Inconsistency Discovery in Multiple State Diagrams

In this article, we introduce a new approach for analyzing UML designs to detect the inconsistencies between multiple state diagrams and sequence diagrams. The Super State Analysis (SSA) identifies the inconsistencies in super states, single step transitions, and sequences. Because SSA considers multiple UML state diagrams, it discovers inconsistencies that cannot be discovered when considering only a single UML state diagram. We have introduced a transition set that captures relationship information that is not specifiable in UML diagrams. The SSA model uses the transition set to link transitions of multiple state diagrams together. The analysis generates three different sets automatically. These sets are compared to the provided sets to detect the inconsistencies. SSA identifies five types of inconsistencies: impossible super states, unreachable super states, illegal transitions, missing transitions, and illegal sequences.

Effects of Natural Frequency and Rotational Speed on Dynamic Stress in Spur Gear

Natural frequencies and dynamic response of a spur gear sector are investigated using a two dimensional finite element model that offers significant advantages for dynamic gear analyses. The gear teeth are analyzed for different operating speeds. A primary feature of this modeling is determination of mesh forces using a detailed contact analysis for each time step as the gears roll through the mesh. Transient mode super position method has been used to find horizontal and vertical components of displacement and dynamic stress. The finite element analysis software ANSYS has been used on the proposed model to find the natural frequencies by Block Lanczos technique and displacements and dynamic stresses by transient mode super position method. A comparison of theoretical (natural frequency and static stress) results with the finite element analysis results has also been done. The effect of rotational speed of the gears on the dynamic response of gear tooth has been studied and design limits have been discussed.

Transient Hydrodynamic and Thermal Behaviors of Fluid Flow in a Vertical Porous Microchannel under the Effect of Hyperbolic Heat Conduction Model

The transient hydrodynamics and thermal behaviors of fluid flow in open-ended vertical parallel-plate porous microchannel are investigated semi-analytically under the effect of the hyperbolic heat conduction model. The model that combines both the continuum approach and the possibility of slip at the boundary is adopted in the study. The Effects of Knudsen number , Darcy number , and thermal relaxation time  on the microchannel hydrodynamics and thermal behaviors are investigated using the hyperbolic heat conduction models. It is found that as  increases the slip in the hydrodynamic and thermal boundary condition increases. This slip in the hydrodynamic boundary condition increases as  increases. Also, the slip in the thermal boundary condition increases as  decreases especially the early stage of time.

The Core and Shapley Function for Games on Augmenting Systems with a Coalition Structure

In this paper, we first introduce the model of games on augmenting systems with a coalition structure, which can be seen as an extension of games on augmenting systems. The core of games on augmenting systems with a coalition structure is defined, and an equivalent form is discussed. Meantime, the Shapley function for this type of games is given, and two axiomatic systems of the given Shapley function are researched. When the given games are quasi convex, the relationship between the core and the Shapley function is discussed, which does coincide as in classical case. Finally, a numerical example is given.

The Relationship between Business-model Innovation and Firm Value: A Dynamic Perspective

When consistently innovative business-models can give companies a competitive advantage, longitudinal empirical research, which can reflect dynamic business-model changes, has yet to prove a definitive connection. This study consequently employs a dynamic perspective in conjunction with innovation theory to examine the relationship between the types of business-model innovation and firm value. This study tries to examine various types of business-model innovation in high-end and low-end technology industries such as HTC and the 7-Eleven chain stores with research periods of 14 years and 32 years, respectively. The empirical results suggest that adopting radical business-model innovation in addition to expanding new target markets can successfully lead to a competitive advantage. Sustained advanced technological competences and service/product innovation are the key successful factors in high-end and low-end technology industry business-models respectively. In sum up, the business-model innovation can yield a higher market value and financial value in high-end technology industries than low-end ones.

