A New Vision of Fractal Geometry with Triangulati on Algorithm

L-system is a tool commonly used for modeling and simulating the growth of fractal plants. The aim of this paper is to join some problems of the computational geometry with the fractal geometry by using the L-system technique to generate fractal plant in 3D. L-system constructs the fractal structure by applying rewriting rules sequentially and this technique depends on recursion process with large number of iterations to get different shapes of 3D fractal plants. Instead, it was reiterated a specific number of iterations up to three iterations. The vertices generated from the last stage of the Lsystem rewriting process are used as input to the triangulation algorithm to construct the triangulation shape of these vertices. The resulting shapes can be used as covers for the architectural objects and in different computer graphics fields. The paper presents a gallery of triangulation forms which application in architecture creates an alternative for domes and other traditional types of roofs.

Assessing Nutrient Concentration and Trophic Status of Brahma Sarover at Kurukshetra, India

Eutrophication of surface water is one of the most widespread environmental problems at present. Large number of pilgrims and tourists visit sacred artificial tank known as “Brahma Sarover” located at Kurukshetra, India to take holy dip and perform religious ceremonies. The sources of pollutants include impurities in feed water, mass bathing, religious offerings and windblown particulate matter. Studies so far have focused mainly on assessing water quality for bathing purpose by using physico-chemical and bacteriological parameters. No effort has been made to assess nutrient concentration and trophic status of the tank to take more appropriate measures for improving water quality on long term basis. In the present study, total nitrogen, total phosphorous and chlorophyll a measurements have been done to assess the nutrient level and trophic status of the tank. The results show presence of high concentration of nutrients and Chlorophyll a indicating mesotrophic and eutrophic state of the tank. Phosphorous has been observed as limiting nutrient in the tank water.

Verification and Validation for Java Classes using Design by Contract. The Modular External Approach

Since the conception of JML, many tools, applications and implementations have been done. In this context, the users or developers who want to use JML seem surounded by many of these tools, applications and so on. Looking for a common infrastructure and an independent language to provide a bridge between these tools and JML, we developed an approach to embedded contracts in XML for Java: XJML. This approach offer us the ability to separate preconditions, posconditions and class invariants using JML and XML, so we made a front-end which can process Runtime Assertion Checking, Extended Static Checking and Full Static Program Verification. Besides, the capabilities for this front-end can be extended and easily implemented thanks to XML. We believe that XJML is an easy way to start the building of a Graphic User Interface delivering in this way a friendly and IDE independency to developers community wich want to work with JML.

On-Line Geometrical Identification of Reconfigurable Machine Tool using Virtual Machining

One of the main research directions in CAD/CAM machining area is the reducing of machining time. The feedrate scheduling is one of the advanced techniques that allows keeping constant the uncut chip area and as sequel to keep constant the main cutting force. They are two main ways for feedrate optimization. The first consists in the cutting force monitoring, which presumes to use complex equipment for the force measurement and after this, to set the feedrate regarding the cutting force variation. The second way is to optimize the feedrate by keeping constant the material removal rate regarding the cutting conditions. In this paper there is proposed a new approach using an extended database that replaces the system model. The feedrate scheduling is determined based on the identification of the reconfigurable machine tool, and the feed value determination regarding the uncut chip section area, the contact length between tool and blank and also regarding the geometrical roughness. The first stage consists in the blank and tool monitoring for the determination of actual profiles. The next stage is the determination of programmed tool path that allows obtaining the piece target profile. The graphic representation environment models the tool and blank regions and, after this, the tool model is positioned regarding the blank model according to the programmed tool path. For each of these positions the geometrical roughness value, the uncut chip area and the contact length between tool and blank are calculated. Each of these parameters are compared with the admissible values and according to the result the feed value is established. We can consider that this approach has the following advantages: in case of complex cutting processes the prediction of cutting force is possible; there is considered the real cutting profile which has deviations from the theoretical profile; the blank-tool contact length limitation is possible; it is possible to correct the programmed tool path so that the target profile can be obtained. Applying this method, there are obtained data sets which allow the feedrate scheduling so that the uncut chip area is constant and, as a result, the cutting force is constant, which allows to use more efficiently the machine tool and to obtain the reduction of machining time.

