Abstract: Natural frequencies and dynamic response of a spur
gear sector are investigated using a two dimensional finite element
model that offers significant advantages for dynamic gear analyses.
The gear teeth are analyzed for different operating speeds. A primary
feature of this modeling is determination of mesh forces using a
detailed contact analysis for each time step as the gears roll through
the mesh. Transient mode super position method has been used to
find horizontal and vertical components of displacement and
dynamic stress. The finite element analysis software ANSYS has
been used on the proposed model to find the natural frequencies by
Block Lanczos technique and displacements and dynamic stresses by
transient mode super position method. A comparison of theoretical
(natural frequency and static stress) results with the finite element
analysis results has also been done. The effect of rotational speed of
the gears on the dynamic response of gear tooth has been studied and
design limits have been discussed.
Abstract: As the majority of faults are found in a few of its modules so there is a need to investigate the modules that are affected severely as compared to other modules and proper maintenance need to be done on time especially for the critical applications. In this paper, we have explored the different predictor models to NASA-s public domain defect dataset coded in Perl programming language. Different machine learning algorithms belonging to the different learner categories of the WEKA project including Mamdani Based Fuzzy Inference System and Neuro-fuzzy based system have been evaluated for the modeling of maintenance severity or impact of fault severity. The results are recorded in terms of Accuracy, Mean Absolute Error (MAE) and Root Mean Squared Error (RMSE). The results show that Neuro-fuzzy based model provides relatively better prediction accuracy as compared to other models and hence, can be used for the maintenance severity prediction of the software.
Abstract: Problem Statement:Rapid technological developments of the 21st century have advanced our daily lives in various ways. Particularly in education, students frequently utilize technological resources to aid their homework and to access information. listen to radio or watch television (26.9 %) and e-mails (34.2 %) [26]. Not surprisingly, the increase in the use of technologies also resulted in an increase in the use of e-mail, instant messaging, chat rooms, mobile phones, mobile phone cameras and web sites by adolescents to bully peers. As cyber bullying occurs in the cyber space, lesser access to technologies would mean lesser cyber-harm. Therefore, the frequency of technology use is a significant predictor of cyber bullying and cyber victims. Cyber bullies try to harm the victim using various media. These tools include sending derogatory texts via mobile phones, sending threatening e-mails and forwarding confidential emails to everyone on the contacts list. Another way of cyber bullying is to set up a humiliating website and invite others to post comments. In other words, cyber bullies use e-mail, chat rooms, instant messaging, pagers, mobile texts and online voting tools to humiliate and frighten others and to create a sense of helplessness. No matter what type of bullying it is, it negatively affects its victims. Children who bully exhibit more emotional inhibition and attribute themselves more negative self-statements compared to non-bullies. Students whose families are not sympathetic and who receive lower emotional support are more prone to bully their peers. Bullies have authoritarian families and do not get along well with them. The family is the place where the children-s physical, social and psychological needs are satisfied and where their personalities develop. As the use of the internet became prevalent so did parents- restrictions on their children-s internet use. However, parents are unaware of the real harm. Studies that explain the relationship between parental attitudes and cyber bullying are scarce in literature. Thus, this study aims to investigate the relationship between cyber bullying and parental attitudes in the primary school. Purpose of Study: This study aimed to investigate the relationship between cyber bullying and parental attitudes. A second aim was to determine whether parental attitudes could predict cyber bullying and if so which variables could predict it significantly. Methods:The study had a cross-sectional and relational survey model. A demographics information form, questions about cyber bullying and a Parental Attitudes Inventory were conducted with a total of 346 students (189 females and 157 males) registered at various primary schools. Data was analysed by multiple regression analysis using the software package SPSS 16.
Abstract: In this paper the modeling and analysis of Space
Vector Pulse Width Modulation (SVPWM) based Dynamic Voltage
Restorer (DVR) using PSCAD/EMTDC software will be presented in
details. The simulation includes full modeling of the SVPWM
technique used to control the DVR inverter. A test power system
composed of three phase voltage source, sag generator, DVR and
three phase resistive load is used to demonstrate restoration capability
of the DVR. The simulation results of the presented DVR proved
excellent voltage sag mitigation to protect sensitive loads.