The Study of Increasing Environmental Temperature on the Dynamical Behaviour of a Prey-Predator System: A Model

It is well recognized that the green house gases such as Chlorofluoro Carbon (CFC), CH4, CO2 etc. are responsible directly or indirectly for the increase in the average global temperature of the Earth. The presence of CFC is responsible for the depletion of ozone concentration in the atmosphere due to which the heat accompanied with the sun rays are less absorbed causing increase in the atmospheric temperature of the Earth. The gases like CH4 and CO2 are also responsible for the increase in the atmospheric temperature. The increase in the temperature level directly or indirectly affects the dynamics of interacting species systems. Therefore, in this paper a mathematical model is proposed and analysed using stability theory to asses the effects of increasing temperature due to greenhouse gases on the survival or extinction of populations in a prey-predator system. A threshold value in terms of a stress parameter is obtained which determines the extinction or existence of populations in the underlying system.

An Agent-Based Approach to Immune Modelling: Priming Individual Response

This study focuses on examining why the range of experience with respect to HIV infection is so diverse, especially in regard to the latency period. An agent-based approach in modelling the infection is used to extract high-level behaviour which cannot be obtained analytically from the set of interaction rules at the cellular level. A prototype model encompasses local variation in baseline properties, contributing to the individual disease experience, and is included in a network which mimics the chain of lymph nodes. The model also accounts for stochastic events such as viral mutations. The size and complexity of the model require major computational effort and parallelisation methods are used.

Identification of Aircraft Gas Turbine Engines Temperature Condition

Groundlessness of application probability-statistic methods are especially shown at an early stage of the aviation GTE technical condition diagnosing, when the volume of the information has property of the fuzzy, limitations, uncertainty and efficiency of application of new technology Soft computing at these diagnosing stages by using the fuzzy logic and neural networks methods. It is made training with high accuracy of multiple linear and nonlinear models (the regression equations) received on the statistical fuzzy data basis. At the information sufficiency it is offered to use recurrent algorithm of aviation GTE technical condition identification on measurements of input and output parameters of the multiple linear and nonlinear generalized models at presence of noise measured (the new recursive least squares method (LSM)). As application of the given technique the estimation of the new operating aviation engine D30KU-154 technical condition at height H=10600 m was made.

Software Maintenance Severity Prediction with Soft Computing Approach

As the majority of faults are found in a few of its modules so there is a need to investigate the modules that are affected severely as compared to other modules and proper maintenance need to be done on time especially for the critical applications. In this paper, we have explored the different predictor models to NASA-s public domain defect dataset coded in Perl programming language. Different machine learning algorithms belonging to the different learner categories of the WEKA project including Mamdani Based Fuzzy Inference System and Neuro-fuzzy based system have been evaluated for the modeling of maintenance severity or impact of fault severity. The results are recorded in terms of Accuracy, Mean Absolute Error (MAE) and Root Mean Squared Error (RMSE). The results show that Neuro-fuzzy based model provides relatively better prediction accuracy as compared to other models and hence, can be used for the maintenance severity prediction of the software.

Investigation of Anti-Inflammatory, Antipyretic and Analgesic Effect of Yemeni Sidr Honey

Traditionally, Yemini Sidr honey has been reported to cure liver problems, stomach ulcers, and respiratory disorders. In this experiment, we evaluated Yemeni Sidr honey for its ability to protect inflammations caused by acetic acid and formalin -induced writhing, carrageenan and histamine-induced paw oedema in experimental rat model. Hyperpyrexia, membrane stabilizing activity, and phytochemical screening of the honey was also examined. Yemini Sidr Honey at (100, 200 and 500 mg/kg) exhibited a concentration dependant inhibition of acetic acid induced and formalin induced writhing, paw oedema induced by carrageenan & histamine, and hyperpyrexia induced by brewer's yeast, it also inhibited membrane stabilizing activity. Phytochemical screenings of the honey reveal the presence of flavonoids, steroid, alkaloids, saponins and tannins. This study suggested that Yemeni Sidr honey possess very strong antiinflammatory, analgesic and antipyretic effects and these effects would be a result of the phytochemicals present.

