Abstract: In two studies we tested the hypothesis that the
appropriate linguistic formulation of a deontic rule – i.e. the
formulation which clarifies the monadic nature of deontic operators
- should produce more correct responses than the conditional
formulation in Wason selection task. We tested this assumption by
presenting a prescription rule and a prohibition rule in conditional
vs. proper deontic formulation. We contrasted this hypothesis with
two other hypotheses derived from social contract theory and
relevance theory. According to the first theory, a deontic rule
expressed in terms of cost-benefit should elicit a cheater detection
module, sensible to mental states attributions and thus able to
discriminate intentional rule violations from accidental rule
violations. We tested this prevision by distinguishing the two types
of violations. According to relevance theory, performance in
selection task should improve by increasing cognitive effect and
decreasing cognitive effort. We tested this prevision by focusing
experimental instructions on the rule vs. the action covered by the
rule. In study 1, in which 480 undergraduates participated, we
tested these predictions through a 2 x 2 x 2 x 2 (type of the rule x
rule formulation x type of violation x experimental instructions)
between-subjects design. In study 2 – carried out by means of a 2 x
2 (rule formulation x type of violation) between-subjects design -
we retested the hypothesis of rule formulation vs. the cheaterdetection
hypothesis through a new version of selection task in
which intentional vs. accidental rule violations were better
discriminated. 240 undergraduates participated in this study.
Results corroborate our hypothesis and challenge the contrasting
assumptions. However, they show that the conditional formulation
of deontic rules produces a lower performance than what is
reported in literature.
Abstract: This paper presents the results of an analytical study
on the seismic response of a Multi-Span-Simply-Supported precast
bridge in Washington State. The bridge was built in the early 1960's
along Interstate 5 and was widened the first time in 1979 and the
second time in 2001. The primary objective of this research project
is to determine the seismic vulnerability of the bridge in order to
develop the required retrofit measure. The seismic vulnerability of
the bridge is evaluated using two seismic evaluation methods
presented in the FHWA Seismic Retrofitting Manual for Highway
Bridges, Method C and Method D2. The results of the seismic
analyses demonstrate that Method C and Method D2 vary markedly
in terms of the information they provide to the bridge designer
regarding the vulnerability of the bridge columns.
Abstract: This paper describes a code clone visualization method, called FC graph, and the implementation issues. Code clone detection tools usually show the results in a textual representation. If the results are large, it makes a problem to software maintainers with understanding them. One of the approaches to overcome the situation is visualization of code clone detection results. A scatter plot is a popular approach to the visualization. However, it represents only one-to-one correspondence and it is difficult to find correspondence of code clones over multiple files. FC graph represents correspondence among files, code clones and packages in Java. All nodes in FC graph are positioned using force-directed graph layout, which is dynami- cally calculated to adjust the distances of nodes until stabilizing them. We applied FC graph to some open source programs and visualized the results. In the author’s experience, FC graph is helpful to grasp correspondence of code clones over multiple files and also code clones with in a file.
Abstract: In this paper, an analytical approach for free vibration
analysis of four edges simply supported rectangular Kirchhoff plates
is presented. The method is based on wave approach. From wave
standpoint vibration propagate, reflect and transmit in a structure.
Firstly, the propagation and reflection matrices for plate with simply
supported boundary condition are derived. Then, these matrices are
combined to provide a concise and systematic approach to free
vibration analysis of a simply supported rectangular Kirchhoff plate.
Subsequently, the eigenvalue problem for free vibration of plates is
formulated and the equation of plate natural frequencies is
constructed. Finally, the effectiveness of the approach is shown by
comparison of the results with existing classical solution.
Abstract: The present work demonstrates the design and simulation of a fuzzy control of an air conditioning system at different pressures. The first order Sugeno fuzzy inference system is utilized to model the system and create the controller. In addition, an estimation of the heat transfer rate and water mass flow rate injection into or withdraw from the air conditioning system is determined by the fuzzy IF-THEN rules. The approach starts by generating the input/output data. Then, the subtractive clustering algorithm along with least square estimation (LSE) generates the fuzzy rules that describe the relationship between input/output data. The fuzzy rules are tuned by Adaptive Neuro-Fuzzy Inference System (ANFIS). The results show that when the pressure increases the amount of water flow rate and heat transfer rate decrease within the lower ranges of inlet dry bulb temperatures. On the other hand, and as pressure increases the amount of water flow rate and heat transfer rate increases within the higher ranges of inlet dry bulb temperatures. The inflection in the pressure effect trend occurs at lower temperatures as the inlet air humidity increases.
Abstract: A Rotary Disc Contactor with inner diameter of
9.1cm and maximum operating height of 40cm has been used to
investigate break up phenomenon. Water-Toluene, Water as
continuous phase and Toluene as dispersed phase, was selected as
chemical system in the experiments. The mentioned chemical system
has high interfacial tension so it was possible to form big drops
which permit accurate investigation on break up phenomenon as well
as the first and second critical rotor speeds.
