Abstract: The argument that self-disclosure will change the
psychoanalytic process into a socio-cultural niche distorting the
therapeutic alliance and compromise therapeutic effectiveness is still
the widely held belief amongst many psychotherapists. This paper
considers the issues surrounding culture, disclosure and concealment
since they remain largely untheorized and clinically problematic. The
first part of the paper will critically examine the theory and practice
of psychoanalysis across cultures, and explore the reasons for
culturally diverse patients to conceal rather than disclose their
feelings and thoughts in the transference. This is followed by a
discussion on how immigrant analysts- anonymity is difficult to
maintain since diverse nationalities, language and accents provide
clues to the therapist-s and patient-s origins. Through personal
clinical examples of one the author-s (who is an immigrant) the paper
analyses the transference-countertransference paradigm and how it
reflects in the analyst-s self-revelation.
Abstract: In 2011, Debiao et al. pointed out that S-3PAKE protocol proposed by Lu and Cao for password-authenticated key exchange in the three-party setting is vulnerable to an off-line dictionary attack. Then, they proposed some countermeasures to eliminate the security vulnerability of the S-3PAKE. Nevertheless, this paper points out their enhanced S-3PAKE protocol is still vulnerable to undetectable on-line dictionary attacks unlike their claim.
Abstract: The one of most important objects in implementation
of damage analysis observations is manner of dam break wave
propagation. In this paper velocity and wave height due dam break in
with and without tailwater states for appointment hazardous lands
and flood radius are investigate. In order to modeling above
phenomenon finite volume method of Roe type for solving shallow
water equations is used. Results indicated that in the dry bed state
risk radius due to dam break is too high. While in the wet bed risk
radius has a less wide. Therefore in the first state constructions and
storage facilities are encountered with destruction risk. Further
velocity due to dam break in the second state is more comparing to
the first state. Hence erosion and scour the river bed in the dry bed is
too more compare to the wet bed.
Abstract: As a vital activity for companies, new product
development (NPD) is also a very risky process due to the high
uncertainty degree encountered at every development stage and the
inevitable dependence on how previous steps are successfully
accomplished. Hence, there is an apparent need to evaluate new
product initiatives systematically and make accurate decisions under
uncertainty. Another major concern is the time pressure to launch a
significant number of new products to preserve and increase the
competitive power of the company. In this work, we propose an
integrated decision-making framework based on neural networks and
fuzzy logic to make appropriate decisions and accelerate the
evaluation process. We are especially interested in the two initial
stages where new product ideas are selected (go/no go decision) and
the implementation order of the corresponding projects are
determined. We show that this two-staged intelligent approach allows
practitioners to roughly and quickly separate good and bad product
ideas by making use of previous experiences, and then, analyze a
more shortened list rigorously.
Abstract: Natural gas usually includes H2S component which is
very toxic, hazardous and corrosive to environment, human being and
process equipments, respectively. Therefore, sweetening of the gas
(separation of H2S) is inevitable. To achieve this purpose, using
packed-bed columns with liquid absorbents such as MEA or DEA is
very common. Due to some problems of usual packed columns
especially high pressure drop of gas phase, a novel kind of them
called wetted-wire column (WWC) has been invented. The column
decreases the pressure drop significantly and improves the absorption
efficiency. The packings are very thin rods (like wire) and as long as
column. The column has 100 wires with a triangular arrangement and
counter current flows of gas and liquid phases. The observation
showed that at the same conditions, the absorption performance was
quite comparable to conventional packed-bed towers and a very low
pressure drop.
Abstract: Oxide scale thickness measurements are used in assessing the life of different components operating at high temperature environment. Such measurements provide an approximation for the temperature inside components such as reheater and superheater tubes. A number of failures were encountered in one of the boilers in one of Kuwaiti power plants. These failure were mainly in the first row of the primary super heater tubes, therefore, the specialized engineer decide to replace them during the annual shutdown. As a tool for failure analysis, oxide scale thickness measurement were used to investigate the temperature distribution in these tubes. In this paper, the oxide scale thickness of these tubes were measured and used for analysis. The measurements provide an illustration of the distribution of heat transfer of the primary superheater tubes in the boiler system. Remarks and analysis about the design of the boiler are also provided.
