Abstract: In this work, several ASP solutions were flooded into
fractured models initially saturated with heavy oil at a constant flow
rate and different geometrical characteristics of fracture. The ASP
solutions are constituted from 2 polymers i.e. a synthetic polymer,
hydrolyzed polyacrylamide as well as a biopolymer, a surfactant and
2types of alkaline. The results showed that using synthetic
hydrolyzed polyacrylamide polymer increases ultimate oil recovery;
however, type of alkaline does not play a significant rule on oil
recovery. In addition, position of the injection well respect to the
fracture system has remarkable effects on ASP flooding. For instance
increasing angle of fractures with mean flow direction causes more
oil recovery and delays breakthrough time. This work can be
accounted as a comprehensive survey on ASP flooding which
considers most of effective factors in this chemical EOR method.
Abstract: Semantic Web Technologies enable machines to
interpret data published in a machine-interpretable form on the web.
At the present time, only human beings are able to understand the
product information published online. The emerging semantic Web
technologies have the potential to deeply influence the further
development of the Internet Economy. In this paper we propose a
scenario based research approach to predict the effects of these new
technologies on electronic markets and business models of traders
and intermediaries and customers. Over 300 million searches are
conducted everyday on the Internet by people trying to find what
they need. A majority of these searches are in the domain of
consumer ecommerce, where a web user is looking for something to
buy. This represents a huge cost in terms of people hours and an
enormous drain of resources. Agent enabled semantic search will
have a dramatic impact on the precision of these searches. It will
reduce and possibly eliminate information asymmetry where a better
informed buyer gets the best value. By impacting this key
determinant of market prices semantic web will foster the evolution
of different business and economic models. We submit that there is a
need for developing these futuristic models based on our current
understanding of e-commerce models and nascent semantic web
technologies. We believe these business models will encourage
mainstream web developers and businesses to join the “semantic web
revolution."
Abstract: In this paper, subtractive clustering based fuzzy inference system approach is used for early detection of faults in the function oriented software systems. This approach has been tested with real time defect datasets of NASA software projects named as PC1 and CM1. Both the code based model and joined model (combination of the requirement and code based metrics) of the datasets are used for training and testing of the proposed approach. The performance of the models is recorded in terms of Accuracy, MAE and RMSE values. The performance of the proposed approach is better in case of Joined Model. As evidenced from the results obtained it can be concluded that Clustering and fuzzy logic together provide a simple yet powerful means to model the earlier detection of faults in the function oriented software systems.
Abstract: In this paper a new approach is proposed for the
adaptation of the simulated annealing search in the field of the
Multi-Objective Optimization (MOO). This new approach is called
Multi-Case Multi-Objective Simulated Annealing (MC-MOSA). It
uses some basics of a well-known recent Multi-Objective Simulated
Annealing proposed by Ulungu et al., which is referred in the
literature as U-MOSA. However, some drawbacks of this algorithm
have been found, and are substituted by other ones, especially in
the acceptance decision criterion. The MC-MOSA has shown better
performance than the U-MOSA in the numerical experiments. This
performance is further improved by some other subvariants of the
MC-MOSA, such as Fast-annealing MC-MOSA, Re-annealing MCMOSA
and the Two-Stage annealing MC-MOSA.
Abstract: The charge-pump circuit is an important component in a phase-locked loop (PLL). The charge-pump converts Up and Down signals from the phase/frequency detector (PFD) into current. A conventional CMOS charge-pump circuit consists of two switched current sources that pump charge into or out of the loop filter according to two logical inputs. The mismatch between the charging current and the discharging current causes phase offset and reference spurs in a PLL. We propose a new charge-pump circuit to reduce the current mismatch by using a regulated cascode circuit. The proposed charge-pump circuit is designed and simulated by spectre with TSMC 0.18-μm 1.8-V CMOS technology.
Abstract: The γ-turns play important roles in protein folding and
molecular recognition. The prediction and analysis of γ-turn types are
important for both protein structure predictions and better
understanding the characteristics of different γ-turn types. This study
proposed a physicochemical property-based decision tree (PPDT)
method to interpretably predict γ-turn types. In addition to the good
prediction performance of PPDT, three simple and human
interpretable IF-THEN rules are extracted from the decision tree
constructed by PPDT. The identified informative physicochemical
properties and concise rules provide a simple way for discriminating
and understanding γ-turn types.
