Abstract: Ambiguities in effects of earthquake on various
structures in all earthquake codes would necessitate more study and
research concerning influential factors on dynamic behavior.
Previous studies which were done on different features in different
buildings play a major role in the type of response a structure makes
to lateral vibrations. Diagnosing each of these irregularities can help
structure designers in choosing appropriate setbacks for decreasing
possible damages. Therefore vertical setback is one of the irregularity
factors in the height of the building where can be seen in skyscrapers
and hotels. Previous researches reveal notable changes in the place of
these setbacks showing dynamic response of the structure.
Consequently analyzing 48 models of concrete frames for 3, 6 and 9
stories heights with three different bays in general shape of a surface
decline by height have been constructed in ETABS2000 software,
and then the shape effect of each and every one of these frames in
period scale has been discussed. The result of this study reveals that
not only mass, stiffness and height but also shape of the frame is
influential.
Abstract: ebXML (Electronic Business using eXtensible
Markup Language) is an e-business standard, sponsored by
UN/CEFACT and OASIS, which enables enterprises to exchange
business messages, conduct trading relationships, communicate
data in common terms and define and register business
processes. While there is tremendous e-business value in the
ebXML, security remains an unsolved problem and one of the
largest barriers to adoption. XML security technologies emerging
recently have extensibility and flexibility suitable for security
implementation such as encryption, digital signature, access
control and authentication.
In this paper, we propose ebXML business transaction models
that allow trading partners to securely exchange XML based
business transactions by employing XML security technologies.
We show how each XML security technology meets the ebXML
standard by constructing the test software and validating messages
between the trading partners.
Abstract: This paper proposed a new CAD tools for microwave amplifier design. The proposed tool is based on survey about the broadband amplifier design methods, such as the Feedback amplifiers, balanced amplifiers and Compensated Matching Network The proposed tool is developed for broadband amplifier using a compensated matching network "unconditional stability amplifier". The developed program is based on analytical procedures with ability of smith chart explanation. The C# software is used for the proposed tools implementation. The program is applied on broadband amplifier as an example for testing. The designed amplifier is considered as a broadband amplifier at the range 300-700 MHz. The results are highly agreement with the expected results. Finally, these methods can be extended for wide band amplifier design.
Abstract: This paper evaluates the performance of a novel
algorithm for tracking of a mobile node, interms of execution time
and root mean square error (RMSE). Particle Filter algorithm is used
to track the mobile node, however a new technique in particle filter
algorithm is also proposed to reduce the execution time. The
stationary points were calculated through trilateration and finally by
averaging the number of points collected for a specific time, whereas
tracking is done through trilateration as well as particle filter
algorithm. Wi-Fi signal is used to get initial guess of the position of
mobile node in x-y coordinates system. Commercially available
software “Wireless Mon" was used to read the WiFi signal strength
from the WiFi card. Visual Cµ version 6 was used to interact with
this software to read only the required data from the log-file
generated by “Wireless Mon" software. Results are evaluated through
mathematical modeling and MATLAB simulation.
Abstract: This paper presents the design, development and characterization of contractile water jet thruster (CWJT) for mini underwater robot. Instead of electric motor, this CWJT utilizes the Ionic Polymer Metal Composite (IPMC) as the actuator to generate the water jet. The main focus of this paper is to analyze the conceptual design of the proposed CWJT which would determine the thrust force value, jet flow behavior and actuator’s stress. Those thrust force and jet flow studies were carried out using Matlab/Simscape simulation software. The actuator stress had been analyzed using COSMOS simulation software. The results showed that there was no significant change for jet velocity at variable cross sectional nozzle area. However, a significant change was detected for jet velocity at different nozzle cross sectional area ratio which was up to 37%. The generated thrust force has proportional relation to the nozzle cross sectional area.
Abstract: We have applied new accelerated algorithm for linear
discriminate analysis (LDA) in face recognition with support vector
machine. The new algorithm has the advantage of optimal selection
of the step size. The gradient descent method and new algorithm has
been implemented in software and evaluated on the Yale face
database B. The eigenfaces of these approaches have been used to
training a KNN. Recognition rate with new algorithm is compared
with gradient.
Abstract: Process improvements have drawn much attention in
practical software engineering. The capability maturity levels from
CMMI have become an important index to assess a software company-s
software engineering capability. However, in countries like
Taiwan, customers often have no choices but to deal with vendors that
are not CMMI prepared or qualified. We call these vendors maturitylevel-
1 (ML1) vendors. In this paper, we describe our experience
from consulting an e-school project. We propose an approach to help
our client tackle the ML1 vendors. Through our system analysis, we
produce a design. This design is suggested to be used as part of
contract and a blueprint to guide the implementation.
