Abstract: L-system is a tool commonly used for modeling and simulating the growth of fractal plants. The aim of this paper is to join some problems of the computational geometry with the fractal geometry by using the L-system technique to generate fractal plant in 3D. L-system constructs the fractal structure by applying rewriting rules sequentially and this technique depends on recursion process with large number of iterations to get different shapes of 3D fractal plants. Instead, it was reiterated a specific number of iterations up to three iterations. The vertices generated from the last stage of the Lsystem rewriting process are used as input to the triangulation algorithm to construct the triangulation shape of these vertices. The resulting shapes can be used as covers for the architectural objects and in different computer graphics fields. The paper presents a gallery of triangulation forms which application in architecture creates an alternative for domes and other traditional types of roofs.
Abstract: Eutrophication of surface water is one of the most
widespread environmental problems at present. Large number of
pilgrims and tourists visit sacred artificial tank known as “Brahma
Sarover” located at Kurukshetra, India to take holy dip and perform
religious ceremonies. The sources of pollutants include impurities in
feed water, mass bathing, religious offerings and windblown
particulate matter. Studies so far have focused mainly on assessing
water quality for bathing purpose by using physico-chemical and
bacteriological parameters. No effort has been made to assess nutrient
concentration and trophic status of the tank to take more appropriate
measures for improving water quality on long term basis. In the
present study, total nitrogen, total phosphorous and chlorophyll a
measurements have been done to assess the nutrient level and trophic
status of the tank. The results show presence of high concentration of
nutrients and Chlorophyll a indicating mesotrophic and eutrophic
state of the tank. Phosphorous has been observed as limiting nutrient
in the tank water.
Abstract: Since the conception of JML, many tools, applications and implementations have been done. In this context, the users or developers who want to use JML seem surounded by many of these tools, applications and so on. Looking for a common infrastructure and an independent language to provide a bridge between these tools and JML, we developed an approach to embedded contracts in XML for Java: XJML. This approach offer us the ability to separate preconditions, posconditions and class invariants using JML and XML, so we made a front-end which can process Runtime Assertion Checking, Extended Static Checking and Full Static Program Verification. Besides, the capabilities for this front-end can be extended and easily implemented thanks to XML. We believe that XJML is an easy way to start the building of a Graphic User Interface delivering in this way a friendly and IDE independency to developers community wich want to work with JML.
Abstract: One of the main research directions in CAD/CAM
machining area is the reducing of machining time.
The feedrate scheduling is one of the advanced techniques that
allows keeping constant the uncut chip area and as sequel to keep
constant the main cutting force. They are two main ways for feedrate
optimization. The first consists in the cutting force monitoring, which
presumes to use complex equipment for the force measurement and
after this, to set the feedrate regarding the cutting force variation. The
second way is to optimize the feedrate by keeping constant the
material removal rate regarding the cutting conditions.
In this paper there is proposed a new approach using an extended
database that replaces the system model.
The feedrate scheduling is determined based on the identification
of the reconfigurable machine tool, and the feed value determination
regarding the uncut chip section area, the contact length between tool
and blank and also regarding the geometrical roughness.
The first stage consists in the blank and tool monitoring for the
determination of actual profiles. The next stage is the determination
of programmed tool path that allows obtaining the piece target
profile.
The graphic representation environment models the tool and blank
regions and, after this, the tool model is positioned regarding the
blank model according to the programmed tool path. For each of
these positions the geometrical roughness value, the uncut chip area
and the contact length between tool and blank are calculated. Each of
these parameters are compared with the admissible values and
according to the result the feed value is established.
We can consider that this approach has the following advantages:
in case of complex cutting processes the prediction of cutting force is
possible; there is considered the real cutting profile which has
deviations from the theoretical profile; the blank-tool contact length
limitation is possible; it is possible to correct the programmed tool
path so that the target profile can be obtained.
