Abstract: In order to calculate the flexural strength of
normal-strength concrete (NSC) beams, the nonlinear actual concrete
stress distribution within the compression zone is normally replaced
by an equivalent rectangular stress block, with two coefficients of α
and β to regulate the intensity and depth of the equivalent stress
respectively. For NSC beams design, α and β are usually assumed
constant as 0.85 and 0.80 in reinforced concrete (RC) codes. From an
earlier investigation of the authors, α is not a constant but significantly
affected by flexural strain gradient, and increases with the increasing
of strain gradient till a maximum value. It indicates that larger
concrete stress can be developed in flexure than that stipulated by
design codes. As an extension and application of the authors- previous
study, the modified equivalent concrete stress block is used here to
produce a series of design charts showing the maximum design limits
of flexural strength and ductility of singly- and doubly- NSC beams,
through which both strength and ductility design limits are improved
by taking into account strain gradient effect.
Abstract: In this paper we introduce the notion of protein interaction
network. This is a graph whose vertices are the protein-s
amino acids and whose edges are the interactions between them.
Using a graph theory approach, we identify a number of properties of
these networks. We compare them to the general small-world network
model and we analyze their hierarchical structure.
Abstract: In this paper, we focus on the problem of driving and
herding a collection of autonomous actors to a given area. Then, a
new method based on multi-agent coordination is proposed for
solving the problem.
In our proposed method, we assume that the environment is
covered by sensors. When an event is occurred, sensors forward
information to a sink node. Based on received information, the sink
node will estimate the direction and the speed of movement of actors
and announce the obtained value to the actors. The actors coordinate
to reach the target location.
Abstract: Solar water heating (SWH) systems are gaining popularity in ASEAN in the midst of increasing number of affluent population in society and environmental concerns from seemingly unchanged reliance on fossil-based fuels. The penetration of these systems and technologies into ASEAN markets is a welcome development; however there is a need for the method of assessment of their thermal performances. This paper discusses the reasons for this need and a suitable method for thermal performance evaluation of SWH systems in ASEAN. The paper also calls on research to be focused on the establishment of reliable data to be entered into the performance rating software. The establishment of accredited solar systems testing facilities can help boost the competitiveness of ASEAN solar industry.
Abstract: This paper identifies five key design characteristics of
production scheduling software systems in printed circuit board (PCB) manufacturing. The authors consider that, in addition to an effective scheduling engine, a scheduling system should be able to
process a preventative maintenance calendar, to give the user the
flexibility to handle data using a variety of electronic sources, to run
simulations to support decision-making, and to have simple and
customisable graphical user interfaces. These design considerations
were the result of a review of academic literature, the evaluation of
commercial applications and a compilation of requirements of a PCB manufacturer. It was found that, from those systems that were evaluated, those that effectively addressed all five characteristics
outlined in this paper were the most robust of all and could be used in
PCB manufacturing.
Abstract: In this paper, a clustering algorithm named KHarmonic
means (KHM) was employed in the training of Radial
Basis Function Networks (RBFNs). KHM organized the data in
clusters and determined the centres of the basis function. The popular
clustering algorithms, namely K-means (KM) and Fuzzy c-means
(FCM), are highly dependent on the initial identification of elements
that represent the cluster well. In KHM, the problem can be avoided.
This leads to improvement in the classification performance when
compared to other clustering algorithms. A comparison of the
classification accuracy was performed between KM, FCM and KHM.
The classification performance is based on the benchmark data sets:
Iris Plant, Diabetes and Breast Cancer. RBFN training with the KHM
algorithm shows better accuracy in classification problem.
Abstract: We consider the development of an eight order Adam-s
type method, with A-stability property discussed by expressing them
as a one-step method in higher dimension. This makes it suitable
for solving variety of initial-value problems. The main method and
additional methods are obtained from the same continuous scheme
derived via interpolation and collocation procedures. The methods
are then applied in block form as simultaneous numerical integrators
over non-overlapping intervals. Numerical results obtained using the
proposed block form reveals that it is highly competitive with existing
methods in the literature.
Abstract: There has been a growing interest in the field of
bio-mimetic robots that resemble the shape of an insect or an aquatic
animal, among many others. One bio-mimetic robot serves the
purpose of exploring pipelines, spotting any troubled areas or
malfunctions and reporting its data. Moreover, the robot is able to
prepare for and react to any abnormal routes in the pipeline. In order
to move effectively inside a pipeline, the robot-s movement will
resemble that of a lizard. When situated in massive pipelines with
complex routes, the robot places fixed sensors in several important
spots in order to complete its monitoring. This monitoring task is to
prevent a major system failure by preemptively recognizing any minor
or partial malfunctions. Areas uncovered by fixed sensors are usually
impossible to provide real-time observation and examination, and thus
are dependant on periodical offline monitoring. This paper provides
the Monitoring System that is able to monitor the entire area of
pipelines–with and without fixed sensors–by using the bio-mimetic
robot.