Abstract: There are only limited studies that directly correlate
the increase in reinforced concrete (RC) panel structural capacities in
resisting the blast loads with different RC panel structural properties
in terms of blast loading characteristics, RC panel dimensions, steel
reinforcement ratio and concrete material strength. In this paper,
numerical analyses of dynamic response and damage of the one-way
RC panel to blast loads are carried out using the commercial software
LS-DYNA. A series of simulations are performed to predict the blast
response and damage of columns with different level and magnitude
of blast loads. The numerical results are used to develop pressureimpulse
(P-I) diagrams of one-way RC panels. Based on the
numerical results, the empirical formulae are derived to calculate the
pressure and impulse asymptotes of the P-I diagrams of RC panels.
The results presented in this paper can be used to construct P-I
diagrams of RC panels with different concrete and reinforcement
properties. The P-I diagrams are very useful to assess panel capacities
in resisting different blast loads.
Abstract: Malware is software which was invented and meant for doing harms on computers. Malware is becoming a significant threat in computer network nowadays. Malware attack is not just only involving financial lost but it can also cause fatal errors which may cost lives in some cases. As new Internet Protocol version 6 (IPv6) emerged, many people believe this protocol could solve most malware propagation issues due to its broader addressing scheme. As IPv6 is still new compares to native IPv4, some transition mechanisms have been introduced to promote smoother migration. Unfortunately, these transition mechanisms allow some malwares to propagate its attack from IPv4 to IPv6 network environment. In this paper, a proof of concept shall be presented in order to show that some existing IPv4 malware detection technique need to be improvised in order to detect malware attack in dual-stack network more efficiently. A testbed of dual-stack network environment has been deployed and some genuine malware have been released to observe their behaviors. The results between these different scenarios will be analyzed and discussed further in term of their behaviors and propagation methods. The results show that malware behave differently on IPv6 from the IPv4 network protocol on the dual-stack network environment. A new detection technique is called for in order to cater this problem in the near future.
Abstract: Although achieving zero-defect software release is
practically impossible, software industries should take maximum
care to detect defects/bugs well ahead in time allowing only bare
minimums to creep into released version. This is a clear indicator of
time playing an important role in the bug detection. In addition to
this, software quality is the major factor in software engineering
process. Moreover, early detection can be achieved only through
static code analysis as opposed to conventional testing.
BugCatcher.Net is a static analysis tool, which detects bugs in .NET®
languages through MSIL (Microsoft Intermediate Language)
inspection. The tool utilizes a Parser based on Finite State Automata
to carry out bug detection. After being detected, bugs need to be
corrected immediately. BugCatcher.Net facilitates correction, by
proposing a corrective solution for reported warnings/bugs to end
users with minimum side effects. Moreover, the tool is also capable
of analyzing the bug trend of a program under inspection.
Abstract: CFlow is a flow chart software, it contains facilities to
draw and evaluate a flow chart. A flow chart evaluation applies a
simulation method to enable presentation of work flow in a flow
chart solution. Flow chart simulation of CFlow is executed by
manipulating the CFlow data file which is saved in a graphical vector
format. These text-based data are organised by using a data
classification technic based on a Library classification-scheme. This
paper describes the file format for flow chart simulation software of
CFlow.
Abstract: In the present paper, we-ll explore how social media tools provide an opportunity for new developments of the e-Learning in the context of managing personal knowledge. There will be a discussion how social media tools provide a possibility for helping knowledge workersand students to gather, organize and manage their personal information as a part of the e-learning process. At the centre of this social software driven approach to e-learning environments are the challenges of personalization and collaboration. We-ll share concepts of how organizations are using social media for e-Learning and believe that integration of these tools into traditional e-Learning is probably not a choice, but inevitability. Students- Survey of use of web technologies and social networking tools is presented. Newly developed framework for semantic blogging capable of organizing results relevant to user requirements is implemented at Varna Free University (VFU) to provide more effective navigation and search.
Abstract: Security is an interesting and significance issue for
popular virtual platforms, such as virtualization cluster and cloud
platforms. Virtualization is the powerful technology for cloud
computing services, there are a lot of benefits by using virtual machine
tools which be called hypervisors, such as it can quickly deploy all
kinds of virtual Operating Systems in single platform, able to control
all virtual system resources effectively, cost down for system platform
deployment, ability of customization, high elasticity and high
reliability. However, some important security problems need to take
care and resolved in virtual platforms that include terrible viruses, evil
programs, illegal operations and intrusion behavior. In this paper, we
present useful Intrusion Detection Mechanism (IDM) software that not
only can auto to analyze all system-s operations with the accounting
journal database, but also is able to monitor the system-s state for
virtual platforms.