Parental Attitudes as a Predictor of Cyber Bullying among Primary School Children

Problem Statement:Rapid technological developments of the 21st century have advanced our daily lives in various ways. Particularly in education, students frequently utilize technological resources to aid their homework and to access information. listen to radio or watch television (26.9 %) and e-mails (34.2 %) [26]. Not surprisingly, the increase in the use of technologies also resulted in an increase in the use of e-mail, instant messaging, chat rooms, mobile phones, mobile phone cameras and web sites by adolescents to bully peers. As cyber bullying occurs in the cyber space, lesser access to technologies would mean lesser cyber-harm. Therefore, the frequency of technology use is a significant predictor of cyber bullying and cyber victims. Cyber bullies try to harm the victim using various media. These tools include sending derogatory texts via mobile phones, sending threatening e-mails and forwarding confidential emails to everyone on the contacts list. Another way of cyber bullying is to set up a humiliating website and invite others to post comments. In other words, cyber bullies use e-mail, chat rooms, instant messaging, pagers, mobile texts and online voting tools to humiliate and frighten others and to create a sense of helplessness. No matter what type of bullying it is, it negatively affects its victims. Children who bully exhibit more emotional inhibition and attribute themselves more negative self-statements compared to non-bullies. Students whose families are not sympathetic and who receive lower emotional support are more prone to bully their peers. Bullies have authoritarian families and do not get along well with them. The family is the place where the children-s physical, social and psychological needs are satisfied and where their personalities develop. As the use of the internet became prevalent so did parents- restrictions on their children-s internet use. However, parents are unaware of the real harm. Studies that explain the relationship between parental attitudes and cyber bullying are scarce in literature. Thus, this study aims to investigate the relationship between cyber bullying and parental attitudes in the primary school. Purpose of Study: This study aimed to investigate the relationship between cyber bullying and parental attitudes. A second aim was to determine whether parental attitudes could predict cyber bullying and if so which variables could predict it significantly. Methods:The study had a cross-sectional and relational survey model. A demographics information form, questions about cyber bullying and a Parental Attitudes Inventory were conducted with a total of 346 students (189 females and 157 males) registered at various primary schools. Data was analysed by multiple regression analysis using the software package SPSS 16.

Design of a Non-linear Observer for VSI Fed Synchronous Motor

This paper discusses two observers, which are used for the estimation of parameters of PMSM. Former one, reduced order observer, which is used to estimate the inaccessible parameters of PMSM. Later one, full order observer, which is used to estimate all the parameters of PMSM even though some of the parameters are directly available for measurement, so as to meet with the insensitivity to the parameter variation. However, the state space model contains some nonlinear terms i.e. the product of different state variables. The asymptotic state observer, which approximately reconstructs the state vector for linear systems without uncertainties, was presented by Luenberger. In this work, a modified form of such an observer is used by including a non-linear term involving the speed. So, both the observers are designed in the framework of nonlinear control; their stability and rate of convergence is discussed.

Modeling and Analysis of SVPWM Based Dynamic Voltage Restorer

In this paper the modeling and analysis of Space Vector Pulse Width Modulation (SVPWM) based Dynamic Voltage Restorer (DVR) using PSCAD/EMTDC software will be presented in details. The simulation includes full modeling of the SVPWM technique used to control the DVR inverter. A test power system composed of three phase voltage source, sag generator, DVR and three phase resistive load is used to demonstrate restoration capability of the DVR. The simulation results of the presented DVR proved excellent voltage sag mitigation to protect sensitive loads.

Multi-Objective Cellular Manufacturing System under Machines with Different Life-Cycle using Genetic Algorithm

In this paper a multi-objective nonlinear programming model of cellular manufacturing system is presented which minimize the intercell movements and maximize the sum of reliability of cells. We present a genetic approach for finding efficient solutions to the problem of cell formation for products having multiple routings. These methods find the non-dominated solutions and according to decision makers prefer, the best solution will be chosen.

