Abstract: This work presents a theoretical investigation of the
simultaneous absorption of CO2 and H2S into aqueous solutions of
MDEA and DEA. In this process the acid components react
with the basic alkanolamine solution via an exothermic,
reversible reaction in a gas/liquid absorber. The use of amine
solvents for gas sweetening has been investigated using
process simulation programs called HYSYS and ASPEN. We
use Electrolyte NRTL and Amine Package and Amines
(experimental) equation of state. The effects of temperature and
circulation rate and amine concentration and packed column and
murphree efficiency on the rate of absorption were studied.
When lean amine flow and concentration increase, CO2 and H2S
absorption increase too. With the improvement of inlet amine
temperature in absorber, CO2 and H2S penetrate to upper stages of
absorber and absorption of acid gases in absorber decreases. The CO2
concentration in the clean gas can be greatly influenced by the
packing height, whereas for the H2S concentration in the clean gas the
packing height plays a minor role. HYSYS software can not
estimate murphree efficiency correctly and it applies the same
contributions in all diagrams for HYSYS software. By
improvement in murphree efficiency, maximum temperature
of absorber decrease and the location of reaction transfer to the
stages of bottoms absorber and the absorption of acid gases
increase.
Abstract: This paper proposes the use of metrics in design space exploration that highlight where in the structure of the model and at what point in the behaviour, prevention is needed against transient faults. Previous approaches to tackle transient faults focused on recovery after detection. Almost no research has been directed towards preventive measures. But in real-time systems, hard deadlines are performance requirements that absolutely must be met and a missed deadline constitutes an erroneous action and a possible system failure. This paper proposes the use of metrics to assess the system design to flag where transient faults may have significant impact. These tools then allow the design to be changed to minimize that impact, and they also flag where particular design techniques – such as coding of communications or memories – need to be applied in later stages of design.
Abstract: In pattern recognition applications the low level segmentation and the high level object recognition are generally considered as two separate steps. The paper presents a method that bridges the gap between the low and the high level object recognition. It is based on a Bayesian network representation and network propagation algorithm. At the low level it uses hierarchical structure of quadratic spline wavelet image bases. The method is demonstrated for a simple circuit diagram component identification problem.
Abstract: This paper presents an optimal and unsupervised satellite image segmentation approach based on Pearson system and k-Means Clustering Algorithm Initialization. Such method could be considered as original by the fact that it utilised K-Means clustering algorithm for an optimal initialisation of image class number on one hand and it exploited Pearson system for an optimal statistical distributions- affectation of each considered class on the other hand. Satellite image exploitation requires the use of different approaches, especially those founded on the unsupervised statistical segmentation principle. Such approaches necessitate definition of several parameters like image class number, class variables- estimation and generalised mixture distributions. Use of statistical images- attributes assured convincing and promoting results under the condition of having an optimal initialisation step with appropriated statistical distributions- affectation. Pearson system associated with a k-means clustering algorithm and Stochastic Expectation-Maximization 'SEM' algorithm could be adapted to such problem. For each image-s class, Pearson system attributes one distribution type according to different parameters and especially the Skewness 'β1' and the kurtosis 'β2'. The different adapted algorithms, K-Means clustering algorithm, SEM algorithm and Pearson system algorithm, are then applied to satellite image segmentation problem. Efficiency of those combined algorithms was firstly validated with the Mean Quadratic Error 'MQE' evaluation, and secondly with visual inspection along several comparisons of these unsupervised images- segmentation.
Abstract: This paper describes identification of the two poles
unstable SOPDT process, especially with large time delay. A new
modified relay feedback identification method for two poles unstable
SOPDT process is proposed. Furthermore, for the two poles unstable
SOPDT process, an additional Derivative controller is incorporated
parallel with relay to relax the constraint on the ratio of delay to the
unstable time constant, so that the exact model parameters of
unstable processes can be identified. To cope with measurement
noise in practice, a low pass filter is suggested to get denoised output
signal toimprove the exactness of model parameter of unstable
process. PID Lead-lag tuning formulas are derived for two poles
unstable (SOPDT) processes based on IMC principle. Simulation
example illustrates the effectiveness and the simplicity of the
proposed identification and control method.
Abstract: A new sythetic gene coding for a Human
Elastin-Like Polypeptide was constructed and expressed. The
recombinant product was tested as coating agent to realize a
surface suitable for cell growth. Coatings showed peculiar
features and different human cell lines were seeded and
cultured. All cell lines tested showed to adhere and proliferate
on this substrate that has been shown also to exert a specific
effect on cells, depending on cell type.
