Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 44

Full-Text Articles in Physical Sciences and Mathematics

Homogeneous Dbd In N2: 1) Lif, Talif And Electrical Measurements, N. Gherardi, Et. Es-Sebbar, C. Sarra-Bourret, N. Naudé, F. Massines Oct 2008

Homogeneous Dbd In N2: 1) Lif, Talif And Electrical Measurements, N. Gherardi, Et. Es-Sebbar, C. Sarra-Bourret, N. Naudé, F. Massines

Dr. Et-touhami Es-sebbar

In this paper we compare two different discharges that can be obtained in a DBD configuration, that is to say the filamentary discharge (usual regime in atmospheric DBD) with the Atmospheric Pressure Townsend Discharge (APTD), which is a homogeneous regime obtained in nitrogen atmosphere. The aim is to help in the understanding of the processes which control the transition from one regime to the other. To do so, the discharge is characterized through electrical measurements, coupled with optical diagnostics among which Laser Induced Fluorescence (LIF) for radical density measurements. The influence of the addition of small quantities of additives on …


Oscillating Regime In Carbonylation Reaction Of Propargyl Alcohol (In Russian), Sergey N. Gorodsky, Anatoly V. Kurdiukov, Oleg N. Temkin Sep 2008

Oscillating Regime In Carbonylation Reaction Of Propargyl Alcohol (In Russian), Sergey N. Gorodsky, Anatoly V. Kurdiukov, Oleg N. Temkin

Sergey N. Gorodsky

No abstract provided.


Active Species Generation Of Homogeneous Dbd In N2: Experiment And Modelling, N. Gherardi, Et. Es-Sebbar, C. Sarra-Bourret, N. Naudé, F. Massines, D. Tzyganov, P. Ségur, S. Pancheshnyi Sep 2008

Active Species Generation Of Homogeneous Dbd In N2: Experiment And Modelling, N. Gherardi, Et. Es-Sebbar, C. Sarra-Bourret, N. Naudé, F. Massines, D. Tzyganov, P. Ségur, S. Pancheshnyi

Dr. Et-touhami Es-sebbar

No abstract provided.


A Heuristic Scheduling Scheme In Multiuser Ofdma Networks, Zheng Sun, Zhiqiang He, Ruochen Wang, Kai Niu Aug 2008

A Heuristic Scheduling Scheme In Multiuser Ofdma Networks, Zheng Sun, Zhiqiang He, Ruochen Wang, Kai Niu

Zheng Sun

Conventional heterogeneous-traffic scheduling schemes utilize zero-delay constraint for real-time services, which aims to minimize the average packet delay among real-time users. However, in light or moderate load networks this strategy is unnecessary and leads to low data throughput for non-real-time users. In this paper, we propose a heuristic scheduling scheme to solve this problem. The scheme measures and assigns scheduling priorities to both real-time and non-real-time users, and schedules the radio resources for the two user classes simultaneously. Simulation results show that the proposed scheme efficiently handles the heterogeneous-traffic scheduling with diverse QoS requirements and alleviates the unfairness between real-time …


Using Bayesian Networks For Candidate Generation In Consistency-Based Diagnosis, Sriram Narasimhan, Ole J. Mengshoel Aug 2008

Using Bayesian Networks For Candidate Generation In Consistency-Based Diagnosis, Sriram Narasimhan, Ole J. Mengshoel

Ole J Mengshoel

Consistency-based diagnosis relies on the computation of discrepancies between model predictions and sensor observations. The traditional assumption that these discrepancies can be detected accurately (by means of thresholding for example) is in many cases reasonable and leads to strong performance. However, in situations of substantial uncertainty (due, for example, to sensor noise or model abstraction), more robust schemes need to be designed to make a binary decision on whether predictions are consistent with observations or not. However, if an accurate binary decision is not made, there are risks of occurrence of false alarms and missed alarms. Moreover when multiple sensors …


A Method For Computing Infiltration And Redistribution In A Discretized Moisture Content Domain, Fred L. Ogden Jul 2008

A Method For Computing Infiltration And Redistribution In A Discretized Moisture Content Domain, Fred L. Ogden

