Abstract: In a nuclear reactor Loss of Coolant accident (LOCA)
considers wide range of postulated damage or rupture of pipe in the
heat transport piping system. In the case of LOCA with/without
failure of emergency core cooling system in a Pressurised Heavy
water Reactor, the Pressure Tube (PT) temperature could rise
significantly due to fuel heat up and gross mismatch of the heat
generation and heat removal in the affected channel. The extent and
nature of deformation is important from reactor safety point of view.
Experimental set-ups have been designed and fabricated to simulate
ballooning (radial deformation) of PT for 220 MWe IPHWRs.
Experiments have been conducted by covering the CT by ceramic
fibers and then by submerging CT in water of voided PTs. In both
the experiments, it is observed that ballooning initiates at a
temperature around 665´┐¢C and complete contact between PT and
Caldaria Tube (CT) occurs at around 700´┐¢C approximately. The
strain rate is found to be 0.116% per second. The structural integrity
of PT is retained (no breach) for all the experiments. The PT heatup
is found to be arrested after the contact between PT and CT, thus
establishing moderator acting as an efficient heat sink for IPHWRs.
Abstract: The one-class support vector machine “support vector
data description” (SVDD) is an ideal approach for anomaly or outlier
detection. However, for the applicability of SVDD in real-world
applications, the ease of use is crucial. The results of SVDD are
massively determined by the choice of the regularisation parameter C
and the kernel parameter of the widely used RBF kernel. While for
two-class SVMs the parameters can be tuned using cross-validation
based on the confusion matrix, for a one-class SVM this is not
possible, because only true positives and false negatives can occur
during training. This paper proposes an approach to find the optimal
set of parameters for SVDD solely based on a training set from
one class and without any user parameterisation. Results on artificial
and real data sets are presented, underpinning the usefulness of the
approach.
Abstract: Much research into handwritten Thai character
recognition have been proposed, such as comparing heads of
characters, Fuzzy logic and structure trees, etc. This paper presents a
system of handwritten Thai character recognition, which is based on
the Ant-minor algorithm (data mining based on Ant colony
optimization). Zoning is initially used to determine each character.
Then three distinct features (also called attributes) of each character
in each zone are extracted. The attributes are Head zone, End point,
and Feature code. All attributes are used for construct the
classification rules by an Ant-miner algorithm in order to classify
112 Thai characters. For this experiment, the Ant-miner algorithm is
adapted, with a small change to increase the recognition rate. The
result of this experiment is a 97% recognition rate of the training set
(11200 characters) and 82.7% recognition rate of unseen data test
(22400 characters).
Abstract: Champs Bourcin black grape originated from
Aquitaine, France and planted in Sapa, Lao cai provice, exhibited
high total acidity (11.72 g/L). After 9 days of alcoholic fermentation
at 25oC using Saccharomyces cerevisiae UP3OY5 strain, the ethanol
concentration of wine was 11.5% v/v, however the sharp sour taste of
wine has been found. The malolactic fermentation (MLF) was carried
out by Oenococcus oeni ATCCBAA-1163 strain which had been preadapted
to acid (pH 3-4) and ethanol (8-12%v/v) conditions. We
obtained the highest vivability (83.2%) upon malolactic fermentation
after 5 days at 22oC with early stationary phase O. oeni cells preadapted
to pH 3.5 and 8% v/v ethanol in MRS medium. The malic
acid content in wine was decreased from 5.82 g/L to 0.02 g/L after
MLF (21 days at 22oC). The sensory quality of wine was
significantly improved.
Abstract: In this paper, the details of an experimental method to measure the clamping force value at bolted connections due to application of wrenching torque to tighten the nut have been presented. A simplified bolted joint including a holed plate with a single bolt was considered to carry out the experiments. This method was designed based on Hooke-s law by measuring compressive axial strain of a steel bush placed between the nut and the plate. In the experimental procedure, the values of clamping force were calculated for seven different levels of applied torque, and this process was repeated three times for each level of the torque. Moreover, the effect of lubrication of threads on the clamping value was studied using the same method. In both conditions (dry and lubricated threads), relation between the torque and the clamping force have been displayed in graphs.
Abstract: Long term rainfall analysis and prediction is a
challenging task especially in the modern world where the impact of
global warming is creating complications in environmental issues.
These factors which are data intensive require high performance
computational modeling for accurate prediction. This research paper
describes a prototype which is designed and developed on grid
environment using a number of coupled software infrastructural
building blocks. This grid enabled system provides the demanding
computational power, efficiency, resources, user-friendly interface,
secured job submission and high throughput. The results obtained
using sequential execution and grid enabled execution shows that
computational performance has enhanced among 36% to 75%, for
decade of climate parameters. Large variation in performance can be
attributed to varying degree of computational resources available for
job execution.