In this study, Break up phenomenon has been studied as a function
of mother drop size, rotor speed and continuous phase height. Further
more; the effects of mother drop size and continuous phase height on
the first and second critical rotor speeds were investigated. Finally,
two modified correlations were proposed to estimate the first and
second critical speeds.
Abstract: Random Oracle Model (ROM) is an effective method
for measuring the practical security of cryptograph. In this paper, we
try to use it into information hiding system (IHS). Because IHS has its
own properties, the ROM must be modified if it is used into IHS.
Firstly, we fully discuss why and how to modify each part of ROM
respectively. The main changes include: 1) Divide the attacks that IHS
may be suffered into two phases and divide the attacks of each phase
into several kinds. 2) Distinguish Oracles and Black-boxes clearly. 3)
Define Oracle and four Black-boxes that IHS used. 4) Propose the
formalized adversary model. And 5) Give the definition of judge.
Secondly, based on ROM of IHS, the security against known original
cover attack (KOCA-KOCA-security) is defined. Then, we give an
actual information hiding scheme and prove that it is
KOCA-KOCA-secure. Finally, we conclude the paper and propose the
open problems of further research.
Abstract: In this paper first, Two buildings have been modeled
and then analyzed using nonlinear static analysis method under two
different conditions in Nonlinear SAP 2000 software. In the first
condition the interaction of soil adjacent to the walls of basement are
ignored while in the second case this interaction have been modeled
using Gap elements of nonlinear SAP2000 software. Finally,
comparing the results of two models, the effects of soil-structure on
period, target point displacement, internal forces, shape deformations
and base shears have been studied. According to the results, this
interaction has always increased the base shear of buildings,
decreased the period of structure and target point displacement, and
often decreased the internal forces and displacements.
Abstract: Wavelet transform provides several important
characteristics which can be used in a texture analysis and
classification. In this work, an efficient texture classification method,
which combines concepts from wavelet and co-occurrence matrices,
is presented. An Euclidian distance classifier is used to evaluate the
various methods of classification. A comparative study is essential to
determine the ideal method. Using this conjecture, we developed a
novel feature set for texture classification and demonstrate its
effectiveness
Abstract: In wireless sensor network (WSN) the use of mobile
sink has been attracting more attention in recent times. Mobile sinks
are more effective means of balancing load, reducing hotspot
problem and elongating network lifetime. The sensor nodes in WSN
have limited power supply, computational capability and storage and
therefore for continuous data delivery reliability becomes high
priority in these networks. In this paper, we propose a Reliable
Energy-efficient Data Dissemination (REDD) scheme for WSNs with
multiple mobile sinks. In this strategy, sink first determines the
location of source and then directly communicates with the source
using geographical forwarding. Every forwarding node (FN) creates a
local zone comprising some sensor nodes that can act as
representative of FN when it fails. Analytical and simulation study
reveals significant improvement in energy conservation and reliable
data delivery in comparison to existing schemes.
Abstract: After allowing direct flights from Mainland China to
Taiwan, Chinese tourists increased according to Tourism
Bureaustatistics. There are from 0.19 to 2 million tourists from 2008 to
2011. Mainland China has become the main source of Taiwan
developing tourism industry. Taiwanese government should know
more about comments from Chinese tourists to Taiwan in order
toproperly market Taiwan tourism and enhance the overall quality of
tourism. In order to understand Chinese visitors’ comments, this study
adopts content analysis to analyze electronic word-of-mouth on Web.
This study collects 375 blog articles of Chinese tourists from
Ctrip.com as a database during 2009 to 2011. Through the qualitative
data analysis the traveling destination imagesis divided into seven
dimensions, such as senic spots, shopping, food and beverages,
accommodations, transportation, festivals and recreation activities.
Finally, this study proposes some practical managerial implication to
know both positive and negative images of the seven dimensions from
Chinese tourists, providing marketing strategies and suggestions to
traveling agency industry.
Abstract: The dome with ribs and rings, which covers the
ROMEXPO pavilion from Bucharest, was designed after the collapse
of the single layer reticulated dome. In this paper, it was made the
checking of the structure, under the dynamic loads with three
recorded accelerograms calibrated according to Romanian seismic
design code P100-1/2006. Under the action the dynamic loadings, it
was made a time-history analysis to determine the zones where the
plastic hinges appear, at what accelerations and their position on the
structure. The studied dome is formed by 32 spatial semi arches and
three rings: one circular ring located at the top of the dome and
another two rings, design as trusses, the first near the supports and the
second as an intermediate rings above the skylights. Above the
skylights up to the top, the dome is tight together with purlins and
bracings.
Abstract: The process of constructing a scale measuring the attitudes of youth toward violence on televisions is reported. A 30-item draft attitude scale was applied to a working group of 232 students attending the Faculty of Educational Sciences at Ankara University between the years 2005-2006. To introduce the construct validity and dimensionality of the scale, exploratory and confirmatory factor analysis was applied to the data. Results of the exploratory factor analysis showed that the scale had three factors that accounted for 58,44% (22,46% for the first, 22,15% for the second and 13,83% for the third factor) of the common variance. It is determined that the first factor considered issues related individual effects of violence on televisions, the second factor concerned issues related social effects of violence on televisions and the third factor concerned issues related violence on television programs. Results of the confirmatory factor analysis showed that all the items under each factor are fitting the concerning factors structure. An alpha reliability of 0,90 was estimated for the whole scale. It is concluded that the scale is valid and reliable.