Fred L. Ogden

A new one-dimensional infiltration and redistribution method is proposed as an alternative to the Richards equation (RE) for coupled surface and subsurface models. The proposed method discretizes soil water content into hypothetical hydraulically interacting bins. The entry and propagation of displacement fronts in each bin are simulated by means of explicit infiltration and drainage approximations based on capillary and gravitational driving forces. Wetting front advances within bins create water deficits that are satisfied by capillary-driven interbin flow. The method inherently provides numerical stability by precluding the need to directly estimate nonlinear gradients through numerical schemes. Comparisons of the performance of …


Investigation Of Stun Guns As Intentional Electromagnetic Interference (Emi) Sources, George H. Baker, Ryan C. Tuttle Jul 2008

Investigation Of Stun Guns As Intentional Electromagnetic Interference (Emi) Sources, George H. Baker, Ryan C. Tuttle

George H Baker

Because the operation and control of most critical infrastructures are highly dependent on electronics, it is important to understand the vulnerability of those electronics to intentional electromagnetic interference (EMI). The possibility of interference using readily available consumer devices is a particular concern. We investigated the feasibility and effectiveness of using compact stun guns to intentionally interfere with electronic systems. Test articles included individual computers and computers networked through a central hub. 60KV and 600KV devices were used in the experiments. Results indicate that stun guns are effective in disabling digital electronic systems.


Surface Ion-Electron Recombination As The Main Source Of Atoms In Flowing N2 Dbd, D. Tsyganov, Et. Es-Sebbar, S. Pancheshnyi, N. Gherardi, P. Ségur, F. Massines Jul 2008

Surface Ion-Electron Recombination As The Main Source Of Atoms In Flowing N2 Dbd, D. Tsyganov, Et. Es-Sebbar, S. Pancheshnyi, N. Gherardi, P. Ségur, F. Massines

Dr. Et-touhami Es-sebbar

No abstract provided.


Talif Quantification Of Nitrogen Atoms Applied To Experimental Simulation Of Titan’S Atmosphere, Et. Es-Sebbar, Y. Benilan, E. Arzoumanian, M.-C. Gazeau Jul 2008

Talif Quantification Of Nitrogen Atoms Applied To Experimental Simulation Of Titan’S Atmosphere, Et. Es-Sebbar, Y. Benilan, E. Arzoumanian, M.-C. Gazeau

Dr. Et-touhami Es-sebbar

No abstract provided.


S.E.T.U.P., A New Program Of Representative Simulations Of Titan’S Atmosphere: Current Status, M-C. Gazeau, E. Arzoumanian, Y. Benilan, Et. Es-Sebbar, A. Jolly, S. Perrier, C. Romanzin Jul 2008

S.E.T.U.P., A New Program Of Representative Simulations Of Titan’S Atmosphere: Current Status, M-C. Gazeau, E. Arzoumanian, Y. Benilan, Et. Es-Sebbar, A. Jolly, S. Perrier, C. Romanzin

Dr. Et-touhami Es-sebbar

No abstract provided.


Modeling Of Fermentation Processes Using Online Kernel Learning Algorithm, Yi Liu Jul 2008

Modeling Of Fermentation Processes Using Online Kernel Learning Algorithm, Yi Liu

Dr. Yi Liu

No abstract provided.


Adaptive Control Of A Class Of Nonlinear Discrete-Time Systems With Online Kernel Learning, Yi Liu Jul 2008

Adaptive Control Of A Class Of Nonlinear Discrete-Time Systems With Online Kernel Learning, Yi Liu

Dr. Yi Liu

No abstract provided.


Report Of The Commission To Assess The Threat To The United States From Emp Attack: Critical National Infrastructures, William R. Graham Jul 2008

Report Of The Commission To Assess The Threat To The United States From Emp Attack: Critical National Infrastructures, William R. Graham

George H Baker

The physical and social fabric of the United States is sustained by a system of systems; a complex and dynamic network of interlocking and interdependent infrastructures (“critical national infrastructures”) whose harmonious functioning enables the myriad actions, transactions, and information flow that undergird the orderly conduct of civil society in this country. The vulnerability of these frastructures to threats — deliberate, accidental, and acts of nature — is the focus of greatly heightened concern in the current era, a process accelerated by the events of 9/11 and recent hurricanes, including Katrina and Rita. This report presents the results of the Commission’s …


Summary Of 2008 Homeland Security Symposium At The National Academies: Fostering Public-Private Partnerships, George H. Baker, Cheryl J. Elliott Jun 2008

Summary Of 2008 Homeland Security Symposium At The National Academies: Fostering Public-Private Partnerships, George H. Baker, Cheryl J. Elliott