Applying this method, there are obtained data sets which allow the
feedrate scheduling so that the uncut chip area is constant and, as a
result, the cutting force is constant, which allows to use more
efficiently the machine tool and to obtain the reduction of machining
time.
Abstract: This article concerns the presentation of an integrated
method for detection of steganographic content embedded by new
unknown programs. The method is based on data mining and
aggregated hypothesis testing. The article contains the theoretical
basics used to deploy the proposed detection system and the
description of improvement proposed for the basic system idea.
Further main results of experiments and implementation details are
collected and described. Finally example results of the tests are
presented.
Abstract: One approach to assess neural networks underlying the cognitive processes is to study Electroencephalography (EEG). It is relevant to detect various mental states and characterize the physiological changes that help to discriminate two situations. That is why an EEG (amplitude, synchrony) classification procedure is described, validated. The two situations are "eyes closed" and "eyes opened" in order to study the "alpha blocking response" phenomenon in the occipital area. The good classification rate between the two situations is 92.1 % (SD = 3.5%) The spatial distribution of a part of amplitude features that helps to discriminate the two situations are located in the occipital regions that permit to validate the localization method. Moreover amplitude features in frontal areas, "short distant" synchrony in frontal areas and "long distant" synchrony between frontal and occipital area also help to discriminate between the two situations. This procedure will be used for mental fatigue detection.
Abstract: In this paper a three dimensional thermal model of a
sliding contact system is proposed for both steady-state or transient
conditions. The influence of contact force, electric current and
ambient temperature on the temperature distribution, has been
investigated. A thermal analysis of the different type of the graphite
material of fixed electric contact and its influence on contact system
temperature rise, has been performed. To validate the three
dimensional thermal model, some experimental tests have been done.
There is a good correlation between experimental and simulation
results.
Abstract: Routing security is a major concerned in Wireless
Sensor Network since a large scale of unattended nodes is deployed
in ad hoc fashion with no possibility of a global addressing due to a
limitation of node-s memory and the node have to be self organizing
when the systems require a connection with the other nodes. It
becomes more challenging when the nodes have to act as the router
and tightly constrained on energy and computational capabilities
where any existing security mechanisms are not allowed to be fitted
directly. These reasons thus increasing vulnerabilities to the network
layer particularly and to the whole network, generally. In this paper,
a Dynamic Window Secured Implicit Geographic Forwarding
(DWSIGF) routing is presented where a dynamic time is used for
collection window to collect Clear to Send (CTS) control packet in
order to find an appropriate hoping node. The DWIGF is expected to
minimize a chance to select an attacker as the hoping node that
caused by a blackhole attack that happen because of the CTS rushing
attack, which promise a good network performance with high packet
delivery ratios.
Abstract: The use of wind energy for electricity generation is
growing rapidly across the world and in Portugal. However, the
geographical characteristics of the country along with the average
wind regime and with the environmental restrictions imposed to these
projects create limitations to the exploit of the onshore wind
resource. The best onshore wind spots are already committed and the
possibility of offshore wind farms in the Portuguese cost is now
being considered. This paper aims to make a contribution to the
evaluation of offshore wind power projects in Portugal. The technical
restrictions are addressed and the strategic, environmental and
financial interest of the project is analysed from the private company
and public points of view. The results suggest that additional support
schemes are required to ensure private investors interest for these
projects. Assuming an approach of direct substitution of energy
sources for electricity generation, the avoided CO2 equivalent
emissions for an offshore wind power project were quantified. Based
on the conclusions, future research is proposed to address the
environmental and social impacts of these projects.
Abstract: The seismic vulnerability of an urban area is of a great
deal for local authorities especially those facing earthquakes. So, it is
important to have an efficient tool to assess the vulnerability of
existing buildings. The use of the VIP (Vulnerability Index Program)
and the GIS (Geographic Information System) let us to identify the
most vulnerable districts of an urban area.
