Abstract: Run-offs are considered as important hydrological factors in feasibility studies of river engineering and irrigation-related projects under arid and semi-arid condition. Flood control is one of the crucial factor, the management of which while mitigates its destructive consequences, abstracts considerable volume of renewable water resources. The methodology applied here was based on Mizumura, which applied a mathematical model for simple tank to simulate the rainfall-run-off process in a particular water basin using the data from the observational hydrograph. The model was applied in the Dez River water basin adjacent to Greater Dezful region, Iran in order to simulate and estimate the floods. Results indicated that the calculated hydrographs using the simple tank method, SCS-CN model and the observation hydrographs had a close proximity. It was also found that on average the flood time and discharge peaks in the simple tank were closer to the observational data than the CN method. On the other hand, the calculated flood volume in the CN model was significantly closer to the observational data than the simple tank model.
Abstract: Clustering techniques have received attention in many areas including engineering, medicine, biology and data mining. The purpose of clustering is to group together data points, which are close to one another. The K-means algorithm is one of the most widely used techniques for clustering. However, K-means has two shortcomings: dependency on the initial state and convergence to local optima and global solutions of large problems cannot found with reasonable amount of computation effort. In order to overcome local optima problem lots of studies done in clustering. This paper is presented an efficient hybrid evolutionary optimization algorithm based on combining Particle Swarm Optimization (PSO) and Ant Colony Optimization (ACO), called PSO-ACO, for optimally clustering N object into K clusters. The new PSO-ACO algorithm is tested on several data sets, and its performance is compared with those of ACO, PSO and K-means clustering. The simulation results show that the proposed evolutionary optimization algorithm is robust and suitable for handing data clustering.
Abstract: Software reuse can be considered as the most realistic
and promising way to improve software engineering productivity and
quality. Automated assistance for software reuse involves the
representation, classification, retrieval and adaptation of components.
The representation and retrieval of components are important to
software reuse in Component-Based on Software Development
(CBSD). However, current industrial component models mainly focus
on the implement techniques and ignore the semantic information
about component, so it is difficult to retrieve the components that
satisfy user-s requirements. This paper presents a method of business
component retrieval based on specification matching to solve the
software reuse of enterprise information system. First, a business
component model oriented reuse is proposed. In our model, the
business data type is represented as sign data type based on XML,
which can express the variable business data type that can describe the
variety of business operations. Based on this model, we propose
specification match relationships in two levels: business operation
level and business component level. In business operation level, we
use input business data types, output business data types and the
taxonomy of business operations evaluate the similarity between
business operations. In the business component level, we propose five
specification matches between business components. To retrieval
reusable business components, we propose the measure of similarity
degrees to calculate the similarities between business components.
Finally, a business component retrieval command like SQL is
proposed to help user to retrieve approximate business components
from component repository.
Abstract: Through the analysis of the process digital design
based on digital mockup, the fact indicates that a distributed
cooperative supporting environment is the foundation conditions to
adopt design approach based on DMU. Data access authorization is
concerned firstly because the value and sensitivity of the data for the
enterprise. The access control for administrators is often rather weak
other than business user. So authors established an enhanced system to
avoid the administrators accessing the engineering data by potential
approach and without authorization. Thus the data security is
improved.
Abstract: Operational safety of critical systems, such as nuclear power plants, industrial chemical processes and means of transportation, is a major concern for system engineers and operators. A means to assure that is on-line safety monitors that deliver three safety tasks; fault detection and diagnosis, alarm annunciation and fault controlling. While current monitors deliver these tasks, benefits and limitations in their approaches have at the same time been highlighted. Drawing from those benefits, this paper develops a distributed monitor based on semi-independent agents, i.e. a multiagent system, and monitoring knowledge derived from a safety assessment model of the monitored system. Agents are deployed hierarchically and provided with knowledge portions and collaboration protocols to reason and integrate over the operational conditions of the components of the monitored system. The monitor aims to address limitations arising from the large-scale, complicated behaviour and distributed nature of monitored systems and deliver the aforementioned three monitoring tasks effectively.
