Abstract: To derive the fractional flow equation oil
displacement will be assumed to take place under the so-called
diffusive flow condition. The constraints are that fluid saturations at
any point in the linear displacement path are uniformly distributed
with respect to thickness; this allows the displacement to be described
mathematically in one dimension. The simultaneous flow of oil and
water can be modeled using thickness averaged relative permeability,
along the centerline of the reservoir. The condition for fluid potential
equilibrium is simply that of hydrostatic equilibrium for which the
saturation distribution can be determined as a function of capillary
pressure and therefore, height. That is the fluids are distributed in
accordance with capillary-gravity equilibrium.
This paper focused on the fraction flow of water versus
cumulative oil recoveries using Buckley Leverett method. Several
field cases have been developed to aid in analysis. Producing watercut
(at surface conditions) will be compared with the cumulative oil
recovery at breakthrough for the flowing fluid.
Abstract: IVE toolkit has been created for facilitating research,education and development in the ?eld of virtual storytelling andcomputer games. Primarily, the toolkit is intended for modellingaction selection mechanisms of virtual humans, investigating level-of-detail AI techniques for large virtual environments, and for exploringjoint behaviour and role-passing technique (Sec. V). Additionally, thetoolkit can be used as an AI middleware without any changes. Themain facility of IVE is that it serves for prototyping both the AI andvirtual worlds themselves. The purpose of this paper is to describeIVE?s features in general and to present our current work - includingan educational game - on this platform.Keywords? AI middleware, simulation, virtual world.
Abstract: This paper presents the experimental results on space charge distribution in cross-linked polyethylene (XLPE) insulating material for 22 kV power distribution system cable by using pulse electroacoustic measurement technique (PEA). Numbers of XLPE insulating material ribbon having thickness 60 μm taken from unused 22 kV high voltage cable were used as specimen in this study. DC electric field stress was applied to test specimen at room temperature (25°C). Four levels of electric field stress, 25 kV/mm, 50 kV/mm, 75 kV/mm and 100 kV/mm, were used. In order to investigate space charge distribution characteristic, space charge distribution characteristics were measured after applying electric field stress 15 min, 30 min and 60 min, respectively. The results show that applied time and magnitude of dc electric field stress play an important role to the formation of space charge.
Abstract: An explicit axisymmetrical FE methodology is
developed here to study the particle temperature arising in WC-Co
particle on an AISI 1045 steel substrate. Parameters of constitutive
Johnson-cook model were used for simulation. The results show that
particle velocity and kinetic energy have important role in
temperature arising of particles.
Abstract: Image Edge Detection is one of the most important
parts of image processing. In this paper, by fuzzy technique, a new
method is used to improve digital image edge detection. In this
method, a 3x3 mask is employed to process each pixel by means of
vicinity. Each pixel is considered a fuzzy input and by examining
fuzzy rules in its vicinity, the edge pixel is specified and by utilizing
calculation algorithms in image processing, edges are displayed more
clearly. This method shows significant improvement compared to
different edge detection methods (e.g. Sobel, Canny).
Abstract: Maximal length sequences (m-sequences) are also
known as pseudo random sequences or pseudo noise sequences
for closely following Golomb-s popular randomness properties: (P1)
balance, (P2) run, and (P3) ideal autocorrelation. Apart from these,
there also exist certain other less known properties of such sequences
all of which are discussed in this tutorial paper. Comprehensive proofs
to each of these properties are provided towards better understanding
of such sequences. A simple test is also proposed at the end of
the paper in order to distinguish pseudo noise sequences from truly
random sequences such as Bernoulli sequences.
Abstract: A Space Vector based Pulse Width Modulation
control technique for the three-phase PWM converter is proposed in
this paper. The proposed control scheme is based on a synchronous
reference frame model. High performance and efficiency is obtained
with regards to the DC bus voltage and the power factor
considerations of the PWM rectifier thus leading to low losses.
MATLAB/SIMULINK are used as a platform for the simulations and
a SIMULINK model is presented in the paper. The results show that
the proposed model demonstrates better performance and properties
compared to the traditional SPWM method and the method improves
the dynamic performance of the closed loop drastically.
For the Space Vector based Pulse Width Modulation, Sine signal
is the reference waveform and triangle waveform is the carrier
waveform. When the value sine signal is large than triangle signal,
the pulse will start produce to high. And then when the triangular
signals higher than sine signal, the pulse will come to low. SPWM
output will changed by changing the value of the modulation index
and frequency used in this system to produce more pulse width. The
more pulse width produced, the output voltage will have lower
harmonics contents and the resolution increase.
Abstract: The purpose of this study was to investigate the religious behavior of students in high school and universality in Lamerd , a town in the south of Iran, with respect to increase in their level of education and age. The participants were 450 high school and university students in all levels from first year of junior high school
to the senior university students who were chosen through multistage
cluster sampling method and their religious behavior was
studied. Through the revised questionnaire by Nezar Alany from the University of Bahrain (r = 0/797), the religious behavior of the subjects were analyzed. Results showed that students in high school
in religious behavior were superior to the students of university (003/0>p) and there was a decline of religious behavior in junior high school third year students to second students of the same school
(042/0>p). More important is that the decrease in religious behavior was associated with increase in educational levels (017/0>p) and age (043/0>p).