Abstract: In the project FleGSens, a wireless sensor network
(WSN) for the surveillance of critical areas and properties is currently developed which incorporates mechanisms to ensure information
security. The intended prototype consists of 200 sensor nodes for
monitoring a 500m long land strip. The system is focused on ensuring
integrity and authenticity of generated alarms and availability in the
presence of an attacker who may even compromise a limited number
of sensor nodes. In this paper, two of the main protocols developed
in the project are presented, a tracking protocol to provide secure
detection of trespasses within the monitored area and a protocol for secure detection of node failures. Simulation results of networks
containing 200 and 2000 nodes as well as the results of the first prototype comprising a network of 16 nodes are presented. The focus of the simulations and prototype are functional testing of the protocols
and particularly demonstrating the impact and cost of several attacks.
Abstract: We present analysis of spatial patterns of generic
disease spread simulated by a stochastic long-range correlation SIR
model, where individuals can be infected at long distance in a power
law distribution. We integrated various tools, namely perimeter,
circularity, fractal dimension, and aggregation index to characterize
and investigate spatial pattern formations. Our primary goal was to
understand for a given model of interest which tool has an advantage
over the other and to what extent. We found that perimeter and
circularity give information only for a case of strong correlation–
while the fractal dimension and aggregation index exhibit the growth
rule of pattern formation, depending on the degree of the correlation
exponent (β). The aggregation index method used as an alternative
method to describe the degree of pathogenic ratio (α). This study may
provide a useful approach to characterize and analyze the pattern
formation of epidemic spreading
Abstract: The state of melt viscosity in injection process is significantly influenced by the setting parameters due to that the shear rate of injection process is higher than other processes. How to determine plastic melt viscosity during injection process is important to understand the influence of setting parameters on the melt viscosity. An apparatus named as pressure sensor bushing (PSB) module that is used to evaluate the melt viscosity during injection process is developed in this work. The formulations to coupling melt viscosity with fill time and injection pressure are derived and then the melt viscosity is determined. A test mold is prepared to evaluate the accuracy on viscosity calculations between the PSB module and the conventional approaches. The influence of melt viscosity on the tensile strength of molded part is proposed to study the consistency of injection quality.
Abstract: Crystallization has been used for the separation of
chloronitrobenzene or CNBs, which are isomeric substances (o-, mand
p-CNB) and important intermediates in chemical productions. Effects of feed composition on the crystallization of m- and p-CNB was first studied. The results conform to the binary phase diagram of
m- and p-CNB. After that, effects of FAU zeolites (NaX, CaX, BaX, NaY and CaY) above the eutectic composition (63.5 and 65.0 wt% m-CNB in the feed) was also investigated. The results showed that
the FAU zeolites significantly affected the precipitates, the
composition of which was shifted from being rich in m-CNB to rich
in p-CNB. Effects of the number of FAU zeolites on the precipitate composition was then studied. The results revealed that the
precipitates from the lower number of the zeolites had higher p-CNB purity than those from the higher number of zeolite.
Abstract: Classification is one of the primary themes in
computational biology. The accuracy of classification strongly
depends on quality of a dataset, and we need some method to
evaluate this quality. In this paper, we propose a new graphical
analysis method using 'Membership-Deviation Graph (MDG)' for
analyzing quality of a dataset. MDG represents degree of
membership and deviations for instances of a class in the dataset. The
result of MDG analysis is used for understanding specific feature and
for selecting best feature for classification.
Abstract: In this paper in consideration of each available
techniques deficiencies for speech recognition, an advanced method
is presented that-s able to classify speech signals with the high
accuracy (98%) at the minimum time. In the presented method, first,
the recorded signal is preprocessed that this section includes
denoising with Mels Frequency Cepstral Analysis and feature
extraction using discrete wavelet transform (DWT) coefficients; Then
these features are fed to Multilayer Perceptron (MLP) network for
classification. Finally, after training of neural network effective
features are selected with UTA algorithm.
Abstract: In this work a novel approach for color image
segmentation using higher order entropy as a textural feature for
determination of thresholds over a two dimensional image histogram
is discussed. A similar approach is applied to achieve multi-level
thresholding in both grayscale and color images. The paper discusses
two methods of color image segmentation using RGB space as the
standard processing space. The threshold for segmentation is decided
by the maximization of conditional entropy in the two dimensional
histogram of the color image separated into three grayscale images of
R, G and B. The features are first developed independently for the
three ( R, G, B ) spaces, and combined to get different color
component segmentation. By considering local maxima instead of the
maximum of conditional entropy yields multiple thresholds for the
same image which forms the basis for multilevel thresholding.