Abstract: Most standard software development methodologies
are often not applied to software projects in many developing
countries of the world. The approach generally practice is close to
what eXtreme Programming (XP) is likely promoting, just keep
coding and testing as the requirement evolves. XP is an agile
software process development methodology that has inherent
capability for improving efficiency of Business Software
Development (BSD). XP can facilitate Business-to-Development
(B2D) relationship due to its customer-oriented advocate. From
practitioner point of view, we applied XP to BSD and result shows
that customer involvement has positive impact on productivity, but
can as well frustrate the success of the project. In an effort to
promote software engineering practice in developing countries of
Africa, we present the experiment performed, lessons learned,
problems encountered and solution adopted in applying XP
methodology to BSD.
Abstract: This paper presents a conceptual model of agreement
options on negotiation support for civil engineering decision. The
negotiation support facilitates the solving of group choice decision
making problems in civil engineering decision to reduce the impact
of mud volcano disaster in Sidoarjo, Indonesia. The approach based
on application of analytical hierarchy process (AHP) method for
multi criteria decision on three level of decision hierarchy.
Decisions for reducing impact is very complicated since many
parties involved in a critical time. Where a number of stakeholders
are involved in choosing a single alternative from a set of solution
alternatives, there are different concern caused by differing
stakeholder preferences, experiences, and background. Therefore, a
group choice decision support is required to enable each stakeholder
to evaluate and rank the solution alternatives before engaging into
negotiation with the other stakeholders. Such civil engineering
solutions as alternatives are referred to as agreement options that are
determined by identifying the possible stakeholder choice, followed
by determining the optimal solution for each group of stakeholder.
Determination of the optimal solution is based on a game theory
model of n-person general sum game with complete information that
involves forming coalitions among stakeholders.
Abstract: Australia, while being a large and eager consumer of
innovative and cutting edge Information and Communication
Technologies (ICT), continues to struggle to remain a leader in
Technological Innovation. This paper has two main contributions to
address certain aspects of this complex issue. The first being the
current findings of an ongoing research project on Information and
Innovation Management in the Australian Information and
Communication Technologies (ICT) sector. The major issues being
considered by the project include: investigation of the possible
inherent entrepreneurial nature of ICT; how to foster ICT innovation;
and examination of the inherent difficulties currently found within
the ICT industry of Australia in regards to supporting the
development of innovative and creative ideas. The second major
contribution is details of the I.-C.A.N. (Innovation by Collaborative
Anonymous Networking) software application information
management tool created and evolving in our research group. I-CAN,
besides having a positive reinforcement acronym, is aimed at
facilitating productive collaborative innovation in an Australian
workplace. Such a work environment is frequently subjected to
cultural influences such as the 'tall poppy syndrome' and 'negative'
or 'unconstructive' peer-pressure. There influences are frequently
seen as inhibitors to employee participation, entrepreneurship and
innovation.
Abstract: Resource Discovery in Grids is critical for efficient
resource allocation and management. Heterogeneous nature and
dynamic availability of resources make resource discovery a
challenging task. As numbers of nodes are increasing from tens to
thousands, scalability is essentially desired. Peer-to-Peer (P2P)
techniques, on the other hand, provide effective implementation of
scalable services and applications. In this paper we propose a model
for resource discovery in Condor Middleware by using the four axis
framework defined in P2P approach. The proposed model enhances
Condor to incorporate functionality of a P2P system, thus aim to
make Condor more scalable, flexible, reliable and robust.
Abstract: Limited infrastructure development on peats and
organic soils is a serious geotechnical issues common to many
countries of the world especially Malaysia which distributed 1.5 mill
ha of those problematic soil. These soils have high water content and
organic content which exhibit different mechanical properties and
may also change chemically and biologically with time. Constructing
structures on peaty ground involves the risk of ground failure and
extreme settlement. Nowdays, much efforts need to be done in
making peatlands usable for construction due to increased landuse.