Integrated Method for Detection of Unknown Steganographic Content

This article concerns the presentation of an integrated method for detection of steganographic content embedded by new unknown programs. The method is based on data mining and aggregated hypothesis testing. The article contains the theoretical basics used to deploy the proposed detection system and the description of improvement proposed for the basic system idea. Further main results of experiments and implementation details are collected and described. Finally example results of the tests are presented.

Validation of an EEG Classification Procedure Aimed at Physiological Interpretation

One approach to assess neural networks underlying the cognitive processes is to study Electroencephalography (EEG). It is relevant to detect various mental states and characterize the physiological changes that help to discriminate two situations. That is why an EEG (amplitude, synchrony) classification procedure is described, validated. The two situations are "eyes closed" and "eyes opened" in order to study the "alpha blocking response" phenomenon in the occipital area. The good classification rate between the two situations is 92.1 % (SD = 3.5%) The spatial distribution of a part of amplitude features that helps to discriminate the two situations are located in the occipital regions that permit to validate the localization method. Moreover amplitude features in frontal areas, "short distant" synchrony in frontal areas and "long distant" synchrony between frontal and occipital area also help to discriminate between the two situations. This procedure will be used for mental fatigue detection.

Thermal Analysis of a Sliding Electric Contact System Using Finite Element Method

In this paper a three dimensional thermal model of a sliding contact system is proposed for both steady-state or transient conditions. The influence of contact force, electric current and ambient temperature on the temperature distribution, has been investigated. A thermal analysis of the different type of the graphite material of fixed electric contact and its influence on contact system temperature rise, has been performed. To validate the three dimensional thermal model, some experimental tests have been done. There is a good correlation between experimental and simulation results.

Dynamic Window Secured Implicit Geographic Forwarding Routing for Wireless Sensor Network

Routing security is a major concerned in Wireless Sensor Network since a large scale of unattended nodes is deployed in ad hoc fashion with no possibility of a global addressing due to a limitation of node-s memory and the node have to be self organizing when the systems require a connection with the other nodes. It becomes more challenging when the nodes have to act as the router and tightly constrained on energy and computational capabilities where any existing security mechanisms are not allowed to be fitted directly. These reasons thus increasing vulnerabilities to the network layer particularly and to the whole network, generally. In this paper, a Dynamic Window Secured Implicit Geographic Forwarding (DWSIGF) routing is presented where a dynamic time is used for collection window to collect Clear to Send (CTS) control packet in order to find an appropriate hoping node. The DWIGF is expected to minimize a chance to select an attacker as the hoping node that caused by a blackhole attack that happen because of the CTS rushing attack, which promise a good network performance with high packet delivery ratios.

Evaluation of an Offshore Wind Power Project: Economic, Strategic and Environmental Value

The use of wind energy for electricity generation is growing rapidly across the world and in Portugal. However, the geographical characteristics of the country along with the average wind regime and with the environmental restrictions imposed to these projects create limitations to the exploit of the onshore wind resource. The best onshore wind spots are already committed and the possibility of offshore wind farms in the Portuguese cost is now being considered. This paper aims to make a contribution to the evaluation of offshore wind power projects in Portugal. The technical restrictions are addressed and the strategic, environmental and financial interest of the project is analysed from the private company and public points of view. The results suggest that additional support schemes are required to ensure private investors interest for these projects. Assuming an approach of direct substitution of energy sources for electricity generation, the avoided CO2 equivalent emissions for an offshore wind power project were quantified. Based on the conclusions, future research is proposed to address the environmental and social impacts of these projects.

Vulnerability Assessment of Blida City

The seismic vulnerability of an urban area is of a great deal for local authorities especially those facing earthquakes. So, it is important to have an efficient tool to assess the vulnerability of existing buildings. The use of the VIP (Vulnerability Index Program) and the GIS (Geographic Information System) let us to identify the most vulnerable districts of an urban area. The use of the vulnerability index method lets us to assess the vulnerability of the center town of Blida (Algeria) which is a historical town and which has grown enormously during the last decades. In this method, three levels of vulnerability are defined. The GIS has been used to build a data base in order to perform different thematic analyses. These analyses show the seismic vulnerability of Blida.

