Abstract: In this researcha particle swarm optimization (PSO)
algorithm is proposedfor no-wait flowshopsequence dependent
setuptime scheduling problem with weighted earliness-tardiness
penalties as the criterion (|,
|Σ
"
).The
smallestposition value (SPV) rule is applied to convert the continuous
value of position vector of particles in PSO to job permutations.A
timing algorithm is generated to find the optimal schedule and
calculate the objective function value of a given sequence in PSO
algorithm. Twodifferent neighborhood structures are applied to
improve the solution quality of PSO algorithm.The first one is based
on variable neighborhood search (VNS) and the second one is a
simple one with invariable structure. In order to compare the
performance of two neighborhood structures, random test problems
are generated and solved by both neighborhood
approaches.Computational results show that the VNS algorithmhas
better performance than the other one especially for the large sized
problems.
Abstract: Loop detectors report traffic characteristics in real
time. They are at the core of traffic control process. Intuitively,
one would expect that as density of detection increases, so would
the quality of estimates derived from detector data. However, as
detector deployment increases, the associated operating and
maintenance cost increases. Thus, traffic agencies often need to
decide where to add new detectors and which detectors should
continue receiving maintenance, given their resource constraints.
This paper evaluates the effect of detector spacing on freeway
travel time estimation. A freeway section (Interstate-15) in Salt
Lake City metropolitan region is examined. The research reveals
that travel time accuracy does not necessarily deteriorate with
increased detector spacing. Rather, the actual location of detectors
has far greater influence on the quality of travel time estimates.
The study presents an innovative computational approach that
delivers optimal detector locations through a process that relies on
Genetic Algorithm formulation.
Abstract: Large-scale systems such as Grids offer
infrastructures for both data distribution and parallel processing. The
use of Grid infrastructures is a more recent issue that is already
impacting the Distributed Database Management System industry. In
DBMS, distributed query processing has emerged as a fundamental
technique for ensuring high performance in distributed databases.
Database placement is particularly important in large-scale systems
because it reduces communication costs and improves resource
usage. In this paper, we propose a dynamic database placement
policy that depends on query patterns and Grid sites capabilities. We
evaluate the performance of the proposed database placement policy
using simulations. The obtained results show that dynamic database
placement can significantly improve the performance of distributed
query processing.
Abstract: Emerging adulthood, the new period which is
especially prevalent in the developed or industrialized countries
during ages 18 to 29, is a new conceptualization proposed by Arnett.
Intimacy is a superordinate concept which includes intimate
interaction and intimate relationship. This study includes two
proceses which are scale development and conduction of gender
differences about markers of starting romantic intimacy among
Turkish emerging adults. In first process, Markers of Starting
Romantic Intimacy Scale, with 17 items and 5 factors, was developed
using by 220 participants. In the second step, the scale was
administered to 318 Turkish male and female emerging adults
between ages 22 and 25. Results show that there is no significant
difference between gender and total score of the scale. With respect
to gender, there are significant differences between gender and in
four subscales which are self perception, affective and cognitive
intimacy, self knowledge and romantic verbalizations. Moreover,
there is no significant relationship between gender and behavioral
intimacy subscale.
Abstract: The expression of LFA-1 diverges from the
physiological condition, thus active targeting carrier can provide the
benefits from difference into LFA-1 expression in various conditions.
Here, the selectivity of cIBR-conjugated nanoparticles (cIBR-NPs),
in terms of uptake, was investigated using PBMCs, Mixed PBMCMolt-
3 cells and Molt-3 cells. The expressions of LFA-1 on Molt-3
cells, from flow cytometry and Western blot, possessed the highest
level whereas PBMCs showed the lowest level. The kinetic uptake
profiles of cIBR-NPs were obtained by flow cytometry, which the
degree of cellular uptake presented a similar trend with the level of
LFA-1 indicating the influence of LFA-1 expression on the cellular
uptake of cIBR-NPs. The conformation of LFA-1 had a slight effect
on the cellular uptake of cIBR-NPs. Overall we demonstrated that
cIBR-NPs enhanced cellular uptake and improved the selectivity of
drug carriers to LFA-1 on the leukemia cells, which related with the
order of LFA-1 expression.
Abstract: In this paper, we construct and implement a new
Steganography algorithm based on learning system to hide a large
amount of information into color BMP image. We have used adaptive
image filtering and adaptive non-uniform image segmentation with
bits replacement on the appropriate pixels. These pixels are selected
randomly rather than sequentially by using new concept defined by
main cases with sub cases for each byte in one pixel. According to
the steps of design, we have been concluded 16 main cases with their
sub cases that covere all aspects of the input information into color
bitmap image. High security layers have been proposed through four
layers of security to make it difficult to break the encryption of the
input information and confuse steganalysis too. Learning system has
been introduces at the fourth layer of security through neural
network. This layer is used to increase the difficulties of the statistical
attacks. Our results against statistical and visual attacks are discussed
before and after using the learning system and we make comparison
with the previous Steganography algorithm. We show that our
algorithm can embed efficiently a large amount of information that
has been reached to 75% of the image size (replace 18 bits for each
pixel as a maximum) with high quality of the output.