Abstract: Energy efficiency is the key requirement in wireless sensor network as sensors are small, cheap and are deployed in very large number in a large geographical area, so there is no question of replacing the batteries of the sensors once deployed. Different ways can be used for efficient energy transmission including Multi-Hop algorithms, collaborative communication, cooperativecommunication, Beam- forming, routing algorithm, phase, frequency and time synchronization. The paper reviews the need for time synchronization and proposed a BFS based synchronization algorithm to achieve energy efficiency. The efficiency of our protocol has been tested and verified by simulation
Abstract: One of the major pollutants in the environment is arsenic (As). Due to the toxic effects of As to all organisms, its remediation is necessary. Conventional technologies used in the remediation of As contaminated soils are expensive and may even compromise the structure of the soil. An attractive alternative is phytoremediation, which is the use of plants which can take up the contaminant in their tissues. Plant growth promoting bacteria (PGPB) has been known to enhance growth of plants through several mechanisms such as phytohormone production, phosphate solubilization, siderophore production and 1-aminocyclopropane-1- carboxylate (ACC) deaminase production, which is an essential trait that aids plants especially under stress conditions such as As stress. Twenty one bacteria were isolated from As-contaminated soils in the vicinity of the Janghang Smelter in Chungnam Province, South Korea. These exhibited high tolerance to either arsenite (As III) or arsenate (As V) or both. Most of these isolates possess several plant growth promoting traits which can be potentially exploited to increase phytoremediation efficiency. Among the identified isolates is Pseudomonas sp. JS1215, which produces ACC deaminase, indole acetic acid (IAA), and siderophore. It also has the ability to solubilize phosphate. Inoculation of JS1215 significantly enhanced root and shoot length and biomass accumulation of maize under normal conditions. In the presence of As, particularly in lower As level, inoculation of JS1215 slightly increased root length and biomass. Ethylene increased with increasing As concentration, but was reduced by JS1215 inoculation. JS1215 can be a potential bioinoculant for increasing phytoremediation efficiency.
Abstract: The steady coupled dissipative layers, called
Marangoni mixed convection boundary layers, in the presence of a
magnetic field and solute concentration that are formed along the
surface of two immiscible fluids with uniform suction or injection
effects is examined. The similarity boundary layer equations are
solved numerically using the Runge-Kutta Fehlberg with shooting
technique. The Marangoni, buoyancy and external pressure gradient
effects that are generated in mixed convection boundary layer flow
are assessed. The velocity, temperature and concentration boundary
layers thickness decrease with the increase of the magnetic field
strength and the injection to suction. For buoyancy-opposed flow, the
Marangoni mixed convection parameter enhances the velocity
boundary layer but decreases the temperature and concentration
boundary layers. However, for the buoyancy-assisted flow, the
Marangoni mixed convection parameter decelerates the velocity but
increases the temperature and concentration boundary layers.
Abstract: L-asparaginase was extracted from pathogenic
Escherichia coli which was isolated from urinary tract infection
patients. L-asparaginase was purified 96-fold by ultrafiltration, ion
exchange and gel filtration giving 39.19% yield with final specific
activity of 178.57 IU/mg. L-asparaginase showed 138,356±1,000
Dalton molecular weight with 31024±100 Dalton molecular mass.
Kinetic properties of enzyme resulting 1.25×10-5 mM Km and
2.5×10-3 M/min Vmax. L-asparaginase showed a maximum activity
at pH 7.5 when incubated at 37 ºC for 30 min and illustrated its full
activity (100%) after 15 min incubation at 20-37 ºC, while 70% of its
activity was lost when incubated at 60 ºC. L-asparaginase showed
cytotoxicity to U937 cell line with IC50 0.5±0.19 IU/ml, and
selectivity index (SI=7.6) about 8 time higher selectivity over the
lymphocyte cells. Therefore, the local pathogenic E. coli strains may
be used as a source of high yield of L-asparaginase to produce anti
cancer agent with high selectivity.
Abstract: Vehicular Ad-hoc Network (VANET) is taking more
attention in automotive industry due to the safety concern of human
lives on roads. Security is one of the safety aspects in VANET. To be
secure, network availability must be obtained at all times since
availability of the network is critically needed when a node sends any
life critical information to other nodes. However, it can be expected
that security attacks are likely to increase in the coming future due to
more and more wireless applications being developed and deployed
onto the well-known expose nature of the wireless medium. In this
respect, the network availability is exposed to many types of attacks.
In this paper, Denial of Service (DOS) attack on network availability
is presented and its severity level in VANET environment is
elaborated. A model to secure the VANET from the DOS attacks has
been developed and some possible solutions to overcome the attacks
have been discussed.