Abstract: Identifying and classifying intersections according to
severity is very important for implementation of safety related
counter measures and effective models are needed to compare and
assess the severity. Highway safety organizations have considered
intersection safety among their priorities. In spite of significant
advances in highways safety, the large numbers of crashes with high
severities still occur in the highways. Investigation of influential
factors on crashes enables engineers to carry out calculations in order
to reduce crash severity. Previous studies lacked a model capable of
simultaneous illustration of the influence of human factors, road,
vehicle, weather conditions and traffic features including traffic
volume and flow speed on the crash severity. Thus, this paper is
aimed at developing the models to illustrate the simultaneous
influence of these variables on the crash severity in urban highways.
The models represented in this study have been developed using
binary Logit Models. SPSS software has been used to calibrate the
models. It must be mentioned that backward regression method in
SPSS was used to identify the significant variables in the model.
Consider to obtained results it can be concluded that the main
factor in increasing of crash severity in urban highways are driver
age, movement with reverse gear, technical defect of the vehicle,
vehicle collision with motorcycle and bicycle, bridge, frontal impact
collisions, frontal-lateral collisions and multi-vehicle crashes in
urban highways which always increase the crash severity in urban
highways.
Abstract: This paper deals with behavior and capacity of
punching shear force for flat slabs produced from steel fiber
reinforced self compacting concrete (SFRSCC) by application
nonlinear finite element method. Nonlinear finite element analysis on
nine slab specimens was achieved by using ANSYS software. A
general description of the finite element method, theoretical modeling
of concrete and reinforcement are presented. The nonlinear finite
element analysis program ANSYS is utilized owing to its capabilities
to predict either the response of reinforced concrete slabs in the post
elastic range or the ultimate strength of a flat slabs produced from
steel fiber reinforced self compacting concrete (SFRSCC). In order to
verify the analytical model used in this research using test results of
the experimental data, the finite element analysis were performed
then a parametric study of the effect ratio of flexural reinforcement,
ratio of the upper reinforcement, and volume fraction of steel fibers
were investigated. A comparison between the experimental results
and those predicted by the existing models are presented. Results and
conclusions may be useful for designers, have been raised, and
represented.
Abstract: In this paper, numerical simulation is used to
investigate the thermal performance of liquid cooling heatsink with
microchannels due to geometric arrangement. Commercial software
ICEPAK is utilized for the analysis. The considered parameters
include aspect ratio, porosity and the length and height of
microchannel. The aspect ratio varies from 3 to 16 and the length of
microchannel is 10mm, 14mm, and 18mm. The height of
microchannel is 2mm, 3mm and 4mm. It is found short channel have
better thermal efficiency than long channel at 490Pa. No matter the
length of channel the best aspect ratio is 4. It is also noted that pressure
difference at 2940Pa the best aspect ratio from 4 to 8, it means pressure
difference affect aspect ratio, effective thermal resistance at low
pressure difference but lower effective thermal resistance at high
pressure difference.
Abstract: The paper compares different channel models used for
modeling Broadband Power-Line Communication (BPLC) system.
The models compared are Zimmermann and Dostert, Philipps,
Anatory et al and Anatory et al generalized Transmission Line (TL)
model. The validity of each model was compared in time domain
with ATP-EMTP software which uses transmission line approach. It
is found that for a power-line network with minimum number of
branches all the models give similar signal/pulse time responses
compared with ATP-EMTP software; however, Zimmermann and
Dostert model indicates the same amplitude but different time delay.
It is observed that when the numbers of branches are increased only
generalized TL theory approach results are comparable with ATPEMTP
results. Also the Multi-Carrier Spread Spectrum (MC-SS)
system was applied to check the implication of such behavior on the
modulation schemes. It is observed that using Philipps on the
underground cable can predict the performance up to 25dB better
than other channel models which can misread the actual performance
of the system. Also modified Zimmermann and Dostert under
multipath can predict a better performance of about 5dB better than
the actual predicted by Generalized TL theory. It is therefore
suggested for a realistic BPLC system design and analyses the model
based on generalized TL theory be used.
Abstract: The demand on High voltage (HV) infrastructures is growing due to the corresponding growth in industries and population. Many areas are being developed and therefore require additional electrical power to comply with the demand. Substation upgrade is one of the rapid solutions to ensure the continuous supply of power to customers. This upgrade requires civil modifications to structures and fences. The civil work requires excavation and steel works that may create unsafe touch conditions. This paper presents a brief theoretical overview of the touch voltage inside and around substations and uses CDEGS software to simulate a case study.