Abstract: A novel low-cost flight simulator with the development
goals cost effectiveness and high performance has been realized for
meeting the huge pilot training needs of airlines. The simulator
consists of an aircraft dynamics model, a sophisticated designed
low-profile electrical driven motion system with a subsided cabin, a
mixed reality based semi-virtual cockpit system, a control loading
system and some other subsystems. It shows its advantages over
traditional flight simulator by its features achieved with open
architecture, software solutions and low-cost hardware.
Abstract: Along with increasing development of generation of supersonic planes especially fighters and request for increasing the performance and maneuverability scientists and engineers suggested the delta and double delta wing design. One of the areas which was necessary to be researched, was the Aerodynamic review of this type of wings in high angles of attack at low speeds that was very important in landing and takeoff the planes and maneuvers. Leading Edges of the wings,cause the separation flow from wing surface and then formation of powerful vortex with high rotational speed which studing the mechanism and location of formation and also the position of the vortex breakdown in high angles of attack is very important. In this research, a double delta wing with 76o/45o sweep angles at high angle of attack in steady state and incompressible flow were numerically analyzed with Fluent software. With analaysis of the numerical results, we arrived the most important characteristic of the double delta wings which is keeping of lift at high angles of attacks.
Abstract: Laboratory classes in Electrical Engineering are often hampered by safety issues, as students have to work on high voltage lines. One solution is to make use of virtual laboratory simulations, to help students understand the concepts taught in their coursework. In this context, we have conceived and implemented virtual lab experiments in connection with the study of earthing arrangements. In this work, software was developed, which aid student in understanding the working of a residual current device (RCD) in a TT earthing system. Various parameters, such as the earthing resistances, leakage currents and harmonics were included for a TT system with RCD connection.
Abstract: To understand the seismic behavior of the offshore
structures, the dynamic interaction of the water-structure-soil should
be assessed. In this regard the role of the water dynamic properties in
magnifying or reducing of the effects of earthquake induced motions
on offshore structures haven't been investigated in precise manner in
available literature. In this paper the sea water level fluctuations
effects on the seismic behavior of a sample of offshore structures has
been investigated by emphasizing on the water-structure interaction
phenomenon. For this purpose a two dimensional finite element
model of offshore structures as well as surrounded water has been
developed using ANSYS software. The effect of soil interaction with
embedded pile foundation has been imposed by using a series of
nonlinear springs in horizontal and vertical directions in soil-piles
contact points. In the model, the earthquake induced motions have
been applied on springs and consequently the motions propagated
upward to the structure and surrounded water. As a result of
numerical study, the horizontal deformations of the offshore deck as
well as internal force and buckling coefficient in structural elements
have been recorded and controlled with and without water presence.
In part of study a parametric study has been accomplished on sea
water level fluctuations and effect of this parameter has been studied
on the aforementioned numerical results.
Abstract: An application framework provides a reusable design
and implementation for a family of software systems. Application
developers extend the framework to build their particular
applications using hooks. Hooks are the places identified to show
how to use and customize the framework. Hooks define the
Framework Interface Classes (FICs) and the specifications of their
methods. As part of the development life cycle, it is required to test
the implementations of the FICs. Building a testing model to express
the behavior of a class is an essential step for the generation of the
class-based test cases. The testing model has to be consistent with the
specifications provided for the hooks. State-based models consisting
of states and transitions are testing models well suited to objectoriented
software. Typically, hand-construction of a state-based
model of a class behavior is expensive, error-prone, and may result in
constructing an inconsistent model with the specifications of the class
methods, which misleads verification results. In this paper, a
technique is introduced to automatically synthesize a state-based
testing model for FICs using the specifications provided for the
hooks. A tool that supports the proposed technique is introduced.
Abstract: The productivity of software development is one of the major concerns for project managers. Given the increasing complexity of the software being developed and the concomitant rise in the typical project size, the productivity has not consistently improved. By analyzing the latest release of ISBSG data repository with 4106 projects ever developed, we report on the factors found to significantly influence productivity, and present an original model for the estimation of productivity during project design. We further illustrate that software development productivity has experienced irregular variations between the years 1995 and 2005. Considering the factors significant to productivity, we found its variations are primarily caused by the variations of average team size for the development and the unbalanced use of the less productive development language 3GL.
Abstract: The objective of this contribution is to study the
performances in terms of bit error rate, of space-time code algorithms
applied to MIMO communication in tunnels. Indeed, the channel
characteristics in a tunnel are quite different than those of urban or
indoor environment, due to the guiding effect of the tunnel.