Deep mixing method employing cement as binders, is generally used
as measure again peaty/ organic ground failure problem. Where the
technique is widely adopted because it can improved ground
considerably in a short period of time. An understanding of
geotechnical properties as shear strength, stiffness and compressibility
behavior of these soils was requires before continues construction on
it. Therefore, 1- 1.5 meter peat soil sample from states of Johor and
an organic soil from Melaka, Malaysia were investigated. Cement
were added to the soil in the pre-mixing stage with water cement ratio
at range 3.5,7,14,140 for peats and 5,10,30 for organic soils,
essentially to modify the original soil textures and properties. The
mixtures which in slurry form will pour to polyvinyl chloride (pvc)
tube and cured at room temperature 250C for 7,14 and 28 days.
Laboratory experiments were conducted including unconfined
compressive strength and bender element , to monitor the improved
strength and stiffness of the 'stabilised mixed soils'. In between,
scanning electron miscroscopic (SEM) were observations to
investigate changes in microstructures of stabilised soils and to
evaluated hardening effect of a peat and organic soils stabilised
cement. This preliminary effort indicated that pre-mixing peat and
organic soils contributes in gaining soil strength while help the
engineers to establish a new method for those problematic ground
improvement in further practical and long term applications.
Abstract: A reliable estimate of the average bond stress within
the anchorage of steel reinforcing bars in tension is critically
important for the design of reinforced concrete member. This paper
describes part of a recently completed experimental research program
in the Centre for Infrastructure Engineering and Safety (CIES) at the
University of New South Wales, Sydney, Australia aimed at
assessing the effects of different factors on the anchorage
requirements of modern high strength steel reinforcing bars. The
study found that an increase in the anchorage length and bar diameter
generally leads to a reduction of the average ultimate bond stress. By
the extension of a well established analytical model of bond and
anchorage, it is shown here that the differences in the average
ultimate bond stress for different anchorage lengths is associated with
the variable degree of plastic deformation in the tensile zone of the
concrete surrounding the bar.
Abstract: The game of Maundy Block is the three-player variant
of Maundy Cake, a classical combinatorial game. Even though to
determine the solution of Maundy Cake is trivial, solving Maundy
Block is challenging because of the identification of queer games,
i.e., games where no player has a winning strategy.
Abstract: Conventional approaches in the implementation of logic programming applications on embedded systems are solely of software nature. As a consequence, a compiler is needed that transforms the initial declarative logic program to its equivalent procedural one, to be programmed to the microprocessor. This approach increases the complexity of the final implementation and reduces the overall system's performance. On the contrary, presenting hardware implementations which are only capable of supporting logic programs prevents their use in applications where logic programs need to be intertwined with traditional procedural ones, for a specific application. We exploit HW/SW codesign methods to present a microprocessor, capable of supporting hybrid applications using both programming approaches. We take advantage of the close relationship between attribute grammar (AG) evaluation and knowledge engineering methods to present a programmable hardware parser that performs logic derivations and combine it with an extension of a conventional RISC microprocessor that performs the unification process to report the success or failure of those derivations. The extended RISC microprocessor is still capable of executing conventional procedural programs, thus hybrid applications can be implemented. The presented implementation is programmable, supports the execution of hybrid applications, increases the performance of logic derivations (experimental analysis yields an approximate 1000% increase in performance) and reduces the complexity of the final implemented code. The proposed hardware design is supported by a proposed extended C-language called C-AG.
Abstract: The notion of communicative competence has been deemed fuzzy in communication studies. This fuzziness has led to tensions among engineers across tenures in interpreting what constitutes communicative competence. The study seeks to investigate novice and professional engineers- understanding of the said notion in terms of two main elements of communicative competence: linguistic and rhetorical competence. Novice engineers are final year engineering students, whilst professional engineers represent engineers who have at least 5 years working experience. Novice and professional engineers were interviewed to gauge their perceptions on linguistic and rhetorical features deemed necessary to enhance communicative competence for the profession. Both groups indicated awareness and differences on the importance of the sub-sets of communicative competence, namely, rhetorical explanatory competence, linguistic oral immediacy competence, technical competence and meta-cognitive competence. Such differences, a possible attribute of the learning theory, inadvertently indicate sublime differences in the way novice and professional engineers perceive communicative competence.
Abstract: Over the past few years, a number of efforts have
been exerted to build parallel processing systems that utilize the idle
power of LAN-s and PC-s available in many homes and corporations.
