Abstract:In this study, the performance of an integrated desiccant air conditioning system (IDACS) driven by solar energy is experimentally tested and predicted by back propagation artificial neural network (BP-ANN). The IDACS is generally includes a liquid desiccant dehumidification cycle combined with a vapor compression refrigeration cycle. The integrated system performance is assessed utilizing the system coefficient of performance (COP), outlet dry air temperature (Tda-out), and specific moisture removal (SMR). The training of the BP-ANN is accomplished utilizing experimental results previously published. The results of the BP-ANN model revealed the high accuracy in predicting system performance parameters compared with experimental values. The BP-ANN model has shown relative errors in the trained mode for COP, Tda-out, and SMR within ±0.005%, ±0.006%, and ±0.05%, respectively. On the other side, the BP-ANN model is inspected in the predictive mode as well. The relative errors of the model for COP, Tda-out, and SMR in the predictive mode are within ±0.006%, ±0.006%, and ±0.004%, respectively. The influences of some selected parameters, namely regeneration temperature, desiccant solution temperature in the condenser and evaporator, and strong solution concentration on the system performance are examined and discussed as well.
Abstract:In this paper, a fractional Ricatti expansion method is proposed to solve\na nonlinear time fractional Fitzhugh-Nagumo equation in the frame of con-\nformable derivatives, we also apply it to the nonlinear fractional Newell-Whitehead\n-Segel and Zeldovich equations which are an particular case of fractional Fitzhugh-\nNagumo equation. In order to illustrate the accuracy and validity of this\nmethod, some numerical solution are given.
Abstract:The primary function of this system is to monitor the temperature and heart beat of the patient. The Data collected by the sensors are sent to the Microcontroller. The Microcontroller transmits the data over the air by using the GSM modem from the transmitter to recording system in the receiving end. The information is sent as an SMS to the care monitoring system or to the experts to take action. Not only we send the information through GSM module as SMS we also display the readings on LCD. When the conditions go abnormal then sensors sense those values and then alarm around by blowing the alarm and also sending an emergency SMS to the desired destination.
Abstract:This paper addresses the carrier-frequency offset (CFO) estimation in non-circular complex-valued colored multiplicative noise channel. The non-circular multiplicative noise is modelled as non-circular complex-valued first-order autoregressive (NC-AR(1)) model. The primary aim is to characterize the significant gains in terms of CFO estimation that can be provided by exploiting the non-circularity property of the channel model. A high signal-to-noise-ratio (SNR) approximation time domain scheme for joint CFO and fast-fading NC-AR(1) channel parameters estimation is proposed based on the maximum likelihood (ML) principle. Using this approach, the CFO estimate is first obtained by solving a one-dimensional optimization problem. We also derive an approximate high-SNR ML CFO estimation approach under a quasi-static non-circular channel model. To evaluate the performance of these approaches, we derive closed-form expressions of the exact Cramér-Rao lower bound (CRLB) of the CFO estimate for both slow-fading and fast-fading channel models. Analytical sensitivity analysis is performed for NC-AR(1) parameters by deriving high-SNR approximate expressions of the CRLBs. Finally, theoretical analysis and simulation results show that the proposed estimators provide significant performance as compared to the conventional circular CFO estimation schemes.
Abstract:The increasing demand of network services intensifying the need of more bandwidth for supporting QoS. Optical network provide large bandwidth to overcome the scarcity of bandwidth problem, but it majorly have an issue for assigning optimal bandwidth to manage the traffic condition and minimizing the blocking probability in routing. In this paper, an Optimal Bandwidth Assignment (O-BA) approach to minimize the blocking probability is proposed to improvisation the bandwidth allocation in varying traffic in optical network routing. The main aim of the O-BA is to reduce the blocking probability and improve bandwidth utilization to achieve better throughput. The simulation results in compare to the conventional bandwidth distribution algorithms shows a significant reduction in blocking probability and enhance the bandwidth usages.
