Abstract: This study examines appearances of brand placement
as an alternative communication strategy in television series by
focusing on Yalan Dünya which is one of the most popular television
series in Turkey. Consequently, this study has a descriptive research
design and quantitative content analysis method is used in order to
analyze frequency and time data of brand placement appearances in
first 3 seasons of Yalan Dünya with 16 episodes.
Analysis of brand placement practices in Yalan Dünya is dealt in
three categories: episode-based analysis, season-based analysis and
comparative analysis. At the end, brand placement practices in Yalan
Dünya are evaluated in terms of type, form, duration and legal
arrangements.
As a result of this study, it is seen that brand placement plays a
determinant role in Yalan Dünya content. Also, current legal
arrangements make brand placement closer to other traditional
communication strategies instead of differing brand placement from
them distinctly.
Abstract: Wireless Mesh Networks (WMNs) are an emerging
technology for last-mile broadband access. In WMNs, similar to ad
hoc networks, each user node operates not only as a host but also as a
router. User packets are forwarded to and from an Internet-connected
gateway in multi-hop fashion. The WMNs can be integrated with
other networking technologies i.e. ad hoc networks, to implement a
smooth network extension. The meshed topology provides good
reliability and scalability, as well as low upfront investments. Despite
the recent start-up surge in WMNs, much research remains to be
done in standardizing the functional parameters of WMNs to fully
exploit their full potential. An edifice of the security concerns of
these networks is authentication of a new client joining an integrated
ad hoc network and such a scenario will require execution of a multihop
authentication technique. Our endeavor in this paper is to
introduce a secure authentication technique, with light over-heads
that can be conveniently implemented for the ad-hoc nodes forming
clients of an integrated WMN, thus facilitating their inter-operability.
Abstract: Bandwidth allocation in wired network is less complex
and to allocate bandwidth in wireless networks is complex and
challenging, due to the mobility of source end system.This paper
proposes a new approach to bandwidth allocation to higher and lower
priority mobile nodes.In our proposal bandwidth allocation to new
mobile node is based on bandwidth utilization of existing mobile
nodes.The first section of the paper focuses on introduction to
bandwidth allocation in wireless networks and presents the existing
solutions available for allocation of bandwidth. The second section
proposes the new solution for the bandwidth allocation to higher and
lower priority nodes. Finally this paper ends with the analytical
evaluation of the proposed solution.
Abstract: Estimating the lifetime distribution of computer networks in which nodes and links exist in time and are bound for failure is very useful in various applications. This problem is known to be NP-hard. In this paper we present efficient combinatorial approaches to Monte Carlo estimation of network lifetime distribution. We also present some simulation results.
Abstract: Solar energy has a major role in renewable energy
resources. Solar Cell as a basement of solar system has attracted lots
of research. To conduct a study about solar energy system, an
authenticated model is required. Diode base PV models are widely
used by researchers. These models are classified based on the number
of diodes used in them. Single and two-diode models are well
studied. Single-diode models may have two, three or four elements.
In this study, these solar cell models are examined and the simulation
results are compared to each other. All PV models are re-designed in
the Matlab/Simulink software and they examined by certain test
conditions and parameters. This paper provides comparative studies
of these models and it tries to compare the simulation results with
manufacturer-s data sheet to investigate model validity and accuracy.
The results show a four- element single-diode model is accurate and
has moderate complexity in contrast to the two-diode model with
higher complexity and accuracy
Abstract: The paper presents a one-dimensional transient
mathematical model of compressible thermal multi-component gas
mixture flows in pipes. The set of the mass, momentum and enthalpy
conservation equations for gas phase is solved. Thermo-physical
properties of multi-component gas mixture are calculated by solving
the Equation of State (EOS) model. The Soave-Redlich-Kwong
(SRK-EOS) model is chosen. Gas mixture viscosity is calculated on
the basis of the Lee-Gonzales-Eakin (LGE) correlation. Numerical
analysis on rapid decompression in conventional dry gases is
performed by using the proposed mathematical model. The model is
validated on measured values of the decompression wave speed in
dry natural gas mixtures. All predictions show excellent agreement
with the experimental data at high and low pressure. The presented
model predicts the decompression in dry natural gas mixtures much
better than GASDECOM and OLGA codes, which are the most
frequently-used codes in oil and gas pipeline transport service.