The main advantage of these approaches is that they provide cheap
parallel processing environments for those who cannot afford the
expenses of supercomputers and parallel processing hardware.
However, most of the solutions provided are not very flexible in the
use of available resources and very difficult to install and setup.
In this paper, a multi-level web-based parallel processing system
(MWPS) is designed (appendix). MWPS is based on the idea of
volunteer computing, very flexible, easy to setup and easy to use.
MWPS allows three types of subscribers: simple volunteers (single
computers), super volunteers (full networks) and end users. All of
these entities are coordinated transparently through a secure web site.
Volunteer nodes provide the required processing power needed by
the system end users. There is no limit on the number of volunteer
nodes, and accordingly the system can grow indefinitely. Both
volunteer and system users must register and subscribe. Once, they
subscribe, each entity is provided with the appropriate MWPS
components. These components are very easy to install.
Super volunteer nodes are provided with special components that
make it possible to delegate some of the load to their inner nodes.
These inner nodes may also delegate some of the load to some other
lower level inner nodes .... and so on. It is the responsibility of the
parent super nodes to coordinate the delegation process and deliver
the results back to the user.
MWPS uses a simple behavior-based scheduler that takes into
consideration the current load and previous behavior of processing
nodes. Nodes that fulfill their contracts within the expected time get a
high degree of trust. Nodes that fail to satisfy their contract get a
lower degree of trust.
MWPS is based on the .NET framework and provides the minimal
level of security expected in distributed processing environments.
Users and processing nodes are fully authenticated. Communications
and messages between nodes are very secure. The system has been
implemented using C#.
MWPS may be used by any group of people or companies to
establish a parallel processing or grid environment.
Abstract: Multiparty voice over IP (MVoIP) systems allows a group of people to freely communicate each other via the internet, which have many applications such as online gaming, teleconferencing, online stock trading etc. Peertalk is a peer to peer multiparty voice over IP system (MVoIP) which is more feasible than existing approaches such as p2p overlay multicast and coupled distributed processing. Since the stream mixing and distribution are done by the peers, it is vulnerable to major security threats like nodes misbehavior, eavesdropping, Sybil attacks, Denial of Service (DoS), call tampering, Man in the Middle attacks etc. To thwart the security threats, a security framework called PEERTS (PEEred Reputed Trustworthy System for peertalk) is implemented so that efficient and secure communication can be carried out between peers.
Abstract: Virtual engineering technology has undergone rapid progress in recent years and is being adopted increasingly by manufacturing companies of many engineering disciplines. There is an increasing demand from industry for qualified virtual engineers. The qualified virtual engineers should have the ability of applying engineering principles and mechanical design methods within the commercial software package environment. It is a challenge to the engineering education in universities which traditionally tends to lack the integration of knowledge and skills required for solving real world problems. In this paper, a case study shows some recent development of a MSc Mechanical Engineering course at Department of Engineering and Technology in MMU, and in particular, two units Simulation of Mechanical Systems(SMS) and Computer Aided Fatigue Analysis(CAFA) that emphasize virtual engineering education and promote integration of knowledge acquisition, skill training and industrial application.
Abstract: There are many expand of Wi-Fi zones provided
mobile careers and usage of wireless access point at home as increase
of usage of wireless internet caused by the use of smart phone. This
paper shows wireless local area network status, security threats of
WLAN and functionality of major wireless access point in Korea. We
propose security countermeasures concerned with life cycle of access
point from manufacturing to installation, using and finally disposal.
There needed to releasing with configured secure at access point.
Because, it is most cost effective resolution than stage of installation or
other life cycle of access point.
Abstract: In this paper, we consider an iteration process for
approximating common fixed points of two asymptotically quasinonexpansive
mappings and we prove some strong and weak convergence
theorems for such mappings in uniformly convex Banach
spaces.
Abstract: New biostimulator from wheat seeds which by its
chemical composition relates to fusicoccin is presented in this article.
New biostimulator could be used as powerful hormonal substance
that has ability to increase productivity and salt tolerance of
agricultural plants. Also on the basis of biostimulator we have
developed vegetative method for fast reproduction of perennial plants
as desert plant - Tamarix gracilis.