Abstract: Cognitive Dissonance can be conceived both as a concept related to the tendency to avoid internal contradictions in certain situations, and as a higher order theory about information processing in the human mind. In the last decades, this last sense has been strongly surpassed by the former, as nearly all experiment on the matter discuss cognitive dissonance as an output of motivational contradictions. In that sense, the question remains: is cognitive dissonance a process intrinsically associated with the way that the mind processes information, or is it caused by such specific contradictions? Objective: To evaluate the effects of cognitive dissonance in the absence of rewards or any mechanisms to manipulate motivation. Method: To solve this question, we introduce a new task, the hypothetical social arrays paradigm, which was applied to 50 undergraduate students. Results: Our findings support the perspective that the human mind shows a tendency to avoid internal dissonance even when there are no rewards or punishment involved. Moreover, our findings also suggest that this principle works outside the conscious level.
Abstract: Many systems in the natural world exhibit chaos or non-linear behavior, the complexity of which is so great that they appear to be random. Identification of chaos in experimental data is essential for characterizing the system and for analyzing the predictability of the data under analysis. The Lyapunov exponents provide a quantitative measure of the sensitivity to initial conditions and are the most useful dynamical diagnostic for chaotic systems. However, it is difficult to accurately estimate the Lyapunov exponents of chaotic signals which are corrupted by a random noise. In this work, a method for estimation of Lyapunov exponents from noisy time series using unscented transformation is proposed. The proposed methodology was validated using time series obtained from known chaotic maps. In this paper, the objective of the work, the proposed methodology and validation results are discussed in detail.
Abstract: Evaporator is an important and widely used heat
exchanger in air conditioning and refrigeration industries. Different
methods have been used by investigators to increase the heat transfer
rates in evaporators. One of the passive techniques to enhance heat
transfer coefficient is the application of microfin tubes. The
mechanism of heat transfer augmentation in microfin tubes is
dependent on the flow regime of two-phase flow. Therefore many
investigations of the flow patterns for in-tube evaporation have been
reported in literatures. The gravitational force, surface tension and
the vapor-liquid interfacial shear stress are known as three dominant
factors controlling the vapor and liquid distribution inside the tube. A
review of the existing literature reveals that the previous
investigations were concerned with the two-phase flow pattern for
flow boiling in horizontal tubes [12], [9]. Therefore, the objective of
the present investigation is to obtain information about the two-phase
flow patterns for evaporation of R-134a inside horizontal smooth and
microfin tubes. Also Investigation of heat transfer during flow
boiling of R-134a inside horizontal microfin and smooth tube have
been carried out experimentally The heat transfer coefficients for
annular flow in the smooth tube is shown to agree well with Gungor
and Winterton-s correlation [4]. All the flow patterns occurred in the
test can be divided into three dominant regimes, i.e., stratified-wavy
flow, wavy-annular flow and annular flow. Experimental data are
plotted in two kinds of flow maps, i.e., Weber number for the vapor
versus weber number for the liquid flow map and mass flux versus
vapor quality flow map. The transition from wavy-annular flow to
annular or stratified-wavy flow is identified in the flow maps.
Abstract: Semilinear elliptic equations are ubiquitous in natural sciences. They give rise to a variety of important phenomena in quantum mechanics, nonlinear optics, astrophysics, etc because they have rich multiple solutions. But the nontrivial solutions of semilinear equations are hard to be solved for the lack of stabilities, such as Lane-Emden equation, Henon equation and Chandrasekhar equation. In this paper, bifurcation method is applied to solving semilinear elliptic equations which are with homogeneous Dirichlet boundary conditions in 2D. Using this method, nontrivial numerical solutions will be computed and visualized in many different domains (such as square, disk, annulus, dumbbell, etc).