Abstract: Spherical shaped magnetite (Fe3O4) and Au@Fe3O4
nanoparticles were successfully synthesized from Fe electrodes
immersed in water with CTAB surfactant and HAuCl4 solution using
simple method-pulsed plasma in liquid, without the use of dopants or
special conditions for stabilization. Vibrating sample magnetometer
indicated ferromagnetic behavior of particles at room temperature with
coercivity and saturation magnetization of (Hc=105 Oe, Ms=6.83
emu/g) for Fe3O4 and (Hc=175, Ms=3.56emu/g) for Au@Fe3O4
nanoparticles. Structure and morphology of nanoparticles were
characterized by X-ray Diffraction analysis and HR-TEM
measurements. The cytotoxicity of nanoparticles was indicated using a
XTT assay to be very low (cell viability: 98-89% with Fe3O4 and
99-91% for Au@Fe3O4 NPs).
Abstract: Wireless Sensor Networks (WSNs) are used to monitor/observe vast inaccessible regions through deployment of large number of sensor nodes in the sensing area. For majority of WSN applications, the collected data needs to be combined with geographic information of its origin to make it useful for the user; information received from remote Sensor Nodes (SNs) that are several hops away from base station/sink is meaningless without knowledge of its source. In addition to this, location information of SNs can also be used to propose/develop new network protocols for WSNs to improve their energy efficiency and lifetime. In this paper, range free localization protocols for WSNs have been proposed. The proposed protocols are based on weighted centroid localization technique, where the edge weights of SNs are decided by utilizing fuzzy logic inference for received signal strength and link quality between the nodes. The fuzzification is carried out using (i) Mamdani, (ii) Sugeno, and (iii) Combined Mamdani Sugeno fuzzy logic inference. Simulation results demonstrate that proposed protocols provide better accuracy in node localization compared to conventional centroid based localization protocols despite presence of unintentional radio frequency interference from radio frequency (RF) sources operating in same frequency band.
Abstract: This paper presents an approach for an unequal error
protection of facial features of personal ID images coding. We
consider unequal error protection (UEP) strategies for the efficient
progressive transmission of embedded image codes over noisy
channels. This new method is based on the progressive image
compression embedded zerotree wavelet (EZW) algorithm and UEP
technique with defined region of interest (ROI). In this case is ROI
equal facial features within personal ID image. ROI technique is
important in applications with different parts of importance. In ROI
coding, a chosen ROI is encoded with higher quality than the
background (BG). Unequal error protection of image is provided by
different coding techniques and encoding LL band separately. In our
proposed method, image is divided into two parts (ROI, BG) that
consist of more important bytes (MIB) and less important bytes
(LIB). The proposed unequal error protection of image transmission
has shown to be more appropriate to low bit rate applications,
producing better quality output for ROI of the compresses image.
The experimental results verify effectiveness of the design. The
results of our method demonstrate the comparison of the UEP of
image transmission with defined ROI with facial features and the
equal error protection (EEP) over additive white gaussian noise
(AWGN) channel.
Abstract: In this contribution is presented a complex design of
individual objects identification in the workplace of intelligent
assembly cell. Intelligent assembly cell is situated at Institute of
Manufacturing Systems and Applied Mechanics and is used for
pneumatic actuator assembly. Pneumatic actuator components are
pneumatic roller, cover, piston and spring. Two identification objects
alternatives for assembly are designed in the workplace of industrial
robot. In the contribution is evaluated and selected suitable
alternative for identification – 2D codes reader. The complex design
of individual object identification is going out of intelligent
manufacturing systems knowledge.
Intelligent assembly and manufacturing systems as systems of
new generation are gradually loaded in to the mechanical production,
when they are removeing human operation out of production process
and they also short production times.
