailed descriptions of representative methods within each category. In addition, relevant topics such as real time detection, real time tracking for video, issues such as illumination, pose, 3D and low resolution are covered.

Spread Spectrum Code Estimation by Genetic Algorithm

In the context of spectrum surveillance, a method to recover the code of spread spectrum signal is presented, whereas the receiver has no knowledge of the transmitter-s spreading sequence. The approach is based on a genetic algorithm (GA), which is forced to model the received signal. Genetic algorithms (GAs) are well known for their robustness in solving complex optimization problems. Experimental results show that the method provides a good estimation, even when the signal power is below the noise power.

Forces Association-Based Active Contour

A welded structure must be inspected to guarantee that the weld quality meets the design requirements to assure safety and reliability. However, X-ray image analyses and defect recognition with the computer vision techniques are very complex. Most difficulties lie in finding the small, irregular defects in poor contrast images which requires pre processing to image, extract, and classify features from strong background noise. This paper addresses the issue of designing methodology to extract defect from noisy background radiograph with image processing. Based on the use of actives contours this methodology seems to give good results

Extensiveness and Effectiveness of Corporate Governance Regulations in South-Eastern Europe

The purpose of the article is to illustrate the main characteristics of the corporate governance challenge facing the countries of South-Eastern Europe (SEE) and to subsequently determine and assess the extensiveness and effectiveness of corporate governance regulations in these countries. Therefore, we start with an overview on the subject of the key problems of corporate governance in transition. We then address the issue of corporate governance measurement for SEE countries. To this end, we include a review of the methodological framework for determining both the extensiveness and the effectiveness of corporate governance legislation. We then focus on the actual analysis of the quality of corporate governance codes, as well as of legal institutions effectiveness and provide a measure of corporate governance in Romania and other SEE emerging markets. The paper concludes by emphasizing the corporate governance enforcement gap and by identifying research issues that require further study.

Adsorptive Removal of Vapors of Toxic Sulfur Compounds using Activated Carbons

Adsorption of CS2 vapors has been studied on different types of activated carbons obtained from different source raw materials. The activated carbons have different surface areas and are associated with varying amounts of the carbon-oxygen surface groups. The adsorption of CS2 vapors is not directly related to surface area, but is considerably influenced by the presence of carbonoxygen surface groups. The adsorption decreases on increasing the amount of carbon-oxygen surface groups on oxidation and increases when these surface groups are eliminated on degassing. The adsorption is maximum in case of the 950°-degassed carbon sample which is almost completely free of any associated oxygen. The kinetic data as analysed by Empirical diffusion model and Linear driving force mass transfer model indicate that the adsorption does not involve Fickian diffusion but may be considered as a pseudo first order mass transfer process. The activation energy of adsorption and isosteric enthalpies of adsorption indicate that the adsorption does not involve interaction between CS2 and carbon-oxygen surface groups, but hydrophobic interactions between CS2 and C-C atoms in the carbon lattice.