George H Baker

Recent U.S. high consequence events have made clear the importance of government collaboration with industry. The benefits of such collaboration were clearly seen as a lesson from Hurricane Katrina. The resources owned and controlled by American industry dwarf those available to local, state and even the federal government departments. Better agreements and incentives to bring the full capabilities of industry squarely into the national response agenda will be indispensable in effectively responding to large-scale catastrophes. General Russel Honoré who led the National Guard response to Katrina has said, “We need the partnering between local, state, and federal governments; but the …


Comparison Of Townsend Dielectric Barrier Discharge In N2, N2/O2 And N2/N2o: Behavior And Density Of Radicals, F. Massines, Et. Es-Sebbar, N. Gherardi, N. Naudé, D. Tsyganov, P. Ségur, S. Pancheshnyi Jun 2008

Comparison Of Townsend Dielectric Barrier Discharge In N2, N2/O2 And N2/N2o: Behavior And Density Of Radicals, F. Massines, Et. Es-Sebbar, N. Gherardi, N. Naudé, D. Tsyganov, P. Ségur, S. Pancheshnyi

Dr. Et-touhami Es-sebbar

No abstract provided.


Verifying Semantic Business Process Models In Inter-Operation, George Koliadis, Aditya Ghose Jun 2008

Verifying Semantic Business Process Models In Inter-Operation, George Koliadis, Aditya Ghose

Professor Aditya K. Ghose

Process inter-operation is characterized as cooperative interactions among loosely coupled autonomous constituents to adaptively fulfill system-wide purpose. Issues of inconsistency can be anticipated in inter-operating processes given their independent management and design. To reduce inconsistency (that may contribute to failures) effective methods for statically verifying behavioral interoperability are required. This paper contributes a method for practical, semantic verification of interoperating processes (as represented with BPMN models). We provide methods to evaluate consistency during process design where annotation of the immediate effect of tasks and sub-processes has been provided. Furthermore, some guidelines are defined against common models of inter-operation for scoping …


Świadomość Społeczna Z Zakresu Niekontrolowanego Spalania Odpadów I Problemu Dioksyn, Robert Oleniacz, Anna Tomkowicz May 2008

Świadomość Społeczna Z Zakresu Niekontrolowanego Spalania Odpadów I Problemu Dioksyn, Robert Oleniacz, Anna Tomkowicz

Robert Oleniacz

The paper presents the problem of uncontrolled waste combustion in a rural community (Municipality Krościenko Wyżne, South-East Poland) and social awareness concerning the formation of dioxins using the results of the survey. In the questionnaire studies both combustion of wastes in household stoves was included as well as on the open space. The results of the survey showed a large scale of waste burning and low public awareness of inhabitants of the Polish village.

English title: Public awareness in the field of uncontrolled waste combustion and the problem of dioxins.


Lend Me Your Arms: The Use And Implications Of Humancentric Rfid, Amelia Masters, Katina Michael May 2008

Lend Me Your Arms: The Use And Implications Of Humancentric Rfid, Amelia Masters, Katina Michael

Professor Katina Michael

Recent developments in the area of RFID have seen the technology expand from its role in industrial and animal tagging applications, to being implantable in humans. With a gap in literature identified between current technological development and future humancentric possibility, little has been previously known about the nature of contemporary humancentric applications. By employing usability context analyses in control, convenience and care-related application areas, we begin to piece together a cohesive view of the current development state of humancentric RFID, as detached from predictive conjecture. This is supplemented by an understanding of the market-based, social and ethical concerns which plague …


Barriers To Rfid Adoption In The Supply Chain, Nick Huber, Katina Michael, Luke Mccathie May 2008

Barriers To Rfid Adoption In The Supply Chain, Nick Huber, Katina Michael, Luke Mccathie

Professor Katina Michael

This paper explores the current barriers to adoption of radio-frequency identification (RFID) for supply chain applications, and documents the perceptions of key players in the Australian RFID market. The paper contains data collected from interviews of both technology providers (e.g. RFID vendors), and prospective business customer (i.e. a large retailer). Data collected is analyzed using qualitative content analysis, and supported with figures and tables. The findings show that the three main barriers to RFID adoption are: the cost of RFID implementation (especially ongoing tag costs), lack of customer awareness and education, and a technology which is only at the beginning …


Vendor Perceptions Of How Rfid Can Minimize Product Shrinkage In The Retail Supply Chain, N. Huber, Katina Michael May 2008