Abstract: The performance results of the athletes competed in
the 1988-2008 Olympic Games were analyzed (n = 166). The data
were obtained from the IAAF official protocols. In the principal
component analysis, the first three principal components explained
70% of the total variance. In the 1st principal component (with
43.1% of total variance explained) the largest factor loadings were
for 100m (0.89), 400m (0.81), 110m hurdle run (0.76), and long jump
(–0.72). This factor can be interpreted as the 'sprinting performance'.
The loadings on the 2nd factor (15.3% of the total variance)
presented a counter-intuitive throwing-jumping combination: the
highest loadings were for throwing events (javelin throwing 0.76;
shot put 0.74; and discus throwing 0.73) and also for jumping events
(high jump 0.62; pole vaulting 0.58). On the 3rd factor (11.6% of
total variance), the largest loading was for 1500 m running (0.88); all
other loadings were below 0.4.
Abstract: This paper examines ethical and social issues which
have proved important when initiating and creating educational spaces within a virtual environment. It focuses on one project, identifying the key decisions made, the barriers to new practice
encountered and the impact these had on the project. It demonstrates
the importance of the 'backstage' ethical and social issues involved in
the creation of a virtual education community and offers conclusions,
and questions, which will inform future research and practice in this
area. These ethical issues are considered using Knobel-s framework
of front-end, in-process and back-end concerns, and include
establishing social practices for the islands, allocating access rights,
considering personal safety and supporting researchers appropriately
within this context.
Abstract: There are various overlay structures that provide
efficient and scalable solutions for point and range query in a peer-topeer
network. Overlay structure based on m-Binary Search Tree
(BST) is one such popular technique. It deals with the division of the
tree into different key intervals and then assigning the key intervals to
a BST. The popularity of the BST makes this overlay structure
vulnerable to different kinds of attacks. Here we present four such
possible attacks namely index poisoning attack, eclipse attack,
pollution attack and syn flooding attack. The functionality of BST is
affected by these attacks. We also provide different security
techniques that can be applied against these attacks.
Abstract: The interactions between input/output variables are a very common phenomenon encountered in the design of multi-loop controllers for interacting multivariable processes, which can be a serious obstacle for achieving a good overall performance of multiloop control system. To overcome this impediment, the decomposed dynamic interaction analysis is proposed by decomposing the multiloop control system into a set of n independent SISO systems with the corresponding effective open-loop transfer function (EOTF) within the dynamic interactions embedded explicitly. For each EOTF, the reduced model is independently formulated by using the proposed reduction design strategy, and then the paired multi-loop proportional-integral-derivative (PID) controller is derived quite simply and straightforwardly by using internal model control (IMC) theory. This design method can easily be implemented for various industrial processes because of its effectiveness. Several case studies are considered to demonstrate the superior of the proposed method.
Abstract: In recent years, the number of natural disasters in Laos has a trend to increase, especially the disaster of flood. To make a flood plan risk management in the future, it is necessary to understand and analyze the characteristics of the rainfall and Mekong River level data. To reduce the damage, this paper presents the flood risk analysis in Luangprabang and Vientiane, the prefecture of Laos. In detail, the relationship between the rainfall and the Mekong River level has evaluated and appropriate countermeasure for flood was discussed.
