Abstract: Eutrophication of surface water is one of the most
widespread environmental problems at present. Large number of
pilgrims and tourists visit sacred artificial tank known as “Brahma
Sarover” located at Kurukshetra, India to take holy dip and perform
religious ceremonies. The sources of pollutants include impurities in
feed water, mass bathing, religious offerings and windblown
particulate matter. Studies so far have focused mainly on assessing
water quality for bathing purpose by using physico-chemical and
bacteriological parameters. No effort has been made to assess nutrient
concentration and trophic status of the tank to take more appropriate
measures for improving water quality on long term basis. In the
present study, total nitrogen, total phosphorous and chlorophyll a
measurements have been done to assess the nutrient level and trophic
status of the tank. The results show presence of high concentration of
nutrients and Chlorophyll a indicating mesotrophic and eutrophic
state of the tank. Phosphorous has been observed as limiting nutrient
in the tank water.
Abstract: There are lots of different ways to find the natural
frequencies of a rotating system. One of the most effective methods
which is used because of its precision and correctness is the
application of the transfer matrix. By use of this method the entire
continuous system is subdivided and the corresponding differential
equation can be stated in matrix form. So to analyze shaft that is this
paper issue the rotor is divided as several elements along the shaft
which each one has its own mass and moment of inertia, which this
work would create possibility of defining the named matrix. By
Choosing more elements number, the size of matrix would become
larger and as a result more accurate answers would be earned. In this
paper the dynamics of a rotor-bearing system is analyzed,
considering the gyroscopic effect. To increase the accuracy of
modeling the thickness of the disk and bearings is also taken into
account which would cause more complicated matrix to be solved.
Entering these parameters to our modeling would change the results
completely that these differences are shown in the results. As said
upper, to define transfer matrix to reach the natural frequencies of
probed system, introducing some elements would be one of the
requirements. For the boundary condition of these elements, bearings
at the end of the shaft are modeled as equivalent spring and dampers
for the discretized system. Also, continuous model is used for the
shaft in the system. By above considerations and using transfer
matrix, exact results are taken from the calculations. Results Show
that, by increasing thickness of the bearing the amplitude of vibration
would decrease, but obviously the stiffness of the shaft and the
natural frequencies of the system would accompany growth.
Consequently it is easily understood that ignoring the influences of
bearing and disk thicknesses would results not real answers.
Abstract: Biodiesel production with used frying by
transesterification reaction with methanol, using a commercial
kaolinite thermally-activated solid acid catalyst was investigated.
The surface area, the average pore diameter and pore volume of the
kaolinite catalyst were 10 m2/g, 13.0 nm and 30 mm3/g, respectively.
The optimal conditions for the transesterification reaction were
determined to be oil/methanol, in a molar ratio 1:31, temperature 160
ºC and catalyst concentration of 3% (w/w). The yield of fatty acids
methyl esters (FAME) was 92.4% after 2 h of reaction. This method
of preparation of biodiesel can be a positive alternative for utilizing
used frying corn oil for feedstock of biodiesel combined with the
inexpensive catalyst.
Abstract: Groundlessness of application probability-statistic methods are especially shown at an early stage of the aviation GTE technical condition diagnosing, when the volume of the information has property of the fuzzy, limitations, uncertainty and efficiency of application of new technology Soft computing at these diagnosing stages by using the fuzzy logic and neural networks methods. It is made training with high accuracy of multiple linear and nonlinear models (the regression equations) received on the statistical fuzzy data basis. At the information sufficiency it is offered to use recurrent algorithm of aviation GTE technical condition identification on measurements of input and output parameters of the multiple linear and nonlinear generalized models at presence of noise measured (the new recursive least squares method (LSM)). As application of the given technique the estimation of the new operating aviation engine D30KU-154 technical condition at height H=10600 m was made.