Abstract: Huge losses in apple production are caused by pathogens that cannot be seen shortly after harvest. After-harvest thermotherapy treatments can considerably improve control of storage diseases on apples and become an alternative to chemical pesticides. In the years 2010-2012 carried out research in this area. Apples of 'Topaz' cultivar were harvested at optimal maturity time for long storage and subject to water bath treatment at 45, 50, 52, 55°C for 60, 120, 180 and 240 seconds. The control was untreated fruits. After 12 and 24 weeks and during so called simulated trade turnover the fruits were checked for their condition and the originators of diseases were determined by using the standard phytopathological methods. The most common originator of 'Topaz' apple infection during storage were the fungi of genus Gloeosporium. In this paper it was proven that for effective protection of 'Topaz' apples against diseases, thermotherapy by using water treatments at temperature range of 50-52°C is quite sufficient.
Abstract: The soil ecology of the organic and mineral soil layers
of laurel-leaved and Cryptomeria japonica forest in the Kasuga-yama
Hill Primeval Forest (Nara, Japan) was assessed. The number of
bacteria obtained by the dilution plate count method was less than
0.05% of those counted by the direct microscopic count. We therefore
found that forest soil contains large numbers of non-culturable
bacteria compared with agricultural soils. The numbers of bacteria and
fungi obtained by both the dilution plate count and the direct
microscopic count were larger in the deeper horizons (F and H) of the
organic layer than in the mineral soil layer. This suggests that active
microbial metabolism takes place in the organic layer. The numbers of
bacteria and the length of fungal hyphae obtained by the direct count
method were greater in the H horizon than in the F horizon. The direct
microscopic count revealed numerous non-culturable bacteria and
fungi in the soil. The ratio of fungal to bacterial biomass was lower in
the laurel-leaved forest soil. The fungal biomass was therefore
relatively low in the laurel-leaved forest soil due to differences in
forest vegetation.
Abstract: In this paper, Novel method, Particle Swarm Optimization (PSO) algorithm, based technique is proposed to estimate and analyze the steady state performance of self-excited induction generator (SEIG). In this novel method the tedious job of deriving the complex coefficients of a polynomial equation and solving it, as in previous methods, is not required. By comparing the simulation results obtained by the proposed method with those obtained by the well known mathematical methods, a good agreement between these results is obtained. The comparison validates the effectiveness of the proposed technique.
Abstract: Quality costs are the costs associated with preventing,
finding, and correcting defective work. Since the main language of
corporate management is money, quality-related costs act as means of
communication between the staff of quality engineering departments
and the company managers. The objective of quality engineering is to
minimize the total quality cost across the life of product. Quality
costs provide a benchmark against which improvement can be
measured over time. It provides a rupee-based report on quality
improvement efforts. It is an effective tool to identify, prioritize and
select quality improvement projects. After reviewing through the
literature it was noticed that a simplified methodology for data
collection of quality cost in a manufacturing industry was required.
The quantified standard methodology is proposed for collecting data
of various elements of quality cost categories for manufacturing
industry. Also in the light of research carried out so far, it is felt
necessary to standardise cost elements in each of the prevention,
appraisal, internal failure and external failure costs. . Here an attempt
is made to standardise the various cost elements applicable to
manufacturing industry and data is collected by using the proposed
quantified methodology. This paper discusses the case study carried
in luggage manufacturing industry.
Abstract: Nowadays social media are important tools for web
resource discovery. The performance and capabilities of web searches
are vital, especially search results from social research paper
bookmarking. This paper proposes a new algorithm for ranking
method that is a combination of similarity ranking with paper posted
time or CSTRank. The paper posted time is static ranking for
improving search results. For this particular study, the paper posted
time is combined with similarity ranking to produce a better ranking
than other methods such as similarity ranking or SimRank. The
retrieval performance of combination rankings is evaluated using
mean values of NDCG. The evaluation in the experiments implies
that the chosen CSTRank ranking by using weight score at ratio 90:10
can improve the efficiency of research paper searching on social
bookmarking websites.