Vendor Perceptions Of How Rfid Can Minimize Product Shrinkage In The Retail Supply Chain, N. Huber, Katina Michael

Professor Katina Michael

The objective of this paper is to investigate product shrinkage in the retail supply chain, and to consider how radio frequency identification (RFID) could act as a partial solution toward a retailer’s loss prevention strategy. The research uses semi-structured interviews to collect data, and a qualitative content analysis to present the results. Given that the number of RFID deployments in the retail supply chain is limited, RFID vendors, resellers, and associations are instead used to gather the current value propositions. Representatives from nine Australian RFID vendors and associations were interviewed in August and September of 2006. The results indicate that …


Verifying Semantic Business Process Models In Inter-Operation, George Koliadis, Aditya K. Ghose May 2008

Verifying Semantic Business Process Models In Inter-Operation, George Koliadis, Aditya K. Ghose

Professor Aditya K. Ghose

Process inter-operation is characterized as cooperative interactions among loosely coupled autonomous constituents to adaptively fulfill system-wide purpose. Issues of inconsistency can be anticipated in inter-operating processes given their independent management and design. To reduce inconsistency (that may contribute to failures) effective methods for statically verifying behavioral interoperability are required. This paper contributes a method for practical, semantic verification of interoperating processes (as represented with BPMN models). We provide methods to evaluate consistency during process design where annotation of the immediate effect of tasks and sub-processes has been provided. Furthermore, some guidelines are defined against common models of inter-operation for scoping …


Hclp Based Service Composition, Ying Guan, Aditya K. Ghose, Zheng Lu May 2008

Hclp Based Service Composition, Ying Guan, Aditya K. Ghose, Zheng Lu

Professor Aditya K. Ghose

A key impediment to the widespread adoption of web services is the relatively limited set of tools available to deal with Quality-of-Service (QoS) factors. QoS factors pose several difficult challenges in how they may be articulated. While the functional requirements of a service can be represented as predicates to be satisfied by the target system, QoS factors are effectively statements of objectives to be maximized or minimized. QoS requirements occur naturally as local specifications of preference. Dealing with QoS factors is therefore a multi-objective optimization problem. In effect, these objectives are never fully satisfied, but satisficed to varying degrees. In …


Auditing Business Process Compliance, Aditya K. Ghose, George Koliadis May 2008

Auditing Business Process Compliance, Aditya K. Ghose, George Koliadis

Professor Aditya K. Ghose

Compliance issues impose significant management and reporting requirements upon organizations.We present an approach to enhance business process modeling notations with the capability to detect and resolve many broad compliance related issues. We provide a semantic characterization of a minimal revision strategy that helps us obtain compliant process models from models that might be initially non-compliant, in a manner that accommodates the structural and semantic dimensions of parsimoniously annotated process models. We also provide a heuristic approach to compliance resolution using a notion of compliance patterns. This allows us to partially automate compliance resolution, leading to reduced levels of analyst involvement …


Using Constraint Hierarchies To Support Qos-Guided Service Composition, Ying Guan, Aditya K. Ghose, Zheng Lu May 2008

Using Constraint Hierarchies To Support Qos-Guided Service Composition, Ying Guan, Aditya K. Ghose, Zheng Lu

Professor Aditya K. Ghose

A key impediment to the widespread adoption of web services is the is the relatively limited set of tools available to deal with Quality-of-Service (QoS) factors [12]. QoS factors pose several difficult challenges in how they may be articulated. While the functional requirements of a service can be represented as predicates to be satisfied by the target system, QoS factors are effectively statements of objectives to be maximized or minimized. QoS requirements occur naturally as local specifications of preference. Dealing with QoS factors is therefore a multi-objective optimization problem. In effect, these objectives are never fully satisfied, but satisficed to …


Process Discovery From Model And Text Artefacts, Aditya K. Ghose, George Koliadis, Arthur Cheung May 2008

Process Discovery From Model And Text Artefacts, Aditya K. Ghose, George Koliadis, Arthur Cheung

Professor Aditya K. Ghose

Modeling is an important and time consuming part of the Business Process Management life-cycle. An analyst reviews existing documentation and queries relevant domain experts to construct both mental and concrete models of the domain. To aid this exercise, we propose the Rapid Business Process Discovery (R-BPD) framework and prototype tool that can query heterogeneous information resources (e.g. corporate documentation, web-content, code e.t.c.) and rapidly construct proto-models to be incrementally adjusted to correctness by an analyst. This constitutes a departure from building and constructing models toward just editing them. We believe this rapid mixed-initiative modeling will increase analyst productivity by significant …