Abstract: Mining tailings represent a generating source of rich heavy metal material with a potential danger the public health and the environment, since these metals, under certain conditions, can leach and contaminate aqueous systems that serve like supplying potable water sources. The strategy for this work is based on the observation, experimentation and the simulation that can be obtained by binding real answers of the hydrodynamic behavior of metals leached from mining tailings, and the applied mathematics that provides the logical structure to decipher the individual effects of the general physicochemical phenomenon. The case of study presented herein focuses on mining tailings deposits located in Monte San Nicolas, Guanajuato, Mexico, an abandoned mine. This was considered the contamination source that under certain physicochemical conditions can favor the metal leaching, and its transport towards aqueous systems. In addition, the cartography, meteorology, geology and the hydrodynamics and hydrological characteristics of the place, will be helpful in determining the way and the time in which these systems can interact. Preliminary results demonstrated that arsenic presents a great mobility, since this one was identified in several superficial aqueous systems of the micro watershed, as well as in sediments in concentrations that exceed the established maximum limits in the official norms. Also variations in pH and potential oxide-reduction were registered, conditions that favor the presence of different species from this element its solubility and therefore its mobility.
Abstract: Elliptic curve-based certificateless signature is slowly
gaining attention due to its ability to retain the efficiency of
identity-based signature to eliminate the need of certificate
management while it does not suffer from inherent private
key escrow problem. Generally, cryptosystem based on elliptic
curve offers equivalent security strength at smaller key sizes
compared to conventional cryptosystem such as RSA which
results in faster computations and efficient use of computing
power, bandwidth, and storage. This paper proposes to implement
certificateless signature based on bilinear pairing to
structure the framework of IKE authentication. In this paper,
we perform a comparative analysis of certificateless signature
scheme with a well-known RSA scheme and also present the
experimental results in the context of signing and verification
execution times. By generalizing our observations, we discuss the
different trade-offs involved in implementing IKE authentication
by using certificateless signature.
Abstract: For over a decade, the Pulse Coupled Neural Network
(PCNN) based algorithms have been successfully used in image
interpretation applications including image segmentation. There are
several versions of the PCNN based image segmentation methods,
and the segmentation accuracy of all of them is very sensitive to the
values of the network parameters. Most methods treat PCNN
parameters like linking coefficient and primary firing threshold as
global parameters, and determine them by trial-and-error. The
automatic determination of appropriate values for linking coefficient,
and primary firing threshold is a challenging problem and deserves
further research. This paper presents a method for obtaining global as
well as local values for the linking coefficient and the primary firing
threshold for neurons directly from the image statistics. Extensive
simulation results show that the proposed approach achieves
excellent segmentation accuracy comparable to the best accuracy
obtainable by trial-and-error for a variety of images.
Abstract: Since the conception of JML, many tools, applications and implementations have been done. In this context, the users or developers who want to use JML seem surounded by many of these tools, applications and so on. Looking for a common infrastructure and an independent language to provide a bridge between these tools and JML, we developed an approach to embedded contracts in XML for Java: XJML. This approach offer us the ability to separate preconditions, posconditions and class invariants using JML and XML, so we made a front-end which can process Runtime Assertion Checking, Extended Static Checking and Full Static Program Verification. Besides, the capabilities for this front-end can be extended and easily implemented thanks to XML. We believe that XJML is an easy way to start the building of a Graphic User Interface delivering in this way a friendly and IDE independency to developers community wich want to work with JML.
Abstract: This study realizes an empirical investigation of main factors to develop an accounting career, stereotypes on accountants and accounting and perceptions on future career path for a sample of master students in accounting. The research provides some insight into what master students consider when choosing their future career paths. The most important two reasons chosen by students were “career opportunities" and “future earnings. They see accounting as structured, governed by conformity, requiring skills in working with numbers, monotonous, accurate, more efficient than effective but also absorbing, interesting and involving a certain degree of novelty. Although these students plan to start their careers in a multinational or accounting/audit firm, most of those plan to leave after five years. It resulted that women value more flexibility and time requiring special attention in retention policies practiced by firms.
Abstract: In 1990 [1] the subband-DFT (SB-DFT) technique was proposed. This technique used the Hadamard filters in the decomposition step to split the input sequence into low- and highpass sequences. In the next step, either two DFTs are needed on both bands to compute the full-band DFT or one DFT on one of the two bands to compute an approximate DFT. A combination network with correction factors was to be applied after the DFTs. Another approach was proposed in 1997 [2] for using a special discrete wavelet transform (DWT) to compute the discrete Fourier transform (DFT). In the first step of the algorithm, the input sequence is decomposed in a similar manner to the SB-DFT into two sequences using wavelet decomposition with Haar filters. The second step is to perform DFTs on both bands to obtain the full-band DFT or to obtain a fast approximate DFT by implementing pruning at both input and output sides. In this paper, the wavelet-based DFT (W-DFT) with Haar filters is interpreted as SB-DFT with Hadamard filters. The only difference is in a constant factor in the combination network. This result is very important to complete the analysis of the W-DFT, since all the results concerning the accuracy and approximation errors in the SB-DFT are applicable. An application example in spectral analysis is given for both SB-DFT and W-DFT (with different filters). The adaptive capability of the SB-DFT is included in the W-DFT algorithm to select the band of most energy as the band to be computed. Finally, the W-DFT is extended to the two-dimensional case. An application in image transformation is given using two different types of wavelet filters.