Abstract: The two significant overvoltages in power system,
switching overvoltage and lightning overvoltage, are investigated in
this paper. Firstly, the effect of various power system parameters on
Line Energization overvoltages is evaluated by simulation in ATP.
The dominant parameters include line parameters; short-circuit
impedance and circuit breaker parameters. Solutions to reduce
switching overvoltages are reviewed and controlled closing using
switchsync controllers is proposed as proper method.
This paper also investigates lightning overvoltages in the
overhead-cable transition. Simulations are performed in
PSCAD/EMTDC. Surge arresters are applied in both ends of cable to
fulfill the insulation coordination. The maximum amplitude of
overvoltages inside the cable is surveyed which should be of great
concerns in insulation coordination studies.
Abstract: Web applications have become very complex and crucial, especially when combined with areas such as CRM (Customer Relationship Management) and BPR (Business Process Reengineering), the scientific community has focused attention to Web applications design, development, analysis, and testing, by studying and proposing methodologies and tools. This paper proposes an approach to automatic multi-dimensional concern mining for Web Applications, based on concepts analysis, impact analysis, and token-based concern identification. This approach lets the user to analyse and traverse Web software relevant to a particular concern (concept, goal, purpose, etc.) via multi-dimensional separation of concerns, to document, understand and test Web applications. This technique was developed in the context of WAAT (Web Applications Analysis and Testing) project. A semi-automatic tool to support this technique is currently under development.
Abstract: The nearly 21-year-old Jiujiang Bridge, which is suffering from uneven line shape, constant great downwarping of the main beam and cracking of the box girder, needs reinforcement and cable adjustment. It has undergone cable adjustment for twice with incomplete data. Therefore, the initial internal force state of the Jiujiang Bridge is identified as the key for the cable adjustment project. Based on parameter identification by means of static force test data, this paper suggests determining the initial internal force state of the cable-stayed bridge according to the cable force-displacement relationship parameter identification method. That is, upon measuring the displacement and the change in cable forces for twice, one can identify the parameters concerned by means of optimization. This method is applied to the cable adjustment, replacement and reinforcement project for the Jiujiang Bridge as a guidance for the cable adjustment and reinforcement project of the bridge.
Abstract: A new analytical method to predict the torsional
capacity and behavior of R.C multi-cell box girders strengthened with
carbon fiber reinforced polymer (CFRP) sheets is presented.
Modification was done on the Softened Truss Model (STM) in the
proposed method; the concrete torsional problem is solved by
combining the equilibrium conditions, compatibility conditions and
constitutive laws of materials by taking into account the confinement
of concrete with CFRP sheets. A specific algorithm is developed to
predict the torsional behavior of reinforced concrete multi-cell box
girders with or without strengthening by CFRP sheets. Applications
of the developed method as an assessment tool to strengthened multicell
box girders with CFRP and first analytical example that
demonstrate the contribution of the CFRP materials on the torsional
response is also included.
Abstract: Inconel718 has been widely used as a super alloy in aerospace application due to the high strength at elevated temperatures, satisfactory oxidation resistance and heat corrosion resistance. In this study, the Inconel718 has been fabricated using high technology of Metal Injection Molding (MIM) process due to the cost effective technique for producing small, complex and precision parts in high volume compared with conventional method through machining. Through MIM, the binder system is one of the most important criteria in order to successfully fabricate the Inconel718. Even though, the binder system is a temporary, but failure in the selection and removal of the binder system will affect on the final properties of the sintered parts. Therefore, the binder system based on palm oil derivative which is palm stearin has been formulated and developed to replace the conventional binder system. The rheological studies of the mixture between the powder and binders system have been determined properly in order to be successful during injection into injection molding machine. After molding, the binder holds the particles in place. The binder system has to be removed completely through debinding step. During debinding step, solvent debinding and thermal pyrolysis has been used to remove completely of the binder system. The debound part is then sintered to give the required physical and mechanical properties. The results show that the properties of the final sintered parts fulfill the Standard Metal Powder Industries Federation (MPIF) 35 for MIM parts.