Abstract: This paper describes the design of new method of
propagation delay measurement in micro and nanostructures during
characterization of ASIC standard library cell. Providing more
accuracy timing information about library cell to the design team we
can improve a quality of timing analysis inside of ASIC design flow
process. Also, this information could be very useful for semiconductor
foundry team to make correction in technology process. By
comparison of the propagation delay in the CMOS element and result
of analog SPICE simulation. It was implemented as digital IP core for
semiconductor manufacturing process. Specialized method helps to
observe the propagation time delay in one element of the standard-cell
library with up-to picoseconds accuracy and less. Thus, the special
useful solutions for VLSI schematic to parameters extraction, basic
cell layout verification, design simulation and verification are
announced.
Abstract: In the 1980s, companies began to feel the effect of three major influences on their product development: newer and innovative technologies, increasing product complexity and larger organizations. And therefore companies were forced to look for new product development methods. This paper tries to focus on the two of new product development methods (DFM and CE). The aim of this paper is to see and analyze different product development methods specifically on Design for Manufacturability and Concurrent Engineering. Companies can achieve and be benefited by minimizing product life cycle, cost and meeting delivery schedule. This paper also presents simplified models that can be modified and used by different companies based on the companies- objective and requirements. Methodologies that are followed to do this research are case studies. Two companies were taken and analysed on the product development process. Historical data, interview were conducted on these companies in addition to that, Survey of literatures and previous research works on similar topics has been done during this research. This paper also tries to show the implementation cost benefit analysis and tries to calculate the implementation time. From this research, it has been found that the two companies did not achieve the delivery time to the customer. Some of most frequently coming products are analyzed and 50% to 80 % of their products are not delivered on time to the customers. The companies are following the traditional way of product development that is sequentially design and production method, which highly affect time to market. In the case study it is found that by implementing these new methods and by forming multi disciplinary team in designing and quality inspection; the company can reduce the workflow steps from 40 to 30.
Abstract: Contact stress is an important problem in industry.
This is a problem that in the first attention may be don-t appears, but
disregard of these stresses cause a lot of damages in machines. These
stresses occur at locations such as gear teeth, bearings, cams and
between a locomotive wheel and the railroad rail. These stresses
cause failure by excessive elastic deformation, yielding and fracture.
In this paper we intend show the effective parameters in contact
stress and ponder effect of curvature. In this paper we study contact
stresses on the surface of gear teeth and compare these stresses for
four popular profiles of gear teeth (involute, cycloid, epicycloids, and
hypocycloid). We study this problem with mathematical and finite
element methods and compare these two methods on different profile
surfaces.
Abstract: The goal of a network-based intrusion detection
system is to classify activities of network traffics into two major
categories: normal and attack (intrusive) activities. Nowadays, data
mining and machine learning plays an important role in many
sciences; including intrusion detection system (IDS) using both
supervised and unsupervised techniques. However, one of the
essential steps of data mining is feature selection that helps in
improving the efficiency, performance and prediction rate of
proposed approach. This paper applies unsupervised K-means
clustering algorithm with information gain (IG) for feature selection
and reduction to build a network intrusion detection system. For our
experimental analysis, we have used the new NSL-KDD dataset,
which is a modified dataset for KDDCup 1999 intrusion detection
benchmark dataset. With a split of 60.0% for the training set and the
remainder for the testing set, a 2 class classifications have been
implemented (Normal, Attack). Weka framework which is a java
based open source software consists of a collection of machine
learning algorithms for data mining tasks has been used in the testing
process. The experimental results show that the proposed approach is
very accurate with low false positive rate and high true positive rate
and it takes less learning time in comparison with using the full
features of the dataset with the same algorithm.
Abstract: This paper provides an overview of auction theory literature. We present a general review on literature of various auctions and focus ourselves specifically on an English auction. We are interested in modelling bidder's behavior in an English auction environment. And hence, we present an overview of the New Zealand wool auction followed by a model that would describe a bidder's decision making behavior from the New Zealand wool auction. The mathematical assumptions in an English auction environment are demonstrated from the perspective of the New Zealand wool auction.
Abstract: The most important subtype of non-Hodgkin-s
lymphoma is the Diffuse Large B-Cell Lymphoma. Approximately
40% of the patients suffering from it respond well to therapy,
whereas the remainder needs a more aggressive treatment, in order to
better their chances of survival. Data Mining techniques have helped
to identify the class of the lymphoma in an efficient manner. Despite
that, thousands of genes should be processed to obtain the results.
This paper presents a comparison of the use of various attribute
selection methods aiming to reduce the number of genes to be
searched, looking for a more effective procedure as a whole.
Abstract: A packet analyzer is a tool for debugging sensor
network systems and is convenient for developers. In this paper, we
introduce a new packet analyzer based on an embedded system. The
proposed packet analyzer is compatible with IEEE 802.15.4, which is
suitable for the wireless communication standard for sensor networks,
and is available for remote control by adopting a server-client scheme
based on the Ethernet interface. To confirm the operations of the
packet analyzer, we have developed two types of sensor nodes based
on PIC4620 and ATmega128L microprocessors and tested the
functions of the proposed packet analyzer by obtaining the packets
from the sensor nodes.