Grid Computing enables the dynamic runtime selection, sharing
and aggregation of distributed and autonomous resources which plays
an important role not only in business, but also in scientific
implications and social surroundings. This research paper attempts to
explore the grid enabled computing capabilities on weather indices
from HOAPS data for climate impact modeling and change
detection.
Abstract: this paper presents a novel neural network controller
with composite adaptation low to improve the trajectory tracking
problems of biped robots comparing with classical controller. The
biped model has 5_link and 6 degrees of freedom and actuated by
Plated Pneumatic Artificial Muscle, which have a very high power to
weight ratio and it has large stoke compared to similar actuators. The
proposed controller employ a stable neural network in to approximate
unknown nonlinear functions in the robot dynamics, thereby
overcoming some limitation of conventional controllers such as PD
or adaptive controllers and guarantee good performance. This NN
controller significantly improve the accuracy requirements by
retraining the basic PD/PID loop, but adding an inner adaptive loop
that allows the controller to learn unknown parameters such as
friction coefficient, therefore improving tracking accuracy.
Simulation results plus graphical simulation in virtual reality show
that NN controller tracking performance is considerably better than
PD controller tracking performance.
Abstract: In the automotive industry test drives are being conducted
during the development of new vehicle models or as a part of
quality assurance of series-production vehicles. The communication
on the in-vehicle network, data from external sensors, or internal
data from the electronic control units is recorded by automotive
data loggers during the test drives. The recordings are used for fault
analysis. Since the resulting data volume is tremendous, manually
analysing each recording in great detail is not feasible.
This paper proposes to use machine learning to support domainexperts
by preventing them from contemplating irrelevant data and
rather pointing them to the relevant parts in the recordings. The
underlying idea is to learn the normal behaviour from available
recordings, i.e. a training set, and then to autonomously detect
unexpected deviations and report them as anomalies.
The one-class support vector machine “support vector data description”
is utilised to calculate distances of feature vectors. SVDDSUBSEQ
is proposed as a novel approach, allowing to classify subsequences
in multivariate time series data. The approach allows to
detect unexpected faults without modelling effort as is shown with
experimental results on recordings from test drives.
Abstract: This research work is aimed at speech recognition
using scaly neural networks. A small vocabulary of 11 words were
established first, these words are “word, file, open, print, exit, edit,
cut, copy, paste, doc1, doc2". These chosen words involved with
executing some computer functions such as opening a file, print
certain text document, cutting, copying, pasting, editing and exit.
It introduced to the computer then subjected to feature extraction
process using LPC (linear prediction coefficients). These features are
used as input to an artificial neural network in speaker dependent
mode. Half of the words are used for training the artificial neural
network and the other half are used for testing the system; those are
used for information retrieval.
The system components are consist of three parts, speech
processing and feature extraction, training and testing by using neural
networks and information retrieval.
The retrieve process proved to be 79.5-88% successful, which is
quite acceptable, considering the variation to surrounding, state of
the person, and the microphone type.
Abstract: In ad hoc networks, the main issue about designing of protocols is quality of service, so that in wireless sensor networks the main constraint in designing protocols is limited energy of sensors. In fact, protocols which minimize the power consumption in sensors are more considered in wireless sensor networks. One approach of reducing energy consumption in wireless sensor networks is to reduce the number of packages that are transmitted in network. The technique of collecting data that combines related data and prevent transmission of additional packages in network can be effective in the reducing of transmitted packages- number. According to this fact that information processing consumes less power than information transmitting, Data Aggregation has great importance and because of this fact this technique is used in many protocols [5]. One of the Data Aggregation techniques is to use Data Aggregation tree. But finding one optimum Data Aggregation tree to collect data in networks with one sink is a NP-hard problem. In the Data Aggregation technique, related information packages are combined in intermediate nodes and form one package. So the number of packages which are transmitted in network reduces and therefore, less energy will be consumed that at last results in improvement of longevity of network. Heuristic methods are used in order to solve the NP-hard problem that one of these optimization methods is to solve Simulated Annealing problems. In this article, we will propose new method in order to build data collection tree in wireless sensor networks by using Simulated Annealing algorithm and we will evaluate its efficiency whit Genetic Algorithm.