Abstract: Application of wood in rural construction is diffused
all around the world since remote times. However, its inclusion in
structural design deserves strong support from broad knowledge of
material properties. The pertinent literature reveals the application of
optical methods in determining the complete field displacement on
bodies exhibiting regular as well as irregular surfaces. The use of
moiré techniques in experimental mechanics consists in analyzing the
patterns generated on the body surface before and after deformation.
The objective of this research work is to study the qualitative
deformation behavior of wooden testing specimens under specific
loading situations. The experiment setup follows the literature
description of shadow moiré methods. Results indicate strong
anisotropy influence of the generated displacement field. Important
qualitative as well as quantitative stress and strain distribution were
obtained wooden members which are applicable to rural
constructions.
Abstract: The spin (ms) and orbital (mo) magnetic moment of
the antiferromagnetic NiO and MnO have been studied in the local
spin density approximation (LSDA+U) within full potential linear
muffin-tin orbital (FP-LMTO method with in the coulomb interaction
U varying from 0 to 10eV, exchange interaction J, from 0 to 1.0eV,
and volume compression VC in range of 0 to 80%. Our calculated
results shown that the spin magnetic moments and the orbital
magnetic moments increase linearly with increasing U and J. While
the interesting behaviour appears when volume compression is
greater than 70% for NiO and 50% for MnO at which ms collapses.
Further increase of volume compression to be at 80% leads to the
disappearance of both magnetic moments.
Abstract: De novo genome assembly is always fragmented. Assembly fragmentation is more serious using the popular next generation sequencing (NGS) data because NGS sequences are shorter than the traditional Sanger sequences. As the data throughput of NGS is high, the fragmentations in assemblies are usually not the result of missing data. On the contrary, the assembled sequences, called contigs, are often connected to more than one other contigs in a complicated manner, leading to the fragmentations. False connections in such complicated connections between contigs, named a contig graph, are inevitable because of repeats and sequencing/assembly errors. Simplifying a contig graph by removing false connections directly improves genome assembly. In this work, we have developed a tool, SIMGraph, to resolve ambiguous connections between contigs using NGS data. Applying SIMGraph to the assembly of a fungus and a fish genome, we resolved 27.6% and 60.3% ambiguous contig connections, respectively. These results can reduce the experimental efforts in resolving contig connections.
Abstract: Construction of tunnels is connected with high
uncertainty in the field of costs, construction period, safety and
impact on surroundings. Risk management became therefore a
common part of tunnel projects, especially after a set of fatal
collapses occurred in 1990's. Such collapses are caused usually by
combination of factors that can be divided into three main groups, i.e.
unfavourable geological conditions, failures in the design and
planning or failures in the execution.
This paper suggests a procedure enabling quantification of the
excavation risk related to extraordinary accidents using FTA and
ETA tools. It will elaborate on a common process of risk analysis and
enable the transfer of information and experience between particular
tunnel construction projects. Further, it gives a guide for designers,
management and other participants, how to deal with risk of such
accidents and how to make qualified decisions based on a
probabilistic approach.
Abstract: In this work, we experimentally study heat transfer
from exhaust particulate air of detergent spray drying tower to water
by using coiled tube heat exchanger. Water flows in the coiled
tubes, where air loaded with detergent particles of 43 micrometers
in diameter flows within the shell. Four coiled tubes with different
coil pitches are used in a counter-current flow configuration. We
investigate heat transfer coefficients of inside and outside the heat
transfer surfaces through 400 experiments. The correlations between
Nusselt number and Reynolds number, Prandtl number, mass flow
rate of particulates to mass flow rate of air ratio and coiled tube
pitch parameter are proposed. The correlations procured can be used
to predicted heat transfer between tube and shell of the heat
exchanger.
Abstract: Short circuit currents plays a vital role in influencing the design and operation of equipment and power system and could not be avoided despite careful planning and design, good maintenance and thorough operation of the system. This paper discusses the short circuit analysis conducted in KSO briefly comprising of its significances, methods and results. A result sample of the analysis based on a single transformer is detailed in this paper. Furthermore, the results of the analysis and its significances were also discussed and commented.