Abstract: This paper aims to provide a conceptual framework to examine competitive disadvantage of banks that suffer from poor performance. Banks generate revenues mainly from the interest rate spread on taking deposits and making loans while collecting fees in the process. To maximize firm value, banks seek loan growth and expense control while managing risk associated with loans with respect to non-performing borrowers or narrowing interest spread between assets and liabilities. Competitive disadvantage refers to the failure to access imitable resources and to build managing capabilities to gain sustainable return given appropriate risk management. This paper proposes a four-quadrant framework of organizational typology is subsequently proposed to examine the features of competitive disadvantage in the banking sector. A resource configuration model, which is extracted from CAMEL indicators to examine the underlying features of bank failures.
Abstract: The network traffic data provided for the design of
intrusion detection always are large with ineffective information and
enclose limited and ambiguous information about users- activities.
We study the problems and propose a two phases approach in our
intrusion detection design. In the first phase, we develop a
correlation-based feature selection algorithm to remove the worthless
information from the original high dimensional database. Next, we
design an intrusion detection method to solve the problems of
uncertainty caused by limited and ambiguous information. In the
experiments, we choose six UCI databases and DARPA KDD99
intrusion detection data set as our evaluation tools. Empirical studies
indicate that our feature selection algorithm is capable of reducing the
size of data set. Our intrusion detection method achieves a better
performance than those of participating intrusion detectors.
Abstract: ELS is an important ground based hardware in the
loop simulator used for aerodynamics torque loading experiments
of the actuators under test. This work focuses on improvement of the
transient response of torque controller with parameters uncertainty
of Electrical Load Simulator (ELS).The parameters of load simulator
are estimated online and the model is updated, eliminating the model
error and improving the steady state torque tracking response of
torque controller. To improve the Transient control performance the
gain of robust term of SMC is updated online using fuzzy logic
system based on the amount of uncertainty in parameters of load
simulator. The states of load simulator which cannot be measured
directly are estimated using luenberger observer with update of new
estimated parameters. The stability of the control scheme is verified
using Lyapunov theorem. The validity of proposed control scheme is
verified using simulations.
Abstract: According to FDA (Food and Drug Administration of the United States), vinegar is definedas a sour liquid containing at least 4 grams acetic acid in 100 cubic centimeter (4% solution of acetic acid) of solution that is produced from sugary materials by alcoholic fermentation. In the base of microbial starters, vinegars could be contained of more than 50 types of volatile and aromatic substances that responsible for their sweet taste and smelling. Recently the vinegar industry has a great proportion in agriculture, food and microbial biotechnology. The acetic acid bacteria are from the family Acetobacteraceae. Regarding to the latest version of Bergy-s Mannual of Systematic Bacteriology that has categorized bacteria in the base of their 16s RNA differences, the most important acetic acid genera are included Acetobacter (genus I), Gluconacetobacter (genus VIII) and Gluconobacter (genus IX). The genus Acetobacter that is primarily used in vinegar manufacturing plants is a gram negative, obligate aerobe coccus or rod shaped bacterium with the size 0.6 - 0.8 X 1.0 - 4.0 μm, nonmotile or motile with peritrichous flagella and catalase positive – oxidase negative biochemically. Some strains are overoxidizer that could convert acetic acid to carbon dioxide and water.In this research one Acetobacter native strain with high acetic acid productivity was isolated from Iranian white – red cherry. We used two specific culture media include Carr medium [yeast extract, 3%; ethanol, 2% (v/v); bromocresol green, 0.002%; agar, 2% and distilled water, 1000 ml], Frateur medium [yeast extract, 10 g/l; CaCO3, 20 g/l; ethanol, 20 g/l; agar, 20 g/l and distilled water, 1000 ml] and an industrial culture medium. In addition to high acetic acid production and high growth rate, this strain had a good tolerance against ethanol concentration that was examined using modified Carr media with 5%, 7% and 9% ethanol concentrations. While the industrial strains of acetic acid bacteria grow in the thermal range of 28 – 30 °C, this strain was adapted for growth in 34 – 36 °C after 96 hours incubation period. These dramatic characteristics suggest a potential biotechnological strain in production of cherry vinegar with a sweet smell and different nutritional properties in comparison to recent vinegar types. The lack of growth after 24, 48 and 72 hours incubation at 34 – 36 °C and the growth after 96 hours indicates a good and fast thermal flexibility of this strain as a significant characteristic of biotechnological and industrial strains.