The use of the vulnerability index method lets us to assess the
vulnerability of the center town of Blida (Algeria) which is a
historical town and which has grown enormously during the last
decades. In this method, three levels of vulnerability are defined. The
GIS has been used to build a data base in order to perform different
thematic analyses. These analyses show the seismic vulnerability of
Blida.
Abstract: This study aims to assess the vulnerability and risk of
the coastal areas of Taijiang to abnormal oceanographic phenomena.
In addition, this study aims to investigate and collect data regarding
the disaster losses, land utilization, and other social, economic, and
environmental issues in these coastal areas to construct a coastal
vulnerability and risk map based on the obtained climate-change risk
assessment results. Considering the indexes of the three coastal
vulnerability dimensions, namely, man-made facilities, environmental
geography, and social economy, this study adopted the equal
weighting process and Analytic Hierarchy Process to analyze the
vulnerability of these coastal areas to disasters caused by climatic
changes. Among the areas with high coastal vulnerability to climatic
changes, three towns had the highest coastal vulnerability and four had
the highest relative vulnerability. Areas with lower disaster risks were
found to be increasingly vulnerable to disasters caused by climatic
changes as time progresses.
Abstract: In the current study we present a system that is
capable to deliver proxy based differentiated service. It will help the
carrier service node to sell a prepaid service to clients and limit the
use to a particular mobile device or devices for a certain time. The
system includes software and hardware architecture for a mobile
device with moderate computational power, and a secure protocol for
communication between it and its carrier service node. On the
carrier service node a proxy runs on a centralized server to be
capable of implementing cryptographic algorithms, while the mobile
device contains a simple embedded processor capable of executing
simple algorithms. One prerequisite is needed for the system to run
efficiently that is a presence of Global Trusted Verification Authority
(GTVA) which is equivalent to certifying authority in IP networks.
This system appears to be of great interest for many commercial
transactions, business to business electronic and mobile commerce,
and military applications.
Abstract: This paper reviews the optimization available
transmission capability (ATC) of power systems using a device of
FACTS named SSSC equipped with energy storage devices. So that,
emplacement and improvement of parameters of SSSC will be
illustrated. Thus, voltage magnitude constraints of network buses,
line transient stability constraints and voltage breakdown constraints
are considered. To help the calculations, a comprehensive program in
DELPHI is provided, which is able to simulate and trace the
parameters of SSSC has been installed on a specific line.
Furthermore, the provided program is able to compute ATC, TTC
and maximum value of their enhancement after using SSSC.
Abstract: Construction site safety in China has aroused
comprehensive concern all over the world. It is imperative to
investigate the main causes of poor construction site safety. This paper
divides all the causes into four aspects, namely the factors of workers,
object, environment and management and sets up the accident causes
element system based on Delphi Method. This is followed by the
application of structural equation modeling to examine the importance
of each aspect of causes from the standpoints of different roles related
to the construction respectively. The results indicate that all the four
aspects of factors are in need of improvement, and different roles have
different ideas considering the priority of those factors. The paper has
instructive significance for the practitioners to take measures to
improve construction site safety in China accordingly.