Abstract: In this paper, we present a methodology for finding
authoritative researchers by analyzing academic Web sites. We show
a case study in which we concentrate on a set of Czech computer
science departments- Web sites. We analyze the relations between
them via hyperlinks and find the most important ones using several
common ranking algorithms. We then examine the contents of the
research papers present on these sites and determine the most
authoritative Czech authors.
Abstract: Despite various methods that exist in software risk management, software projects have a high rate of failure. When complexity and size of the projects are increased, managing software development becomes more difficult. In these projects the need for more analysis and risk assessment is vital. In this paper, a classification for software risks is specified. Then relations between these risks using risk tree structure are presented. Analysis and assessment of these risks are done using probabilistic calculations. This analysis helps qualitative and quantitative assessment of risk of failure. Moreover it can help software risk management process. This classification and risk tree structure can apply to some software tools.
Abstract: Security has been an important issue and concern in the
smart home systems. Smart home networks consist of a wide range of
wired or wireless devices, there is possibility that illegal access to
some restricted data or devices may happen. Password-based
authentication is widely used to identify authorize users, because this
method is cheap, easy and quite accurate. In this paper, a neural
network is trained to store the passwords instead of using verification
table. This method is useful in solving security problems that
happened in some authentication system. The conventional way to
train the network using Backpropagation (BPN) requires a long
training time. Hence, a faster training algorithm, Resilient
Backpropagation (RPROP) is embedded to the MLPs Neural
Network to accelerate the training process. For the Data Part, 200
sets of UserID and Passwords were created and encoded into binary
as the input. The simulation had been carried out to evaluate the
performance for different number of hidden neurons and combination
of transfer functions. Mean Square Error (MSE), training time and
number of epochs are used to determine the network performance.
From the results obtained, using Tansig and Purelin in hidden and
output layer and 250 hidden neurons gave the better performance. As
a result, a password-based user authentication system for smart home
by using neural network had been developed successfully.
Abstract: Common acceptable cuisine usually discussed in the
multicultural/ethnic nation as it represents the process of sharing it
among the ethnic groups. The common acceptable cuisine is also
considered as a precursor in the process of constructing the national
food identity within ethnic groups in the multicultural countries. The
adaptation of certain ethnic cuisines through its types of food,
methods of cooking, ingredients and eating decorum by ethnic groups
is believed creating or enhancing the process of formation on
common acceptable cuisines in a multicultural country. Malaysia as
the multicultural country without doubt is continuing to experience
cross-culturing processes among the ethnic groups including cuisine.
This study empirically investigates the adaptation level of Malay,
Chinese and Indian chefs on each other ethnic cuisine attributes
toward the formation on common acceptable cuisines and national
food identity.
Abstract: This paper focuses on cost and profit analysis of
single-server Markovian queuing system with two priority classes. In
this paper, functions of total expected cost, revenue and profit of the
system are constructed and subjected to optimization with respect to
its service rates of lower and higher priority classes. A computing
algorithm has been developed on the basis of fast converging
numerical method to solve the system of non linear equations formed
out of the mathematical analysis. A novel performance measure of
cost and profit analysis in view of its economic interpretation for the
system with priority classes is attempted to discuss in this paper. On
the basis of computed tables observations are also drawn to enlighten
the variational-effect of the model on the parameters involved
therein.
Abstract: The purpose of this paper is to propose a framework for constructing correct parallel processing programs based on Equivalent Transformation Framework (ETF). ETF regards computation as In the framework, a problem-s domain knowledge and a query are described in definite clauses, and computation is regarded as transformation of the definite clauses. Its meaning is defined by a model of the set of definite clauses, and the transformation rules generated must preserve meaning. We have proposed a parallel processing method based on “specialization", a part of operation in the transformations, which resembles substitution in logic programming. The method requires “Memo-tree", a history of specialization to maintain correctness. In this paper we proposes the new method for the specialization-base parallel processing without Memo-tree.