Abstract: This paper proposed high level feature for online Lao handwritten recognition. This feature must be high level enough so that the feature is not change when characters are written by different persons at different speed and different proportion (shorter or longer stroke, head, tail, loop, curve). In this high level feature, a character is divided in to sequence of curve segments where a segment start where curve reverse rotation (counter clockwise and clockwise). In each segment, following features are gathered cumulative change in direction of curve (- for clockwise), cumulative curve length, cumulative length of left to right, right to left, top to bottom and bottom to top ( cumulative change in X and Y axis of segment). This feature is simple yet robust for high accuracy recognition. The feature can be gather from parsing the original time sampling sequence X, Y point of the pen location without re-sampling. We also experiment on other segmentation point such as the maximum curvature point which was widely used by other researcher. Experiments results show that the recognition rates are at 94.62% in comparing to using maximum curvature point 75.07%. This is due to a lot of variations of turning points in handwritten.
Abstract: This paper made an attempt to investigate the problem associated with enhancement of emulsions of light crude oil-water recovery in an oil field of Algerian Sahara. Measurements were taken through experiments using RheoStress (RS600). Factors such as shear rate, temperature and light oil concentration on the viscosity behavior were considered. Experimental measurements were performed in terms of shear stress–shear rate, yield stress and flow index on mixture of light crude oil–water. The rheological behavior of emulsion showed Non-Newtonian shear thinning behavior (Herschel-Bulkley). The experiments done in the laboratory showed the stability of some water in light crude oil emulsions form during consolidate oil recovery process. To break the emulsion using additives may involve higher cost and could be very expensive. Therefore, further research should be directed to find solution of these problems that have been encountered.
Abstract: One of the most important aspects expected from an
ERP system is to mange user\administrator manual documents
dynamically. Since an ERP package is frequently changed during its
implementation in customer sites, it is often needed to add new
documents and/or apply required changes to existing documents in
order to cover new or changed capabilities. The worse is that since
these changes occur continuously, the corresponding documents
should be updated dynamically; otherwise, implementing the ERP
package in the organization encounters serious risks. In this paper, we
propose a new architecture which is based on the agent oriented
vision and supplies the dynamic document generation expected from
ERP systems using several independent but cooperative agents.
Beside the dynamic document generation which is the main issue of
this paper, the presented architecture will address some aspects of
intelligence and learning capabilities existing in ERP.
Abstract: We have studied the migration of a charged permeable aggregate in electrolyte under the influence of an axial electric field and pressure gradient. The migration of the positively charged aggregate leads to a deformation of the anionic cloud around it. The hydrodynamics of the aggregate is governed by the interaction of electroosmotic flow in and around the particle, hydrodynamic friction and electric force experienced by the aggregate. We have computed the non-linear Nernest-Planck equations coupled with the Dracy- Brinkman extended Navier-Stokes equations and Poisson equation for electric field through a finite volume method. The permeability of the aggregate enable the counterion penetration. The penetration of counterions depends on the volume charge density of the aggregate and ionic concentration of electrolytes at a fixed field strength. The retardation effect due to the double layer polarization increases the drag force compared to an uncharged aggregate. Increase in migration sped from the electrophretic velocity of the aggregate produces further asymmetry in charge cloud and reduces the electric body force exerted on the particle. The permeability of the particle have relatively little influence on the electric body force when Double layer is relatively thin. The impact of the key parameters of electrokinetics on the hydrodynamics of the aggregate is analyzed.
Abstract: Land shortage for burials is one of many issues that emerge out of accelerated urban growth in most developing Asian cities, including Kuala Lumpur. Despite actions taken by the federal government and local authorities in addressing this issue, there is no strategic solution being formulated. Apart from making provisions for land to be developed as new cemeteries, the future plan is merely to allocate reserve land to accommodate the increasing demands of burial grounds around the city. This paper examines problems that arise from the traditional practices of Malay funerary as well as an insight to current urban practices in managing Muslim burial spaces around Kuala Lumpur metropolitan region. This paper will also provide some solutions through design approach that can be applied to counter the existing issues.