Combining Agent-Oriented Conceptual Modelling With Formal Methods, S. A. Vilkomir, Aditya K. Ghose, A. Krishna May 2008

Combining Agent-Oriented Conceptual Modelling With Formal Methods, S. A. Vilkomir, Aditya K. Ghose, A. Krishna

Professor Aditya K. Ghose

Agent-oriented conceptual modelling notations such as i* have received considerable recent attention as a useful approach to early-phase requirements engineering. Agent-oriented conceptual modelling notations are highly effective in representing requirements from an intentional stance and answering questions such as what goals exist, how key actors depend on each other and what alternatives must be considered. Formal methods such as those based on the Z notation offer a complementary set of representational facilities. We explore how these two otherwise disparate approaches might be used in a synergistic fashion.


Executable Specifications For Agent Oriented Conceptual Modelling, Y. Guan, Aditya K. Ghose May 2008

Executable Specifications For Agent Oriented Conceptual Modelling, Y. Guan, Aditya K. Ghose

Professor Aditya K. Ghose

Agent-oriented conceptual modelling (AoCM) notations such as i* have received considerable recent attention as a useful approach to early-phase requirements engineering. AoCM notations are useful in modeling organizational context and in offering high-level anthropomorphic abstractions as modeling constructs. AoCM notations such as i* help answer questions such as what goals exist, how key actors depend on each other and what alternatives must be considered. In this paper, we suggest an approach to executing i* models by translating these into set of interacting agents implemented in the 3APL language. In addition, we suggest a hybrid modeling, or co-evolution, approach in which …


Hierarchic Decomposition In Agent Oriented Conceptual Modelling, R. B. Brown, Aditya K. Ghose May 2008

Hierarchic Decomposition In Agent Oriented Conceptual Modelling, R. B. Brown, Aditya K. Ghose

Professor Aditya K. Ghose

Software development processes requires a thorough understanding of stakeholder objectives and requirements. Product-centrism is an insufficient stance from which to achieve greater efficiencies and reduce reengineering. Stakeholder requirement elicitation is thus worthy of formalization. A suite of tools, notably the i* model, provides a framework for early-phase requirements capture. These tools currently are at best only semiautomated and essentially consist of a notational glossary and sets of mark-up symbols. Increasing formalization may lead to greater automation of the process in the future, but currently there is a degree of flexibility that presents pitfalls for the unwary practitioner. A notion of …


Co-Evolution Of Agent Oriented Conceptual Models And Use Case Diagrams, Moshiur Bhuiyan, M. M. Zahidul Islam, Aneesh Krishna, Aditya K. Ghose May 2008

Co-Evolution Of Agent Oriented Conceptual Models And Use Case Diagrams, Moshiur Bhuiyan, M. M. Zahidul Islam, Aneesh Krishna, Aditya K. Ghose

Professor Aditya K. Ghose

Agent--oriented conceptual modeling notations such as i* represents an interesting approach for modeling early phase requirements which includes organizational contexts, stakeholder intentions and rationale. On the other hand Use Case diagram is used for capturing functional requirements of the system. The integration of i* model and Use Case diagram closes the gap of capturing organizational requirements and system requirements. But in both contexts the requirements might change at any time. Any change made in one model must be reflected in the other. This paper proposes a methodology supporting the co-evolution of these two otherwise disparate approaches in a synergistic fashion.


Co-Evolution Of Agent-Oriented Conceptual Models And Caso Agent Programs, A. Dasgupta, Aneesh Krishna, Aditya K. Ghose May 2008

Co-Evolution Of Agent-Oriented Conceptual Models And Caso Agent Programs, A. Dasgupta, Aneesh Krishna, Aditya K. Ghose

Professor Aditya K. Ghose

Agent-Oriented conceptual modelling notations are highly effective in representing requirements from an intentional stance and answering questions such as what goals exist, how key actors depend on each other and what alternatives must be considered. In this paper, we suggest an approach to executing i* models by translating these into set of interacting agents implemented in the CASO language. In addition, we suggest a hybrid modelling, or co-evolution, approach in which i* models and CASO agent programs are concurrently maintained and updated, while retaining some modicum of loose consistency between the two. This allows us to benefit from the complementary …