Abstract: We investigated oxidative DNA damage caused by
radio frequency radiation using 8-oxo-7, 8-dihydro-2'-
deoxyguanosine (8-oxodG) generated in mice tissues after exposure
to 900 MHz mobile phone radio frequency in three independent
experiments. The RF was generated by a Global System for Mobile
Communication (GSM) signal generator. The radio frequency field
was adjusted to 25 V/m. The whole body specific absorption rate
(SAR) was 1.0 W/kg. Animals were exposed to this field for 30 min
daily for 30 days. 24 h post-exposure, blood serum, brain and spleen
were removed and DNA was isolated. Enzyme-linked
immunosorbent assay (ELISA) was used to measure 8-oxodG
concentration. All animals survived the whole experimental period.
The body weight of animals did not change significantly at the end of
the experiment. No statistically significant differences observed in
the levels of oxidative stress. Our results are not in favor of the
hypothesis that 900 MHz RF induces oxidative damage.
Abstract: It well recognized that one feature that makes a
successful company is its ability to successfully align its business goals with its information communication technologies platform.
Enterprise Resource Planning (ERP) systems contribute to achieve better performance by integrating various business functions and
providing support for information flows. However, the technological
systems complexity is known to prevent the business users to exploit in an efficient way the Enterprise Resource Planning Systems (ERP).
This paper aims to investigate the role of training in improving the
usage of ERP systems. To this end, we have designed an instrument
survey to employees of a Norwegian multinational global provider of
technology solutions. Based on the analysis of collected data, we have delineated a training model that could be high relevance for
both researchers and practitioners as a step towards a better
understanding of ERP system implementation.
Abstract: In this study, a synthetic pathway was created by
assembling genes from Clostridium butyricum and Escherichia coli
in different combinations. Among the genes were dhaB1 and dhaB2
from C. butyricum VPI1718 coding for glycerol dehydratase (GDHt)
and its activator (GDHtAc), respectively, involved in the conversion
of glycerol to 3-hydroxypropionaldehyde (3-HPA). The yqhD gene
from E.coli BL21 was also included which codes for an NADPHdependent
1,3-propanediol oxidoreductase isoenzyme (PDORI)
reducing 3-HPA to 1,3-propanediol (1,3-PD). Molecular modeling
analysis indicated that the conformation of fusion protein of YQHD
and DHAB1 was favorable for direct molecular channeling of the
intermediate 3-HPA. According to the simulation results, the yqhD
and dhaB1 gene were assembled in the upstream of dhaB2 to express
a fusion protein, yielding the recombinant strain E. coliBL21
(DE3)//pET22b+::yqhD-dhaB1_dhaB2 (strain BP41Y3). Strain
BP41Y3 gave 10-fold higher 1,3-PD concentration than E. coliBL21
(DE3)//pET22b+::yqhD-dhaB1_dhaB2 (strain BP31Y2) expressing
the recombinant enzymes simultaneously but in a non-fusion mode.
This is the first report using a gene fusion approach to enhance the
biological conversion of glycerol to the value added compound 1,3-
PD.
Abstract: Participation in sporting activities can lead to injury.
Sport injuries have been widely studied in many sports including the
more extreme categories of aquatic board sports. Kitesurfing is a
relatively new water surface action sport, and has not yet been
widely studied in terms of injuries and stress on the body. The aim of
this study was to get information about which injuries that are most
common among kitesurfing participants, where they occur, and their
causes. Injuries were studied using an international open web
questionnaire (n=206).
The results showed that many respondents reported injuries, in
total 251 injuries to knee (24%), ankle (17%), trunk (16%) and
shoulders (10%), often sustained while doing jumps and tricks
(40%). Among the reported injuries were joint injuries (n=101),
muscle/tendon damages (n=47), wounds and cuts (n=36) and bone
fractures (n=28). Also environmental factors and equipment can
influence the risk of injury, or the extent of injury in a hazardous
situation. Conclusively, the information from this retrospective study
supports earlier studies in terms of prevalence and site of injuries.
Suggestively, this information should be used for to build a
foundation of knowledge about the sport for development of
applications for physical training and product development.
Abstract: The aim of this article is to explain how features of attacks could be extracted from the packets. It also explains how vectors could be built and then applied to the input of any analysis stage. For analyzing, the work deploys the Feedforward-Back propagation neural network to act as misuse intrusion detection system. It uses ten types if attacks as example for training and testing the neural network. It explains how the packets are analyzed to extract features. The work shows how selecting the right features, building correct vectors and how correct identification of the training methods with nodes- number in hidden layer of any neural network affecting the accuracy of system. In addition, the work shows how to get values of optimal weights and use them to initialize the Artificial Neural Network.