Abstract: The wireless adhoc network is comprised of wireless
node which can move freely and are connected among themselves
without central infrastructure. Due to the limited transmission range
of wireless interfaces, in most cases communication has to be relayed
over intermediate nodes. Thus, in such multihop network each node
(also called router) is independent, self-reliant and capable to route
the messages over the dynamic network topology. Various protocols
are reported in this field and it is very difficult to decide the best one.
A key issue in deciding which type of routing protocol is best for
adhoc networks is the communication overhead incurred by the
protocol. In this paper STAR a table driven and DSR on demand
protocols based on IEEE 802.11 are analyzed for their performance
on different performance measuring metrics versus varying traffic
CBR load using QualNet 5.0.2 network simulator.
Abstract: Three-dimensional simulation of harmonic up
generation in free electron laser amplifier operating simultaneously
with a cold and relativistic electron beam is presented in steady-state
regime where the slippage of the electromagnetic wave with respect
to the electron beam is ignored. By using slowly varying envelope
approximation and applying the source-dependent expansion to wave
equations, electromagnetic fields are represented in terms of the
Hermit Gaussian modes which are well suited for the planar wiggler
configuration. The electron dynamics is described by the fully threedimensional
Lorentz force equation in presence of the realistic planar
magnetostatic wiggler and electromagnetic fields. A set of coupled
nonlinear first-order differential equations is derived and solved
numerically. The fundamental and third harmonic radiation of the
beam is considered. In addition to uniform beam, prebunched
electron beam has also been studied. For this effect of sinusoidal
distribution of entry times for the electron beam on the evolution of
radiation is compared with uniform distribution. It is shown that
prebunching reduces the saturation length substantially. For
efficiency enhancement the wiggler is set to decrease linearly when
the radiation of the third harmonic saturates. The optimum starting
point of tapering and the slope of radiation in the amplitude of
wiggler are found by successive run of the code.
Abstract: A mathematical model for the hydrodynamic
lubrication of parabolic slider bearings with couple stress lubricants
is presented. A numerical solution for the mathematical model using
finite element scheme is obtained using three nodes isoparametric
quadratic elements. Stiffness integrals obtained from the weak form
of the governing equations were solved using Gauss Quadrature to
obtain a finite number of stiffness matrices. The global system of
equations was obtained for the bearing and solved using Gauss Seidel
iterative scheme. The converged pressure solution was used to obtain
the load capacity of the bearing. Parametric studies were carried out
and it was shown that the effect of couple stresses and profile
parameter are to increase the load carrying capacity of the parabolic
slider bearing. Numerical experiments reveal that the magnitude of
the profile parameter at which maximum load is obtained increases
with decrease in couple stress parameter. The results are presented in
graphical form.
Abstract: In the present study, a steady-state simulation model
has been developed to evaluate the system performance of a
transcritical carbon dioxide heat pump system for simultaneous water
cooling and heating. Both the evaporator (including both two-phase
and superheated zone) and gas cooler models consider the highly
variable heat transfer characteristics of CO2 and pressure drop. The
numerical simulation model of transcritical CO2 heat pump has been
validated by test data obtained from experiments on the heat pump
prototype. Comparison between the test results and the model
prediction for system COP variation with compressor discharge
pressure shows a modest agreement with a maximum deviation of
15% and the trends are fairly similar. Comparison for other operating
parameters also shows fairly similar deviation between the test
results and the model prediction. Finally, the simulation results are
presented to study the effects of operating parameters such as,
temperature of heat exchanger fluid at the inlet, discharge pressure,
compressor speed on system performance of CO2 heat pump, suitable
in a dairy plant where simultaneous cooling at 4oC and heating at
73oC are required. Results show that good heat transfer properties of
CO2 for both two-phase and supercritical region and efficient
compression process contribute a lot for high system COPs.
Abstract: The company-s ability to draw on a range of external
sources to meet their needs for innovation, has been termed 'open
innovation' (OI). Very few empirical analyses have been conducted
on Small and Medium Enterprises (SMEs) to the extent that they
describe and understand the characteristics and implications of this
new paradigm.