Abstract: Medical image data hiding has strict constrains such
as high imperceptibility, high capacity and high robustness.
Achieving these three requirements simultaneously is highly
cumbersome. Some works have been reported in the literature on
data hiding, watermarking and stegnography which are suitable for
telemedicine applications. None is reliable in all aspects. Electronic
Patient Report (EPR) data hiding for telemedicine demand it blind
and reversible. This paper proposes a novel approach to blind
reversible data hiding based on integer wavelet transform.
Experimental results shows that this scheme outperforms the prior
arts in terms of zero BER (Bit Error Rate), higher PSNR (Peak Signal
to Noise Ratio), and large EPR data embedding capacity with
WPSNR (Weighted Peak Signal to Noise Ratio) around 53 dB,
compared with the existing reversible data hiding schemes.
Abstract: This paper is mainly concerned with the application of
a novel technique of data interpretation for classifying measurements
of plasma columns in Tokamak reactors for nuclear fusion
applications. The proposed method exploits several concepts derived
from soft computing theory. In particular, Artificial Neural Networks
and Multi-Class Support Vector Machines have been exploited to
classify magnetic variables useful to determine shape and position of
the plasma with a reduced computational complexity. The proposed
technique is used to analyze simulated databases of plasma equilibria
based on ITER geometry configuration. As well as demonstrating the
successful recovery of scalar equilibrium parameters, we show that
the technique can yield practical advantages compared with earlier
methods.
Abstract: We study the spatial design of experiment and we want to select a most informative subset, having prespecified size, from a set of correlated random variables. The problem arises in many applied domains, such as meteorology, environmental statistics, and statistical geology. In these applications, observations can be collected at different locations and possibly at different times. In spatial design, when the design region and the set of interest are discrete then the covariance matrix completely describe any objective function and our goal is to choose a feasible design that minimizes the resulting uncertainty. The problem is recast as that of maximizing the determinant of the covariance matrix of the chosen subset. This problem is NP-hard. For using these designs in computer experiments, in many cases, the design space is very large and it's not possible to calculate the exact optimal solution. Heuristic optimization methods can discover efficient experiment designs in situations where traditional designs cannot be applied, exchange methods are ineffective and exact solution not possible. We developed a GA algorithm to take advantage of the exploratory power of this algorithm. The successful application of this method is demonstrated in large design space. We consider a real case of design of experiment. In our problem, design space is very large and for solving the problem, we used proposed GA algorithm.
Abstract: This paper describes the study of cryptographic hash functions, one of the most important classes of primitives used in recent techniques in cryptography. The main aim is the development of recent crypt analysis hash function. We present different approaches to defining security properties more formally and present basic attack on hash function. We recall Merkle-Damgard security properties of iterated hash function. The Main aim of this paper is the development of recent techniques applicable to crypt Analysis hash function, mainly from SHA family. Recent proposed attacks an MD5 & SHA motivate a new hash function design. It is designed not only to have higher security but also to be faster than SHA-256. The performance of the new hash function is at least 30% better than that of SHA-256 in software. And it is secure against any known cryptographic attacks on hash functions.