Abstract: Titanium alloys like the modern alloy Ti 6Al 2Sn 4Zr 6Mo (Ti-6246) combine excellent specific mechanical properties and corrosion resistance. On the other hand,due to their material characteristics, machining of these alloys is difficult to perform. The aim of the current study is the analyses of wear mechanisms of coated cemented carbide tools applied in orthogonal cutting experiments of Ti-6246 alloy. Round bars were machined with standard coated tools in dry conditions on a CNC latheusing a wide range of cutting speeds and cutting depths. Tool wear mechanisms were afterwards investigated by means of stereo microscopy, optical microscopy, confocal microscopy and scanning electron microscopy. Wear mechanisms included fracture of the tool tip (total failure) and abrasion. Specific wear features like crater wear, micro cracks and built-up edgeformation appeared depending of the mechanical and thermal conditions generated in the workpiece surface by the cutting action.
Abstract: In a wind power generator using doubly fed induction
generator (DFIG), the three-phase pulse width modulation (PWM)
voltage source converter (VSC) is used as grid side converter (GSC)
and rotor side converter (RSC). The standard linear control laws
proposed for GSC provides not only instablity against comparatively
large-signal disturbances, but also the problem of stability due to
uncertainty of load and variations in parameters. In this paper, a
nonlinear controller is designed for grid side converter (GSC) of a
DFIG for wind power application. The nonlinear controller is
designed based on the input-output feedback linearization control
method. The resulting closed-loop system ensures a sufficient
stability region, make robust to variations in circuit parameters and
also exhibits good transient response. Computer simulations and
experimental results are presented to confirm the effectiveness of the
proposed control strategy.
Abstract: The objective of global optimization is to find the
globally best solution of a model. Nonlinear models are ubiquitous
in many applications and their solution often requires a global
search approach; i.e. for a function f from a set A ⊂ Rn to
the real numbers, an element x0 ∈ A is sought-after, such that
∀ x ∈ A : f(x0) ≤ f(x). Depending on the field of application,
the question whether a found solution x0 is not only a local minimum
but a global one is very important.
This article presents a probabilistic approach to determine the
probability of a solution being a global minimum. The approach is
independent of the used global search method and only requires a
limited, convex parameter domain A as well as a Lipschitz continuous
function f whose Lipschitz constant is not needed to be known.
Abstract: The software system goes through a number of stages
during its life and a software process model gives a standard format
for planning, organizing and running a project. The article presents a
new software development process model named as “Divide and
Conquer Process Model", based on the idea first it divides the things
to make them simple and then gathered them to get the whole work
done. The article begins with the backgrounds of different software
process models and problems in these models. This is followed by a
new divide and conquer process model, explanation of its different
stages and at the end edge over other models is shown.
Abstract: Wireless Sensor Network is widely used in electronics. Wireless sensor networks are now used in many applications including military, environmental, healthcare applications, home automation and traffic control. We will study one area of wireless sensor networks, which is the routing protocol. Routing protocols are needed to send data between sensor nodes and the base station. In this paper, we will discuss two routing protocols, such as datacentric and hierarchical routing protocol. We will show the output of the protocols using the NS-2 simulator. This paper will compare the simulation output of the two routing protocol using Nam. We will simulate using Xgraph to find the throughput and delay of the protocol.
Abstract: The stab resistance performance of newly developed
fabric composites composed of hexagonal paper honeycombs, filled
with shear thickening fluid (STF), and woven Kevlar® fabric or
UHMPE was investigated in this study. The STF was prepared by
dispersing submicron SiO2 particles into polyethylene glycol (PEG).
Our results indicate that the STF-Kevlar composite possessed lower
penetration depth than that of neat Kevlar. In other words, the
STF-Kevlar composite can attain the same energy level in
stab-resistance test with fewer layers of Kevlar fabrics than that of the
neat Kevlar fabrics. It also indicates that STF can be used for the
fabrication of flexible body armors and can provide improved
protection against stab threats. We found that the stab resistance of the
STF-Kevlar composite increases with the increase of SiO2
concentration in STF. Moreover, the silica particles functionalized
with silane coupling agent can further improve the stab resistance.
Abstract: This paper presents an approach which is based on the
use of supervised feed forward neural network, namely multilayer
perceptron (MLP) neural network and finite element method (FEM)
to solve the inverse problem of parameters identification. The
approach is used to identify unknown parameters of ferromagnetic
materials. The methodology used in this study consists in the
simulation of a large number of parameters in a material under test,
using the finite element method (FEM). Both variations in relative
magnetic permeability and electrical conductivity of the material
under test are considered. Then, the obtained results are used to
generate a set of vectors for the training of MLP neural network.