Abstract: The paper shows the necessity to increase the security
level for paper management in the cadastral field by using specific
graphical watermarks. Using the graphical watermarking will
increase the security in the cadastral content management;
furthermore any altered document will be validated afterwards of its
originality by checking the graphic watermark. If, by any reasons the
document is changed for counterfeiting, it is invalidated and found
that is an illegal copy due to the graphic check of the watermarking,
check made at pixel level
Abstract: A thirty Rahmani weaned male lambs of average body weight (27.28±1.40 kg) were randomly allotted to three similar groups, ten lambs in each, to study the benefit of commercial feed additives Tonilisat (Saccharomyces cerevisiae) and Roemin W2 (Lactobacillus acidophilus, Lactobacillus thermophilus, Bifidobacterium and Lactose) as growth promoters on lambs performance, digestibility, rumen activity and some blood constituents. The experiment lasted about 107 days. Three experimental groups were allotted as control group: received the basal ration, T1 group: received the basal ration supplemented with Tonilisat as (0.5kg/ ton concentrate feed mixture) and T2 group: received the basal ration supplemented with Roemin W2 (1kg/ ton concentrate feed mixture). Our study revealed that addition of Tonilisat significantly increased digestion coefficient of crude protein than that of the control group, Furthermore, the supplementation of Tonilisat or Roemin W2 increased (p
Abstract: The Influence Diagrams (IDs) is a kind of Probabilistic Belief Networks for graphic modeling. The usage of IDs can improve the communication among field experts, modelers, and decision makers, by showing the issue frame discussed from a high-level point of view. This paper enhances the Time-Sliced Influence Diagrams (TSIDs, or called Dynamic IDs) based formalism from a Discrete Event Systems Modeling and Simulation (DES M&S) perspective, for Exploring Analysis (EA) modeling. The enhancements enable a modeler to specify times occurred of endogenous events dynamically with stochastic sampling as model running and to describe the inter- influences among them with variable nodes in a dynamic situation that the existing TSIDs fails to capture. The new class of model is named Dynamic-Stochastic Influence Diagrams (DSIDs). The paper includes a description of the modeling formalism and the hiberarchy simulators implementing its simulation algorithm, and shows a case study to illustrate its enhancements.
Abstract: Based on an analysis of the current research and application of Road maintenance, geographic information system (WebGIS) and ArcGIS Server, the platform overhead construction for Road maintenance development is studied and the key issues are presented, including the organization and design of spatial data on the basis of the geodatabase technology, middleware technology, tiles cache index technology and dynamic segmentation of WebGIS. Road maintenance geographic information platform is put forward through the researching ideas of analysis of the system design. The design and application of WebGIS system are discussed on the basis of a case study of BaNan district of Chongqing highway maintenance management .The feasibility of the theories and methods are validated through the system.
Abstract: X-ray mammography is the most effective method for
the early detection of breast diseases. However, the typical diagnostic
signs such as microcalcifications and masses are difficult to detect
because mammograms are of low-contrast and noisy. In this paper, a
new algorithm for image denoising and enhancement in Orthogonal
Polynomials Transformation (OPT) is proposed for radiologists to
screen mammograms. In this method, a set of OPT edge coefficients
are scaled to a new set by a scale factor called OPT scale factor. The
new set of coefficients is then inverse transformed resulting in
contrast improved image. Applications of the proposed method to
mammograms with subtle lesions are shown. To validate the
effectiveness of the proposed method, we compare the results to
those obtained by the Histogram Equalization (HE) and the Unsharp
Masking (UM) methods. Our preliminary results strongly suggest
that the proposed method offers considerably improved enhancement
capability over the HE and UM methods.
Abstract: The quantitative determination of several trace
elements (Cr, As, Se, Cd, Hg, Pb) existing as inorganic impurities in
some oriental herb-products such as Lingzhi Mushroom capsules,
Philamin powder, etc using ICP-MS has been studied. Various
instrumental parameters such as power, gas flow rate, sample depth, as
well as the concentration of nitric acid and thick background due to
high concentration of possible interferences on the determination of
these above-mentioned elements was investigated and the optimum
working conditions of the sample measurement on ICP-MS
(Agilent-7500a) were reported. Appropriate isotope internal standards
were also used to improve the accuracy of mercury determination.
Optimal parameters for sampling digestion were also investigated. The
recovery of analytical procedure was examined by using a Certified
Reference Material (IAEA-CRM 359). The recommended procedure
was then applied for the quantitative determination of Cr, As, Se, Cd,
Hg, Pb in Lingzhi Mushroom capsule, and Philamine powder samples.
The reproducibility of sample measurement (average value between
94 and 102%) and the uncertainty of analytical data (less than 20%)
are acceptable.