Abstract: Memory Errors Detection and Correction aim to secure the transaction of data between the central processing unit of a satellite onboard computer and its local memory. In this paper, the application of a double-bit error detection and correction method is described and implemented in Field Programmable Gate Array (FPGA) technology. The performance of the proposed EDAC method is measured and compared with two different EDAC devices, using the same FPGA technology. Statistical analysis of single-event upset (SEU) and multiple-bit upset (MBU) activity in commercial memories onboard the first Algerian microsatellite Alsat-1 is given.
Abstract: Three strains of Vibrio parahaemolyticus (690, BCRC
13023 and BCRC 13025) implicated in food poisoning outbreaks in
Taiwan were subjected to acid adaptation at pH 5.5 for 90 min. The
growth behaviors of acid-adapted and non-adapted V.
parahaemolyticus in the media supplemented with various nitrogen
and carbon sources were investigated. The effects of acid adaptation
on the thermostable direct hemolysin (TDH) secretion and fatty acid
profiles of V. parahaemolyticus were also examined. Results showed
that acid-adapted and non-adapted V. parahaemolyticus 690, BCRC
13023 and BCRC 13025 grew similarly in TSB-3% NaCl and basal
media supplemented with various carbon and nitrogen sources during
incubation period. Higher TDH secretion was noted with V.
parahaemolyticus 690 among the three strains. However, acid-adapted
strains produced less amounts of TDH than non-adapted strains when
they were grown in TSB-3% NaCl. Additionally, acid adaptation
increased the ratio of SFA/USFA in cells of V. parahaemolyticus
strains.
Abstract: One of the main research directions in CAD/CAM
machining area is the reducing of machining time.
The feedrate scheduling is one of the advanced techniques that
allows keeping constant the uncut chip area and as sequel to keep
constant the main cutting force. They are two main ways for feedrate
optimization. The first consists in the cutting force monitoring, which
presumes to use complex equipment for the force measurement and
after this, to set the feedrate regarding the cutting force variation. The
second way is to optimize the feedrate by keeping constant the
material removal rate regarding the cutting conditions.
In this paper there is proposed a new approach using an extended
database that replaces the system model.
The feedrate scheduling is determined based on the identification
of the reconfigurable machine tool, and the feed value determination
regarding the uncut chip section area, the contact length between tool
and blank and also regarding the geometrical roughness.
The first stage consists in the blank and tool monitoring for the
determination of actual profiles. The next stage is the determination
of programmed tool path that allows obtaining the piece target
profile.
The graphic representation environment models the tool and blank
regions and, after this, the tool model is positioned regarding the
blank model according to the programmed tool path. For each of
these positions the geometrical roughness value, the uncut chip area
and the contact length between tool and blank are calculated. Each of
these parameters are compared with the admissible values and
according to the result the feed value is established.
We can consider that this approach has the following advantages:
in case of complex cutting processes the prediction of cutting force is
possible; there is considered the real cutting profile which has
deviations from the theoretical profile; the blank-tool contact length
limitation is possible; it is possible to correct the programmed tool
path so that the target profile can be obtained.
Applying this method, there are obtained data sets which allow the
feedrate scheduling so that the uncut chip area is constant and, as a
result, the cutting force is constant, which allows to use more
efficiently the machine tool and to obtain the reduction of machining
time.
Abstract: The need to implement intelligent highways is much
more emphasized with the growth of vehicle production line as well as vehicle intelligence. The control of intelligent vehicles in order to
reduce human error and boost ease congestion is not accomplished solely by the aid of human resources. The present article is an attempt
to introduce an intelligent control system based on a single central computer. In this project, central computer, without utilizing Global
Positioning System (GPS), is capable of tracking all vehicles, crisis management and control, traffic guidance and recording traffic
crimes along the highway. By the help of RFID technology, vehicles
are connected to computerized systems, intelligent light poles and
other available hardware along the way. By the aid of Wimax
communicative technology, all components of the system are
virtually connected together through local and global networks
devised in them and the energy of the network is provided by the
solar cells installed on the intelligent light poles.