Abstract: Clean air in subway station is important to passengers. The Platform Screen Doors (PSDs) can improve indoor air quality in the subway station; however the air quality in the subway tunnel is degraded. The subway tunnel has high CO2 concentration and indoor particulate matter (PM) value. The Indoor Air Quality (IAQ) level in subway environment degrades by increasing the frequency of the train operation and the number of the train. The ventilation systems of the subway tunnel need improvements to have better air-quality. Numerical analyses might be effective tools to analyze the performance of subway twin-track tunnel ventilation systems. An existing subway twin-track tunnel in the metropolitan Seoul subway system is chosen for the numerical simulations. The ANSYS CFX software is used for unsteady computations of the airflow inside the twin-track tunnel when the train moves. The airflow inside the tunnel is simulated when one train runs and two trains run at the same time in the tunnel. The piston-effect inside the tunnel is analyzed when all shafts function as the natural ventilation shaft. The supplied air through the shafts is mixed with the pollutant air in the tunnel. The pollutant air is exhausted by the mechanical ventilation shafts. The supplied and discharged airs are balanced when only one train runs in the twin-track tunnel. The pollutant air in the tunnel is high when two trains run simultaneously in opposite direction and all shafts functioned as the natural shaft cases when there are no electrical power supplies in the shafts. The remained pollutant air inside the tunnel enters into the station platform when the doors are opened.
Abstract: Localized surface plasmon resonance (LSPR) is the
coherent oscillation of conductive electrons confined in noble
metallic nanoparticles excited by electromagnetic radiation, and
nanosphere lithography (NSL) is one of the cost-effective methods to
fabricate metal nanostructures for LSPR. NSL can be categorized
into two major groups: dispersed NSL and closely pack NSL. In
recent years, gold nanocrescents and gold nanoholes with vertical
sidewalls fabricated by dispersed NSL, and silver nanotriangles and
gold nanocaps on silica nanospheres fabricated by closely pack NSL,
have been reported for LSPR biosensing. This paper introduces
several novel gold nanostructures fabricated by NSL in LSPR
applications, including 3D nanostructures obtained by evaporating
gold obliquely on dispersed nanospheres, nanoholes with slant
sidewalls, and patchy nanoparticles on closely packed nanospheres,
all of which render satisfactory sensitivity for LSPR sensing. Since
the LSPR spectrum is very sensitive to the shape of the metal
nanostructures, formulas are derived and software is developed for
calculating the profiles of the obtainable metal nanostructures by
NSL, for different nanosphere masks with different fabrication
conditions. The simulated profiles coincide well with the profiles of
the fabricated gold nanostructures observed under scanning electron
microscope (SEM) and atomic force microscope (AFM), which
proves that the software is a useful tool for the process design of
different LSPR nanostructures.
Abstract: Importance of software quality is increasing leading to development of new sophisticated techniques, which can be used in constructing models for predicting quality attributes. One such technique is Artificial Neural Network (ANN). This paper examined the application of ANN for software quality prediction using Object- Oriented (OO) metrics. Quality estimation includes estimating maintainability of software. The dependent variable in our study was maintenance effort. The independent variables were principal components of eight OO metrics. The results showed that the Mean Absolute Relative Error (MARE) was 0.265 of ANN model. Thus we found that ANN method was useful in constructing software quality model.
Abstract: Several models have been introduced so far for single
electron box, SEB, which all of them were restricted to DC response
and or low temperature limit. In this paper we introduce a new time
dependent, high temperature analytical model for SEB for the first
time. DC behavior of the introduced model will be verified against
SIMON software and its time behavior will be verified against a
newly published paper regarding step response of SEB.
Abstract: This paper is a survey of current component-based
software technologies and the description of promotion and
inhibition factors in CBSE. The features that software components
inherit are also discussed. Quality Assurance issues in componentbased
software are also catered to. The feat research on the quality
model of component based system starts with the study of what the
components are, CBSE, its development life cycle and the pro &
cons of CBSE. Various attributes are studied and compared keeping
in view the study of various existing models for general systems and
CBS. When illustrating the quality of a software component an apt
set of quality attributes for the description of the system (or
components) should be selected. Finally, the research issues that can
be extended are tabularized.