Abstract: Public awareness towards green energy are on the rise and this can be prove by many product being manufactured or prerequired to be made as energy saving devices mainly to save consumer from spending more on utility billing. These schemes are popular nowadays and many homemade appliances are turned into energy saving gadget which attracts the attention of consumers. Knowing the public demands and pattern towards purchasing home appliances thus the idea of “energy saving suction hood (ESSH)" is proposed. The ESSH can be used in many places that require smoke ventilation or even to reduce the room temperature as many conventional suction hoods (CSH) do, but this device works automatically by the usage of sensors that detects the smoke/temperature and automatically spins the exhaust fan. As it turns, the mechanical rotation rotates the AC generator which is coupled together with the fan and then charges the battery. The innovation of this product is, it does not rely on the utility supply as it is also hook up with a solar panel which also charges the battery, Secondly, it generates energy as the exhaust fan mechanically rotates. Thirdly, an energy loop back feature is introduced to this system which will supply for the ventilator fan. Another major innovation is towards interfacing this device with an in house production of generator. This generator is produced by proper design on stator as well as rotor to reduce the losses. A comparison is made between the ESSH and the CSH and result shows that the ESSH saves 172.8kWh/year of utility supply which is used by CSH. This amount of energy can save RM 3.14 from monthly utility bill and a total of RM 37.67 per year. In fact this product can generate 175 Watt of power from generator(75W) and solar panel(100W) that can be used either to supply other household appliances and/or to loop back to supply the fans motor. The innovation of this system is essential for future production of other equipment by using the loopback power method and turning most equipment into a standalone system.
Abstract: This paper presents a video transmission system using
layered multiple description (coding (MDC) and multi-path transport
for reliable video communications in wireless ad-hoc networks.
The proposed MDC extends a quality-scalable H.264/AVC video
coding algorithm to generate two independent descriptions. The two
descriptions are transmitted over different paths to a receiver in order
to alleviate the effect of unstable channel conditions of wireless adhoc
networks. If one description is lost due to transmission erros,
then the correctly received description is used to estimate the lost
information of the corrupted description. The proposed MD coder
maintains an adequate video quality as long as both description are
not simultaneously lost. Simulation results show that the proposed
MD coding combined with multi-path transport system is largely
immune to packet losses, and therefore, can be a promising solution
for robust video communications over wireless ad-hoc networks.
Abstract: In this paper we present the information life cycle and analyze the importance of managing the corporate application portfolio across this life cycle. The approach presented here corresponds not just to the extension of the traditional information system development life cycle. This approach is based in the generic life cycle. In this paper it is proposed a model of an information system life cycle, supported in the assumption that a system has a limited life. But, this limited life may be extended. This model is also applied in several cases; being reported here two examples of the framework application in a construction enterprise and in a manufacturing enterprise.
Abstract: Levenberg-Marquardt method (LM) was proposed to
be applied as a non-linear least-square fitting in the analysis of a
natural gamma-ray spectrum that was taken by the Hp (Ge) detector.
The Gaussian function that composed of three components, main
Gaussian, a step background function and tailing function in the lowenergy
side, has been suggested to describe each of the y-ray lines
mathematically in the spectrum. The whole spectrum has been
analyzed by determining the energy and relative intensity for the
strong y-ray lines.
Abstract: This paper focuses on the problem of a common linear copositive Lyapunov function(CLCLF) existence for discrete-time switched positive linear systems(SPLSs) with bounded time-varying delays. In particular, applying system matrices, a special class of matrices are constructed in an appropriate manner. Our results reveal that the existence of a common copositive Lyapunov function can be related to the Schur stability of such matrices. A simple example is provided to illustrate the implication of our results.
Abstract: In the present study, a procedure was developed to
determine the optimum reaction rate constants in generalized
Arrhenius form and optimized through the Nelder-Mead method. For
this purpose, a comprehensive mathematical model of a fixed bed
reactor for dehydrogenation of heavy paraffins over Pt–Sn/Al2O3
catalyst was developed. Utilizing appropriate kinetic rate expressions
for the main dehydrogenation reaction as well as side reactions and
catalyst deactivation, a detailed model for the radial flow reactor was
obtained. The reactor model composed of a set of partial differential
equations (PDE), ordinary differential equations (ODE) as well as
algebraic equations all of which were solved numerically to
determine variations in components- concentrations in term of mole
percents as a function of time and reactor radius. It was demonstrated
that most significant variations observed at the entrance of the bed
and the initial olefin production obtained was rather high. The
aforementioned method utilized a direct-search optimization
algorithm along with the numerical solution of the governing
differential equations. The usefulness and validity of the method was
demonstrated by comparing the predicted values of the kinetic
constants using the proposed method with a series of experimental
values reported in the literature for different systems.