Abstract: The main purpose of this study was to determine the predictors of academic achievement of student Information and Communications Technologies (ICT) teachers with different learning styles. Participants were 148 student ICT teachers from Ankara University. Participants were asked to fill out a personal information sheet, the Turkish version of Kolb-s Learning Style Inventory, Weinstein-s Learning and Study Strategies Inventory, Schommer's Epistemological Beliefs Questionnaire, and Eysenck-s Personality Questionnaire. Stepwise regression analyses showed that the statistically significant predictors of the academic achievement of the accommodators were attitudes and high school GPAs; of the divergers was anxiety; of the convergers were gender, epistemological beliefs, and motivation; and of the assimilators were gender, personality, and test strategies. Implications for ICT teaching-learning processes and teacher education are discussed.
Abstract: This work presents a neural network model for the
clustering analysis of data based on Self Organizing Maps (SOM).
The model evolves during the training stage towards a hierarchical
structure according to the input requirements. The hierarchical structure
symbolizes a specialization tool that provides refinements of the
classification process. The structure behaves like a single map with
different resolutions depending on the region to analyze. The benefits
and performance of the algorithm are discussed in application to the
Iris dataset, a classical example for pattern recognition.
Abstract: The autonomous mobile robot was designed and implemented which was capable of navigating in the industrial environments and did a job of picking objects from variable height and delivering it to another location following a predefined trajectory. In developing country like Bangladesh industrial robotics is not very prevalent yet, due to the high installation cost. The objective of this project was to develop an autonomous mobile robot for industrial application using the available resources in the local market at lower manufacturing cost. The mechanical system of the robot was comprised of locomotion, gripping and elevation system. Grippers were designed to grip objects of a predefined shape. Cartesian elevation system was designed for vertical movement of the gripper. PIC18F452 microcontroller was the brain of the control system. The prototype autonomous robot was fabricated for relatively lower load than the industry and the performance was tested in a virtual industrial environment created within the laboratory to realize the effectiveness.
Abstract: This paper presents a 24 watts SEPIC converter design
and control using microprocessor. SEPIC converter has advantages of
a wide input range and miniaturization caused by the low stress at
elements. There is also an advantage that the input and output are
isolated in MOSFET-off state. This paper presents the PID control
through the SEPIC converter transfer function using a DSP and the
protective circuit for fuel cell from the over-current and
inverse-voltage by using the characteristic of SEPIC converter. Then it
derives them through the experiments.
Abstract: In this paper, RSA encryption algorithm and its hardware
implementation in Xilinx-s Virtex Field Programmable Gate
Arrays (FPGA) is analyzed. The issues of scalability, flexible performance,
and silicon efficiency for the hardware acceleration of
public key crypto systems are being explored in the present work.
Using techniques based on the interleaved math for exponentiation,
the proposed RSA calculation architecture is compared to existing
FPGA-based solutions for speed, FPGA utilization, and scalability.
The paper covers the RSA encryption algorithm, interleaved multiplication,
Miller Rabin algorithm for primality test, extended Euclidean
math, basic FPGA technology, and the implementation details of
the proposed RSA calculation architecture. Performance of several
alternative hardware architectures is discussed and compared. Finally,
conclusion is drawn, highlighting the advantages of a fully flexible
& parameterized design.
Abstract: Argument over the use of particular method in interlanguage pragmatics has increased recently. Researchers argued the advantages and disadvantages of each method either natural or elicited. Findings of different studies indicated that the use of one method may not provide enough data to answer all its questions. The current study investigated the validity of using multimethod approach in interlanguage pragmatics to understand the development of requests in Arabic as a second language (Arabic L2). To this end, the study adopted two methods belong to two types of data sources: the institutional discourse (natural data), and the role play (elicited data). Participants were 117 learners of Arabic L2 at the university level, representing four levels (beginners, low-intermediate, highintermediate, and advanced). Results showed that using two or more methods in interlanguage pragmatics affect the size and nature of data.