Abstract: Phase locked loops for data links operating at 10 Gb/s
or faster are low phase noise devices designed to operate with a low
jitter reference clock. Characterization of their jitter transfer function
is difficult because the intrinsic noise of the device is comparable to
the random noise level in the reference clock signal. A linear model
is proposed to account for the intrinsic noise of a PLL. The intrinsic
noise data of a PLL for 10 Gb/s links is presented. The jitter transfer
function of a PLL in a test chip for 12.8 Gb/s data links was
determined in experiments using the 400 MHz reference clock as the
source of simultaneous excitations over a wide range of frequency.
The result shows that the PLL jitter transfer function can be
approximated by a second order linear model.
Abstract: With the advantage of wireless network technology,
there are a variety of mobile applications which make the issue of
wireless sensor networks as a popular research area in recent years.
As the wireless sensor network nodes move arbitrarily with the
topology fast change feature, mobile nodes are often confronted with
the void issue which will initiate packet losing, retransmitting,
rerouting, additional transmission cost and power consumption.
When transmitting packets, we would not predict void problem
occurring in advance. Thus, how to improve geographic routing with
void avoidance in wireless networks becomes an important issue. In
this paper, we proposed a greedy geographical void routing algorithm
to solve the void problem for wireless sensor networks. We use the
information of source node and void area to draw two tangents to
form a fan range of the existence void which can announce voidavoiding
message. Then we use source and destination nodes to draw
a line with an angle of the fan range to select the next forwarding
neighbor node for routing. In a dynamic wireless sensor network
environment, the proposed greedy void avoiding algorithm can be
more time-saving and more efficient to forward packets, and improve
current geographical void problem of wireless sensor networks.
Abstract: This paper undertakes the problem of optimal
capacitor placement in a distribution system. The problem is how to
optimally determine the locations to install capacitors, the types and
sizes of capacitors to he installed and, during each load level,the
control settings of these capacitors in order that a desired objective
function is minimized while the load constraints,network constraints
and operational constraints (e.g. voltage profile) at different load
levels are satisfied. The problem is formulated as a combinatorial
optimization problem with a nondifferentiable objective function.
Four solution mythologies based on algorithms (GA),tabu search
(TS), and hybrid GA-SA algorithms are presented.The solution
methodologies are preceded by a sensitivity analysis to select the
candidate capacitor installation locations.
Abstract: This paper presents an idea to improve the efficiency
of security checks in airports through the active tracking and
monitoring of passengers and staff using OFDM modulation
technique and Finger print authentication. The details of the
passenger are multiplexed using OFDM .To authenticate the
passenger, the fingerprint along with important identification
information is collected. The details of the passenger can be
transmitted after necessary modulation, and received using various
transceivers placed within the premises of the airport, and checked at
the appropriate check points, thereby increasing the efficiency of
checking. OFDM has been employed for spectral efficiency.
Abstract: This research focuses on the use of a recommender
system in decision support by means of a used car dealer case study
in Bangkok Metropolitan. The goal is to develop an effective used car
purchasing system for dealers based on the above premise. The
underlying principle rests on content-based recommendation from a
set of usability surveys. A prototype was developed to conduct
buyers- survey selected from 5 experts and 95 general public. The
responses were analyzed to determine the mean and standard
deviation of buyers- preference. The results revealed that both groups
were in favor of using the proposed system to assist their buying
decision. This indicates that the proposed system is meritorious to
used car dealers.
Abstract: In today-s competitive environment, the security concerns have grown tremendously. In the modern world, possession is known to be 9/10-ths of the law. Hence, it is imperative for one to be able to safeguard one-s property from worldly harms such as thefts, destruction of property, people with malicious intent etc. Due to the advent of technology in the modern world, the methodologies used by thieves and robbers for stealing have been improving exponentially. Therefore, it is necessary for the surveillance techniques to also improve with the changing world. With the improvement in mass media and various forms of communication, it is now possible to monitor and control the environment to the advantage of the owners of the property. The latest technologies used in the fight against thefts and destruction are the video surveillance and monitoring. By using the technologies, it is possible to monitor and capture every inch and second of the area in interest. However, so far the technologies used are passive in nature, i.e., the monitoring systems only help in detecting the crime but do not actively participate in stopping or curbing the crime while it takes place. Therefore, we have developed a methodology to detect the motion in a video stream environment and this is an idea to ensure that the monitoring systems not only actively participate in stopping the crime, but do so while the crime is taking place. Hence, a system is used to detect any motion in a live streaming video and once motion has been detected in the live stream, the software will activate a warning system and capture the live streaming video.