Assessment of Vulnerability and Risk of Taijiang Coastal Areas to Climatic Changes

This study aims to assess the vulnerability and risk of the coastal areas of Taijiang to abnormal oceanographic phenomena. In addition, this study aims to investigate and collect data regarding the disaster losses, land utilization, and other social, economic, and environmental issues in these coastal areas to construct a coastal vulnerability and risk map based on the obtained climate-change risk assessment results. Considering the indexes of the three coastal vulnerability dimensions, namely, man-made facilities, environmental geography, and social economy, this study adopted the equal weighting process and Analytic Hierarchy Process to analyze the vulnerability of these coastal areas to disasters caused by climatic changes. Among the areas with high coastal vulnerability to climatic changes, three towns had the highest coastal vulnerability and four had the highest relative vulnerability. Areas with lower disaster risks were found to be increasingly vulnerable to disasters caused by climatic changes as time progresses.

Authenticated Mobile Device Proxy Service

In the current study we present a system that is capable to deliver proxy based differentiated service. It will help the carrier service node to sell a prepaid service to clients and limit the use to a particular mobile device or devices for a certain time. The system includes software and hardware architecture for a mobile device with moderate computational power, and a secure protocol for communication between it and its carrier service node. On the carrier service node a proxy runs on a centralized server to be capable of implementing cryptographic algorithms, while the mobile device contains a simple embedded processor capable of executing simple algorithms. One prerequisite is needed for the system to run efficiently that is a presence of Global Trusted Verification Authority (GTVA) which is equivalent to certifying authority in IP networks. This system appears to be of great interest for many commercial transactions, business to business electronic and mobile commerce, and military applications.

Optimal SSSC Placement to ATC Enhancing in Power Systems

This paper reviews the optimization available transmission capability (ATC) of power systems using a device of FACTS named SSSC equipped with energy storage devices. So that, emplacement and improvement of parameters of SSSC will be illustrated. Thus, voltage magnitude constraints of network buses, line transient stability constraints and voltage breakdown constraints are considered. To help the calculations, a comprehensive program in DELPHI is provided, which is able to simulate and trace the parameters of SSSC has been installed on a specific line. Furthermore, the provided program is able to compute ATC, TTC and maximum value of their enhancement after using SSSC.

The Establishment of Cause-System of Poor Construction Site Safety and Priority Analysis from Different Perspectives

Construction site safety in China has aroused comprehensive concern all over the world. It is imperative to investigate the main causes of poor construction site safety. This paper divides all the causes into four aspects, namely the factors of workers, object, environment and management and sets up the accident causes element system based on Delphi Method. This is followed by the application of structural equation modeling to examine the importance of each aspect of causes from the standpoints of different roles related to the construction respectively. The results indicate that all the four aspects of factors are in need of improvement, and different roles have different ideas considering the priority of those factors. The paper has instructive significance for the practitioners to take measures to improve construction site safety in China accordingly.

Graphic Watermarking, Security Feature in Cadastral Content Management

The paper shows the necessity to increase the security level for paper management in the cadastral field by using specific graphical watermarks. Using the graphical watermarking will increase the security in the cadastral content management; furthermore any altered document will be validated afterwards of its originality by checking the graphic watermark. If, by any reasons the document is changed for counterfeiting, it is invalidated and found that is an illegal copy due to the graphic check of the watermarking, check made at pixel level

Effect of Tonilisat and Roemin W2 Supplementations on the Performance of Lambs

A thirty Rahmani weaned male lambs of average body weight (27.28±1.40 kg) were randomly allotted to three similar groups, ten lambs in each, to study the benefit of commercial feed additives Tonilisat (Saccharomyces cerevisiae) and Roemin W2 (Lactobacillus acidophilus, Lactobacillus thermophilus, Bifidobacterium and Lactose) as growth promoters on lambs performance, digestibility, rumen activity and some blood constituents. The experiment lasted about 107 days. Three experimental groups were allotted as control group: received the basal ration, T1 group: received the basal ration supplemented with Tonilisat as (0.5kg/ ton concentrate feed mixture) and T2 group: received the basal ration supplemented with Roemin W2 (1kg/ ton concentrate feed mixture). Our study revealed that addition of Tonilisat significantly increased digestion coefficient of crude protein than that of the control group, Furthermore, the supplementation of Tonilisat or Roemin W2 increased (p