Therefore, MIMO channel matrices have been measured in a straight
tunnel, in a frequency band around 3GHz. Correlation between array
elements and properties of the MIMO matrices are first studied as a
function of the distance between the transmitter and the receiver.
Then, owing to a software tool simulating the link, predicted values
of bit error rate are given for VLAST, OSTBC and QSTBC
algorithms applied to a MIMO configuration with 2 or 4 array
elements. Results are interpreted from the analysis of the channel
properties.
Abstract: Source code retrieval is of immense importance in the software engineering field. The complex tasks of retrieving and extracting information from source code documents is vital in the development cycle of the large software systems. The two main subtasks which result from these activities are code duplication prevention and plagiarism detection. In this paper, we propose a Mohamed Amine Ouddan, and Hassane Essafi source code retrieval system based on two-level fingerprint representation, respectively the structural and the semantic information within a source code. A sequence alignment technique is applied on these fingerprints in order to quantify the similarity between source code portions. The specific purpose of the system is to detect plagiarism and duplicated code between programs written in different programming languages belonging to the same class, such as C, Cµ, Java and CSharp. These four languages are supported by the actual version of the system which is designed such that it may be easily adapted for any programming language.
Abstract: This paper presents a computational study of the separated flow in a planer asymmetric diffuser. The steady RANS equations for turbulent incompressible fluid flow and six turbulence closures are used in the present study. The commercial software code, FLUENT 6.3.26, was used for solving the set of governing equations using various turbulence models. Five of the used turbulence models are available directly in the code while the v2-f turbulence model was implemented via User Defined Scalars (UDS) and User Defined Functions (UDF). A series of computational analysis is performed to assess the performance of turbulence models at different grid density. The results show that the standard k-ω, SST k-ω and v2-f models clearly performed better than other models when an adverse pressure gradient was present. The RSM model shows an acceptable agreement with the velocity and turbulent kinetic energy profiles but it failed to predict the location of separation and attachment points. The standard k-ε and the low-Re k- ε delivered very poor results.
Abstract: In this paper, a strategy for long-span bridge disaster response was developed, divided into risk analysis, business impact analysis, and emergency response plan. At the risk analysis stage, the critical risk was estimated. The critical risk was “car accident."The critical process by critical-risk classification was assessed at the business impact analysis stage. The critical process was the task related to the road conditions and traffic safety. Based on the results of the precedent analysis, an emergency response plan was established. By making the order of the standard operating procedures clear, an effective plan for dealing with disaster was formulated. Finally, a prototype software was developed based on the research findings. This study laid the foundation of an information-technology-based disaster response guideline and is significant in that it computerized the disaster response plan to improve the plan-s accessibility.
Abstract: The VoIP networks as alternative method to traditional PSTN system has been implemented in a wide variety of structures
with multiple protocols, codecs, software and hardware–based
distributions. The use of cryptographic techniques let the users to have a secure communication, but the calculate throughput as well as the QoS parameters are affected according to the used algorithm. This
paper analyzes the VoIP throughput and the QoS parameters with
different commercial encryption methods. The measurement–based
approach uses lab scenarios to simulate LAN and WAN
environments. Security mechanisms such as TLS, SIAX2, SRTP,
IPSEC and ZRTP are analyzed with μ-LAW and GSM codecs.
Abstract: Design Patterns have gained more and more
acceptances since their emerging in software development world last
decade and become another de facto standard of essential knowledge
for Object-Oriented Programming developers nowadays.
Their target usage, from the beginning, was for regular computers,
so, minimizing power consumption had never been a concern.
However, in this decade, demands of more complicated software for
running on mobile devices has grown rapidly as the much higher
performance portable gadgets have been supplied to the market
continuously. To get along with time to market that is business
reason, the section of software development for power conscious,
battery, devices has shifted itself from using specific low-level
languages to higher level ones. Currently, complicated software
running on mobile devices are often developed by high level
languages those support OOP concepts. These cause the trend of
embracing Design Patterns to mobile world.
However, using Design Patterns directly in software development
for power conscious systems is not recommended because they were
not originally designed for such environment. This paper
demonstrates the adapted Design Pattern for power limitation system.
Because there are numerous original design patterns, it is not possible
to mention the whole at once. So, this paper focuses only in creating
Energy Conscious version of existing regular "Builder Pattern" to be
appropriated for developing low power consumption software.
Abstract: This paper presents an architecture to assist in the
development of tools to perform experimental analysis. Existing
implementations of tools based on this architecture are also described
in this paper. These tools are applied to the real world problem of
fault attack emulation and detection in cryptographic algorithms.