Abstract:In this study, the improvement of a corridor consisting of four junctions, located in Atatürk University Campus, was studied. The traffic volumes of this corridor which are expected to arise after 20 years are determined by origin-destination matrix estimation method. The junctions located on the corridor were analyzed by utilizing VISSIM package software and they were evaluated according to the parameters of travel time, average delay, queue length, CO emissions and fuel consumption. However, one of the most important parameters of junction design is traffic safety. Since traffic safety is an abstract parameter, it cannot be used on micro-simulation analyses. Therefore, multi-criteria decision-making models are required to be utilized in order to observe the effects of traffic safety on the determination of convenient junction type. Analytic Hierarchy Process (AHP) was utilized for this reason. Three different scenarios were constituted for the current corridor. The most convenient junction type was determined by comparing the scenarios to the current state via both micro-simulation and AHP method. Considering the results, it can be said that scenario 1 (the case that all of the junctions were roundabouts) is the best junction type in terms of the parameters mentioned above and traffic safety.
Abstract:Steganography is the process of providing the security to secret information by hiding it into different information. The secret information which is to be hidden in a carrier image is also in an image format. The secret information can be embedded in another image so that it makes the intruder hard to modify the data which is hidden. Inn this steganographic process, the carrier image can act as a good source of embedding since the entire image is aligned in the form of pixels. Hence, the data which is embedded inside the carrier image makes it harder to the intruder to access and modify it. Embedding the secret information in these pixels of an image leads to high security. In this paper, optimum features are computed for all the pixels and the inference rules are formed and then combined to embed the secret information in the pixels of the carrier image. Features such as Brightness sensitivity, texture and edge sensitivity where calculated and combined with the inference system for hiding the information. Experimental results prove that this system hides the secret information more effectively in a carrier image with a high information hiding rate. Future enhancements in this work is to propose an efficient algorithm to hide the colour images.
Abstract:In this paper, a design process and a hardware implementation for a wireless real-time home automation system approach based on NI MyRIO microcontroller board and LabVIEW platform has been developed. The proposed automated system has two hardware elements: the first one is a personal computer as a system main server hosting the designed LabVIEW platform and the second element is a NI MyRIO microcontroller board for managing the operating between the appliances and the sensors. The appliances can be automatically monitored, controlled, and accessed in response to the signals from the related sensors or manually by the system end-user through smart phone based on Wi-Fi and cloud computing technology. To approve the reliability of the proposed automated system, a hardware realization for three appliances: temperature management, light energy saving, and biometric security system of face recognition with fingerprint check has been introduced. The proposed system has a simple structure, economically cost effective and flexible scaling up for a proper automated home future.
Abstract:Clustering is most common and well-established data mining technique for discovering patterns in data. Besides other types of data, clustering is also widely used for the same purpose for data acquired from educational settings. Among its different variants, K-means algorithm is popular in EDM community for its simplicity and ease of use. However, K-means algorithm itself does not impose the number of clusters. The optimal number of clusters in dataset remains a debatable issue. Different methods exist which can be used to estimate the number of clusters present in the dataset. In this paper, we present a comparison of different methods used for determining the optimal value of K. We use five datasets and seven methods to find the optimal number of clusters in these datasets. Two of the datasets have been extracted from educational settings. The other three are open datasets. We compare results obtained from different methods using these five datasets. EDM community is growing rapidly and the researchers are experimenting with more and more methods. The analysis presented in this paper will help EDM practitioners to choose appropriate technique based on objective evaluation measures to determine the optimal value of K.
Abstract:In parallel with world population growth, the increase in the use of scarce resources leads the societies to seek new sources with each passing day. In the world where almost all of the terrestrial areas are shared, the attention of the countries has shifted especially to the marine areas and marine sources. The most important factor that gives the right to the use of the resources related to the sea, especially to the coastal states, is the rights related to maritime jurisdictions arising from international law. These rights begin with short-distance sea areas, such as inland waters and territorial waters, with rights to explore on the seabed, such as the continental shelf and the exclusive economic zone. Located at the intersection of important marine areas in the world scale of Turkey, it is a prominent maritime jurisdiction areas of application for the position. Particularly contentious position with neighboring states in the Eastern Mediterranean littoral and marine applications in areas subject sharing, Turkey and poses a major challenge for governments as well as other coastal areas. Therefore, in this study the applications in maritime jurisdiction areas of Turkey in the Eastern Mediterranean and its impact on energy discovery of these applications are discussed. In this context, in order to better understand the subject, firstly basic concepts related to maritime jurisdictions were introduced and then the practices in the Eastern Mediterranean were explained and developments related to energy discoveries in this region were evaluated. Then the study was concluded by mentioning the predictions for the future.