Dynamic-Stochastic Influence Diagrams: Integrating Time-Slices IDs and Discrete Event Systems Modeling

The Influence Diagrams (IDs) is a kind of Probabilistic Belief Networks for graphic modeling. The usage of IDs can improve the communication among field experts, modelers, and decision makers, by showing the issue frame discussed from a high-level point of view. This paper enhances the Time-Sliced Influence Diagrams (TSIDs, or called Dynamic IDs) based formalism from a Discrete Event Systems Modeling and Simulation (DES M&S) perspective, for Exploring Analysis (EA) modeling. The enhancements enable a modeler to specify times occurred of endogenous events dynamically with stochastic sampling as model running and to describe the inter- influences among them with variable nodes in a dynamic situation that the existing TSIDs fails to capture. The new class of model is named Dynamic-Stochastic Influence Diagrams (DSIDs). The paper includes a description of the modeling formalism and the hiberarchy simulators implementing its simulation algorithm, and shows a case study to illustrate its enhancements.

Development of Road Maintenance Management System Based on WebGIS

Based on an analysis of the current research and application of Road maintenance, geographic information system (WebGIS) and ArcGIS Server, the platform overhead construction for Road maintenance development is studied and the key issues are presented, including the organization and design of spatial data on the basis of the geodatabase technology, middleware technology, tiles cache index technology and dynamic segmentation of WebGIS. Road maintenance geographic information platform is put forward through the researching ideas of analysis of the system design. The design and application of WebGIS system are discussed on the basis of a case study of BaNan district of Chongqing highway maintenance management .The feasibility of the theories and methods are validated through the system.

An Adaptive Mammographic Image Enhancement in Orthogonal Polynomials Domain

X-ray mammography is the most effective method for the early detection of breast diseases. However, the typical diagnostic signs such as microcalcifications and masses are difficult to detect because mammograms are of low-contrast and noisy. In this paper, a new algorithm for image denoising and enhancement in Orthogonal Polynomials Transformation (OPT) is proposed for radiologists to screen mammograms. In this method, a set of OPT edge coefficients are scaled to a new set by a scale factor called OPT scale factor. The new set of coefficients is then inverse transformed resulting in contrast improved image. Applications of the proposed method to mammograms with subtle lesions are shown. To validate the effectiveness of the proposed method, we compare the results to those obtained by the Histogram Equalization (HE) and the Unsharp Masking (UM) methods. Our preliminary results strongly suggest that the proposed method offers considerably improved enhancement capability over the HE and UM methods.

Quantitative Determination of Trace Elements in Some Oriental Herb Products

The quantitative determination of several trace elements (Cr, As, Se, Cd, Hg, Pb) existing as inorganic impurities in some oriental herb-products such as Lingzhi Mushroom capsules, Philamin powder, etc using ICP-MS has been studied. Various instrumental parameters such as power, gas flow rate, sample depth, as well as the concentration of nitric acid and thick background due to high concentration of possible interferences on the determination of these above-mentioned elements was investigated and the optimum working conditions of the sample measurement on ICP-MS (Agilent-7500a) were reported. Appropriate isotope internal standards were also used to improve the accuracy of mercury determination. Optimal parameters for sampling digestion were also investigated. The recovery of analytical procedure was examined by using a Certified Reference Material (IAEA-CRM 359). The recommended procedure was then applied for the quantitative determination of Cr, As, Se, Cd, Hg, Pb in Lingzhi Mushroom capsule, and Philamine powder samples. The reproducibility of sample measurement (average value between 94 and 102%) and the uncertainty of analytical data (less than 20%) are acceptable.