The study's objective is to identify and characterize different
modes of OI, (considering innovation process phases and the variety
and breadth of the collaboration), determinants, barriers and
motivations in SMEs. Therefore a survey was carried out among
Italian manufacturing firms and a database of 105 companies was
obtained. With regard to data elaboration, a factorial and cluster
analysis has been conducted and three different OI modes have
emerged: selective low open, unselective open upstream, and mid-
partners integrated open. The different behaviours of the three
clusters in terms of determinants factors, performance, firm-s
technology intensity, barriers and motivations have been analyzed
and discussed.
Abstract: In recent years, the research in wireless sensor
network has increased steadily, and many studies were focusing on
reducing energy consumption of sensor nodes to extend their lifetimes.
In this paper, the issue of energy consumption is investigated and two
adaptive mechanisms are proposed to extend the network lifetime.
This study uses high-energy-first scheme to determine cluster heads
for data transmission. Thus, energy consumption in each cluster is
balanced and network lifetime can be extended. In addition, this study
uses cluster merging and dynamic routing mechanisms to further
reduce energy consumption during data transmission. The simulation
results show that the proposed method can effectively extend the
lifetime of wireless sensor network, and it is suitable for different base
station locations.
Abstract: The paper is concerned with developing stochastic delay mechanisms for efficient multicast protocols and for smooth mobile handover processes which are capable of preserving a given Quality of Service (QoS). In both applications the participating entities (receiver nodes or subscribers) sample a stochastic timer and generate load after a random delay. In this way, the load on the networking resources is evenly distributed which helps to maintain QoS communication. The optimal timer distributions have been sought in different p.d.f. families (e.g. exponential, power law and radial basis function) and the optimal parameter have been found in a recursive manner. Detailed simulations have demonstrated the improvement in performance both in the case of multicast and mobile handover applications.
Abstract: Access control is a critical security service in Wire- less
Sensor Networks (WSNs). To prevent malicious nodes from joining
the sensor network, access control is required. On one hand, WSN
must be able to authorize and grant users the right to access to the
network. On the other hand, WSN must organize data collected by
sensors in such a way that an unauthorized entity (the adversary)
cannot make arbitrary queries. This restricts the network access only
to eligible users and sensor nodes, while queries from outsiders will
not be answered or forwarded by nodes. In this paper we presentee
different access control schemes so as to ?nd out their objectives,
provision, communication complexity, limits, etc. Using the node
density parameter, we also provide a comparison of these proposed
access control algorithms based on the network topology which can
be flat or hierarchical.
Abstract: As networking has become popular, Web-learning
tends to be a trend while designing a tool. Moreover, five-axis
machining has been widely used in industry recently; however, it has
potential axial table colliding problems. Thus this paper aims at
proposing an efficient web-learning collision detection tool on
five-axis machining. However, collision detection consumes heavy
resource that few devices can support, thus this research uses a
systematic approach based on web knowledge to detect collision. The
methodologies include the kinematics analyses for five-axis motions,
separating axis method for collision detection, and computer
simulation for verification. The machine structure is modeled as STL
format in CAD software. The input to the detection system is the
g-code part program, which describes the tool motions to produce the
part surface. This research produced a simulation program with C
programming language and demonstrated a five-axis machining
example with collision detection on web site. The system simulates the
five-axis CNC motion for tool trajectory and detects for any collisions
according to the input g-codes and also supports high-performance
web service benefiting from C. The result shows that our method
improves 4.5 time of computational efficiency, comparing to the
conventional detection method.
Abstract: The output beam quality of multi transverse modes of
laser, are relatively poor. In order to obtain better beam quality, one
may use an aperture inside the laser resonator. In this case, various
transverse modes can be selected. We have selected various
transverse modes both by simulation and doing experiment. By
inserting a circular aperture inside the diode end-pumped Nd:YAG
pulsed laser resonator, we have obtained 00 TEM , 01 TEM
, 20 TEM and have studied which parameters, can change the mode
shape. Then, we have determined the beam quality factor of TEM00
gaussian mode.