Finally, the obtained neural network is used to evaluate a group of
new materials, simulated by the FEM, but not belonging to the
original dataset. Noisy data, added to the probe measurements is used
to enhance the robustness of the method. The reached results
demonstrate the efficiency of the proposed approach, and encourage
future works on this subject.
Abstract: Because today-s media centric students have adopted
digital as their native form of communication, teachers are having
increasingly difficult time motivating reluctant readers to read and
write. Our research has shown these text-averse individuals can learn
to understand the importance of reading and writing if the instruction
is based on digital narratives. While these students are naturally
attracted to story, they are better at consuming them than creating
them. Therefore, any intervention that utilizes story as its basis needs
to include instruction on the elements of story making. This paper
presents a series of digitally-based tools to identify potential
weaknesses of visually impaired visual learners and to help motivate
these and other media-centric students to select and complete books
that are assigned to them
Abstract: Chicken feathers were used as biosorbent for Pb
removal from aqueous solution. In this paper, the kinetics and
equilibrium studies at several pH, temperature, and metal
concentration values are reported. For tested conditions, the Pb
sorption capacity of this poultry waste ranged from 0.8 to 8.3 mg/g.
Optimal conditions for Pb removal by chicken feathers have been
identified. Pseudo-first order and pseudo-second order equations
were used to analyze the experimental data. In addition, the sorption
isotherms were fitted to classical Langmuir and Freundlich models.
Finally, thermodynamic parameters for the sorption process have
been determined. In summary, the results showed that chicken
feathers are an alternative and promising sorbent for the treatment of
effluents polluted by Pb ions.
Abstract: Breast carcinoma is the most common form of cancer
in women. Multicolour fluorescent in-situ hybridisation (m-FISH) is
a common method for staging breast carcinoma. The interpretation
of m-FISH images is complicated due to two effects: (i) Spectral
overlap in the emission spectra of fluorochrome marked DNA probes
and (ii) tissue autofluorescence. In this paper hyper-spectral images of
m-FISH samples are used and spectral unmixing is applied to produce
false colour images with higher contrast and better information
content than standard RGB images. The spectral unmixing is realised
by combinations of: Orthogonal Projection Analysis (OPA), Alterating
Least Squares (ALS), Simple-to-use Interactive Self-Modeling
Mixture Analysis (SIMPLISMA) and VARIMAX. These are applied
on the data to reduce tissue autofluorescence and resolve the spectral
overlap in the emission spectra. The results show that spectral unmixing
methods reduce the intensity caused by tissue autofluorescence by
up to 78% and enhance image contrast by algorithmically reducing
the overlap of the emission spectra.
Abstract: In this paper, we suggest new product-type estimators for the population mean of the variable of interest exploiting the first or the third quartile of the auxiliary variable. We obtain mean square error equations and the bias for the estimators. We study the properties of these estimators using simple random sampling (SRS) and ranked set sampling (RSS) methods. It is found that, SRS and RSS produce approximately unbiased estimators of the population mean. However, the RSS estimators are more efficient than those obtained using SRS based on the same number of measured units for all values of the correlation coefficient.
Abstract: This paper proposes the study of a robust control of
the doubly fed induction generator (DFIG) used in a wind energy
production. The proposed control is based on the linear active
disturbance rejection control (ADRC) and it is applied to the control
currents rotor of the DFIG, the DC bus voltage and active and
reactive power exchanged between the DFIG and the network. The
system under study and the proposed control are simulated using
MATLAB/SIMULINK.
Abstract: Moulded parts contribute to more than 70% of
components in products. However, common defects particularly in
plastic injection moulding exist such as: warpage, shrinkage, sink
marks, and weld lines. In this paper Taguchi experimental design
methods are applied to reduce the warpage defect of thin plate
Acrylonitrile Butadiene Styrene (ABS) and are demonstrated in two
levels; namely, orthogonal arrays of Taguchi and the Analysis of
Variance (ANOVA). Eight trials have been run in which the optimal
parameters that can minimize the warpage defect in factorial
experiment are obtained. The results obtained from ANOVA
approach analysis with respect to those derived from MINITAB
illustrate the most significant factors which may cause warpage in
injection moulding process. Moreover, ANOVA approach in
comparison with other approaches like S/N ratio is more accurate and
with the interaction of factors it is possible to achieve higher and the
better outcomes.
Abstract: We introduce an effective approach for automatic offline au- thentication of handwritten samples where the forgeries are skillfully done, i.e., the true and forgery sample appearances are almost alike. Subtle details of temporal information used in online verification are not available offline and are also hard to recover robustly. Thus the spatial dynamic information like the pen-tip pressure characteristics are considered, emphasizing on the extraction of low density pixels. The points result from the ballistic rhythm of a genuine signature which a forgery, however skillful that may be, always lacks. Ten effective features, including these low density points and den- sity ratio, are proposed to make the distinction between a true and a forgery sample. An adaptive decision criteria is also derived for better verification judgements.