Abstract: A multilayer self organizing neural neural network
(MLSONN) architecture for binary object extraction, guided by a beta
activation function and characterized by backpropagation of errors
estimated from the linear indices of fuzziness of the network output
states, is discussed. Since the MLSONN architecture is designed to
operate in a single point fixed/uniform thresholding scenario, it does
not take into cognizance the heterogeneity of image information in
the extraction process. The performance of the MLSONN architecture
with representative values of the threshold parameters of the beta
activation function employed is also studied. A three layer bidirectional
self organizing neural network (BDSONN) architecture
comprising fully connected neurons, for the extraction of objects from
a noisy background and capable of incorporating the underlying image
context heterogeneity through variable and adaptive thresholding,
is proposed in this article. The input layer of the network architecture
represents the fuzzy membership information of the image scene to
be extracted. The second layer (the intermediate layer) and the final
layer (the output layer) of the network architecture deal with the self
supervised object extraction task by bi-directional propagation of the
network states. Each layer except the output layer is connected to the
next layer following a neighborhood based topology. The output layer
neurons are in turn, connected to the intermediate layer following
similar topology, thus forming a counter-propagating architecture
with the intermediate layer. The novelty of the proposed architecture
is that the assignment/updating of the inter-layer connection weights
are done using the relative fuzzy membership values at the constituent
neurons in the different network layers. Another interesting feature
of the network lies in the fact that the processing capabilities of
the intermediate and the output layer neurons are guided by a beta
activation function, which uses image context sensitive adaptive
thresholding arising out of the fuzzy cardinality estimates of the
different network neighborhood fuzzy subsets, rather than resorting to
fixed and single point thresholding. An application of the proposed
architecture for object extraction is demonstrated using a synthetic
and a real life image. The extraction efficiency of the proposed
network architecture is evaluated by a proposed system transfer index
characteristic of the network.
Abstract: Since IEC61850 substation communication standard represents the trend to develop new generations of Substation Automation System (SAS), many IED manufacturers pursue this technique and apply for KEMA. In order to put on the market to meet customer demand as fast as possible, manufacturers often apply their products only for basic environment standard certification but claim to conform to IEC61850 certification. Since verification institutes generally perform verification tests only on specific IEDs of the manufacturers, the interoperability between all certified IEDs cannot be guaranteed. Therefore the interoperability between IEDs from different manufacturers needs to be tested. Based upon the above reasons, this study applies the definitions of the information models, communication service, GOOSE functionality and Substation Configuration Language (SCL) of the IEC61850 to build the concept of communication protocols, and build the test environment. The procedures of the test of the data collection and exchange of the P2P communication mode and Client / Server communication mode in IEC61850 are outlined as follows. First, test the IED GOOSE messages communication capability from different manufacturers. Second, collect IED data from each IED with SCADA system and use HMI to display the SCADA platform. Finally, problems generally encountered in the test procedure are summarized.
Abstract: Recent communications environment significantly
expands the mobile environment. The popularization of smartphones
with various mobile services has emerged, and smartphone users are
rapidly increasing. Because of these symptoms, existing wired
environment in a variety of mobile traffic entering to mobile network
has threatened the stability of the mobile network. Unlike traditional
wired infrastructure, mobile networks has limited radio resources and
signaling procedures for complex radio resource management. So
these traffic is not a problem in wired networks but mobile networks, it
can be a threat. In this paper, we analyze the security threats in mobile
networks and provide direction to solve it.
Abstract: This paper treats a discrete-time batch arrival queue with single working vacation. The main purpose of this paper is to present a performance analysis of this system by using the supplementary variable technique. For this purpose, we first analyze the Markov chain underlying the queueing system and obtain its ergodicity condition. Next, we present the stationary distributions of the system length as well as some performance measures at random epochs by using the supplementary variable method. Thirdly, still based on the supplementary variable method we give the probability generating function (PGF) of the number of customers at the beginning of a busy period and give a stochastic decomposition formulae for the PGF of the stationary system length at the departure epochs. Additionally, we investigate the relation between our discretetime system and its continuous counterpart. Finally, some numerical examples show the influence of the parameters on some crucial performance characteristics of the system.