Abstract: The use of hard and brittle material has become
increasingly more extensive in recent years. Therefore processing of
these materials for the parts fabrication has become a challenging
problem. However, it is time-consuming to machine the hard brittle
materials with the traditional metal-cutting technique that uses
abrasive wheels. In addition, the tool would suffer excessive wear as
well. However, if ultrasonic energy is applied to the machining
process and coupled with the use of hard abrasive grits, hard and
brittle materials can be effectively machined. Ultrasonic machining
process is mostly used for the brittle materials. The present research
work has developed models using finite element approach to predict
the mechanical stresses sand strains produced in the tool during
ultrasonic machining process. Also the flow behavior of abrasive
slurry coming out of the nozzle has been studied for simulation using
ANSYS CFX module. The different abrasives of different grit sizes
have been used for the experimentation work.
Abstract: In the present study, fracture behavior of woven
fabric-reinforced glass/epoxy composite laminates under mode III
crack growth was experimentally investigated and numerically
modeled. Two methods were used for the calculation of the strain
energy release rate: the experimental compliance calibration (CC)
method and the Virtual Crack Closure Technique (VCCT). To
achieve this aim ECT (Edge Crack Torsion) was used to evaluate
fracture toughness in mode III loading (out of plane-shear) at
different crack lengths. Load–displacement and associated energy
release rates were obtained for various case of interest. To
calculate fracture toughness JIII, two criteria were considered
including non-linearity and maximum points in load-displacement
curve and it is observed that JIII increases with the crack length
increase. Both the experimental compliance method and the virtual
crack closure technique proved applicable for the interpretation of the
fracture mechanics data of woven glass/epoxy laminates in mode III.
Abstract: The trial in the city, located 170 kilometers from the
Iranian city of Ahvaz was Omidiyeh. The main factor in this project
includes 4 levels in control (without hormones), use of hormones in
the seed, vegetative and flowering stage respectively. And sub-plots
included 3 varieties of vetch in three levels, with local names, was the
jewel in the study of light and Auxin in the vegetative and
reproductive different times in different varieties of vetch was
investigated. This test has been taken in the plots in a randomized
complete block with four replications. In order to study the effects of
the hormone Auxin in the growth stages (seed, vegetative and
flowering) to control (no hormone Auxin) on three local varieties of
vetch, the essence of light and plant height, number of pods per plant,
seed number The pods, seeds per plant, grain weight, grain yield,
plant dry weight and protein content were measured. Among the
vetch varieties for plant height, number of pods per plant, a seed per
plant, grain weight, grain yield, and plant dry weight and protein
levels of 1 percent of plant and seed number per pod per plant at 5%
level of There was no significant difference. Interactions for grain
yield per plant, grain yield and protein levels of 1 percent and the
number of seeds per pod and seed weight are significant differences
in levels 5 and plant height and plant dry weight of the interaction
were INFLUENCE There was no significant difference in them.
Abstract: Vehicle suspension design must fulfill
some conflicting criteria. Among those is ride comfort
which is attained by minimizing the acceleration
transmitted to the sprung mass, via suspension spring
and damper. Also good handling of a vehicle is a
desirable property which requires stiff suspension and
therefore is in contrast with a vehicle with good ride.
Among the other desirable features of a suspension is
the minimization of the maximum travel of suspension.
This travel which is called suspension working space in
vehicle dynamics literature is also a design constraint
and it favors good ride. In this research a full car 8
degrees of freedom model has been developed and the
three above mentioned criteria, namely: ride, handling
and working space has been adopted as objective
functions. The Multi Objective Programming (MOP)
discipline has been used to find the Pareto Front and
some reasoning used to chose a design point between
these non dominated points of Pareto Front.
Abstract: Traditionally, terror groups have been formed by ideologically aligned actors who perceive a lack of options for achieving political or social change. However, terrorist attacks have been increasingly carried out by small groups of actors or lone individuals who may be only ideologically affiliated with larger, formal terrorist organizations. The formation of these groups represents the inverse of traditional organizational growth, whereby structural de-evolution within issue-based organizations leads to the formation of small, independent terror cells. Ideological franchising – the bypassing of formal affiliation to the “parent" organization – represents the de-evolution of traditional concepts of organizational structure in favor of an organic, independent, and focused unit. Traditional definitions of dark networks that are issue-based include focus on an identified goal, commitment to achieving this goal through unrestrained actions, and selection of symbolic targets. The next step in the de-evolution of small dark networks is the miniorganization, consisting of only a handful of actors working toward a common, violent goal. Information-sharing through social media platforms, coupled with civil liberties of democratic nations, provide the communication systems, access to information, and freedom of movement necessary for small dark networks to flourish without the aid of a parent organization. As attacks such as the 7/7 bombings demonstrate the effectiveness of small dark networks, terrorist actors will feel increasingly comfortable aligning with an ideology only, without formally organizing. The natural result of this de-evolving organization is the single actor event, where an individual seems to subscribe to a larger organization-s violent ideology with little or no formal ties.