Adsorption of Methylene Blue from Aqueous Solution on the Surface of Znapso-34 Nanoporous Material

The effects of equilibrium time, solution pH, and sorption temperature of cationic methylene blue (MB) adsorption on nanoporous metallosilicoaluminophosphate ZnAPSO-34 was studied using a batch equilibration method. UV–VIS spectroscopy was used to obtain the adsorption isotherms at 20° C. The optimum period for adsorption was 300 min. However, MB removal increased from 81,82 % to 94,81 %. The equilibrium adsorption data was analyzed by using Langmuir, Freundlich and Temkin isotherm models. Langmuir isotherm was found to be the better-fitting model and the process followed pseudo second–order kinetics. The results showed that ZnAPSO-34 could be employed as an effective material and could be an attractive alternative for the removal of dyes and colors from aqueous solutions.

Edge-end Pixel Extraction for Edge-based Image Segmentation

Extraction of edge-end-pixels is an important step for the edge linking process to achieve edge-based image segmentation. This paper presents an algorithm to extract edge-end pixels together with their directional sensitivities as an augmentation to the currently available mathematical models. The algorithm is implemented in the Java environment because of its inherent compatibility with web interfaces since its main use is envisaged to be for remote image analysis on a virtual instrumentation platform.

Pruning Method of Belief Decision Trees

The belief decision tree (BDT) approach is a decision tree in an uncertain environment where the uncertainty is represented through the Transferable Belief Model (TBM), one interpretation of the belief function theory. The uncertainty can appear either in the actual class of training objects or attribute values of objects to classify. In this paper, we develop a post-pruning method of belief decision trees in order to reduce size and improve classification accuracy on unseen cases. The pruning of decision tree has a considerable intention in the areas of machine learning.

Detection and Pose Estimation of People in Images

Detection, feature extraction and pose estimation of people in images and video is made challenging by the variability of human appearance, the complexity of natural scenes and the high dimensionality of articulated body models and also the important field in Image, Signal and Vision Computing in recent years. In this paper, four types of people in 2D dimension image will be tested and proposed. The system will extract the size and the advantage of them (such as: tall fat, short fat, tall thin and short thin) from image. Fat and thin, according to their result from the human body that has been extract from image, will be obtained. Also the system extract every size of human body such as length, width and shown them in output.

A Neurofuzzy Learning and its Application to Control System

A neurofuzzy approach for a given set of input-output training data is proposed in two phases. Firstly, the data set is partitioned automatically into a set of clusters. Then a fuzzy if-then rule is extracted from each cluster to form a fuzzy rule base. Secondly, a fuzzy neural network is constructed accordingly and parameters are tuned to increase the precision of the fuzzy rule base. This network is able to learn and optimize the rule base of a Sugeno like Fuzzy inference system using Hybrid learning algorithm, which combines gradient descent, and least mean square algorithm. This proposed neurofuzzy system has the advantage of determining the number of rules automatically and also reduce the number of rules, decrease computational time, learns faster and consumes less memory. The authors also investigate that how neurofuzzy techniques can be applied in the area of control theory to design a fuzzy controller for linear and nonlinear dynamic systems modelling from a set of input/output data. The simulation analysis on a wide range of processes, to identify nonlinear components on-linely in a control system and a benchmark problem involving the prediction of a chaotic time series is carried out. Furthermore, the well-known examples of linear and nonlinear systems are also simulated under the Matlab/Simulink environment. The above combination is also illustrated in modeling the relationship between automobile trips and demographic factors.

A New Perturbation Technique in Numerical Study on Buckling of Composite Shells under Axial Compression

A numerical study is presented on buckling and post buckling behaviour of laminated carbon fiber reinforced plastic (CFRP) thin-walled cylindrical shells under axial compression using asymmetric meshing technique (AMT). Asymmetric meshing technique is a perturbation technique to introduce disturbance without changing geometry, boundary conditions or loading conditions. Asymmetric meshing affects predicted buckling load, buckling mode shape and post-buckling behaviour. Linear (eigenvalue) and nonlinear (Riks) analyses have been performed to study the effect of asymmetric meshing in the form of a patch on buckling behaviour. The reduction in the buckling load using Asymmetric meshing technique was observed to be about 15%. An isolated dimple formed near the bifurcation point and the size of which increased to reach a stable state in the post-buckling region. The load-displacement curve behaviour applying asymmetric meshing is quite similar to the curve obtained using initial geometric imperfection in the shell model.