Abstract: An effective approach for extracting document images from a noisy background is introduced. The entire scheme is divided into three sub- stechniques – the initial preprocessing operations for noise cluster tightening, introduction of a new thresholding method by maximizing the ratio of stan- dard deviations of the combined effect on the image to the sum of weighted classes and finally the image restoration phase by image binarization utiliz- ing the proposed optimum threshold level. The proposed method is found to be efficient compared to the existing schemes in terms of computational complexity as well as speed with better noise rejection.
Abstract: In this paper we introduce some subspaces of fuzzy entire sequence space. Some general properties of these sequence spaces are discussed. Also some inclusion relation involving the spaces are obtained. Mathematics Subject Classification: 40A05, 40D25.
Abstract: In this paper, we have presented a new multivariate fuzzy time series forecasting method. This method assumes mfactors with one main factor of interest. History of past three years is used for making new forecasts. This new method is applied in forecasting total number of car accidents in Belgium using four secondary factors. We also make comparison of our proposed method with existing methods of fuzzy time series forecasting. Experimentally, it is shown that our proposed method perform better than existing fuzzy time series forecasting methods. Practically, actuaries are interested in analysis of the patterns of causalities in road accidents. Thus using fuzzy time series, actuaries can define fuzzy premium and fuzzy underwriting of car insurance and life insurance for car insurance. National Institute of Statistics, Belgium provides region of risk classification for each road. Thus using this risk classification, we can predict premium rate and underwriting of insurance policy holders.
Abstract: The deficit of power supply in Macedonia is almost 30% or reached up to 3000 GWh in a year. The existing thermal and hydro power plants are not enough to cover the power and energy, so the import increases every year. Therefore, in order to have more domestic energy supply, the new trends in renewable and energy efficiency should be implemented in power sector. The paper gives some perspectives for development of the power system in Macedonia, taking into account the growth of electricity demand and in the same time with implementation of renewable and energy efficiency. The development of power system is made for the period up to 2030 with the period of every 5 years.
Abstract: Measuring the effect of perinatal lead exposure on learning ability of offspring is considered as a sensitive and selective index for providing an early marker for central nervous system damage produced by this toxic metal. A total of 35 Sprague-Dawley adult rats were used to investigate the effect of lead acetate toxicity on behavioral patterns of adult female rats and learning ability of offspring. Rats were allotted into 4 groups, group one received 1g/l lead acetate (n=10), group two received 1.5g/l lead acetate (n=10), group three received 2g/l lead acetate in drinking water (n=10) and control group did not receive lead acetate (n=5) from 8th day of pregnancy till weaning of pups.
The obtained results revealed a dose dependent increase in the feeding time, drinking frequency, licking frequency, scratching frequency, licking litters, nest building and retrieving frequencies, while standing time increased significantly in rats treated with 1.5g/l lead acetate than other treated groups and control, on contrary lying time decreased gradually in a dose dependent manner. Moreover, movement activities were higher in rats treated with 1g/l lead acetate than other treated groups and control. Furthermore, time spent in closed arms was significantly lower in rats given 2g/l lead acetate than other treated groups, while, they spent significantly much time spent in open arms than other treated groups which could be attributed to occurrence of adaptation. Furthermore, number of entries in open arms was dose dependent. However, the ratio between open/closed arms revealed a significant decrease in rats treated with 2g/l lead acetate than control group.
Abstract: Schools today face ever-increasing demands in their attempts to ensure that students are well equipped to enter the workforce and navigate a complex world. Research indicates that computer technology can help support learning, implementation of various experiments or learning games, and that it is especially useful in developing the higher-order skills of critical thinking, observation, comprehension, implementation, comparison, analysis and active attention to activities such as research, field work, simulations and scientific inquiry. The ICT in education supports the learning procedure by enabling it to be more flexible and effective, create a rich and attractive training environment and equip the students with knowledge and potential useful for the competitive social environment in which they live. This paper presents the design, the development, and the results of the evaluation analysis of an interactive educational game which using real electric vehicles - toys (material) on a toy race track. When the game starts each student selects a specific vehicle toy. Then students are answering questionnaires in the computer. The vehicles' speed is related to the percentage of right answers in a multiple choice questionnaire (software). Every question has its own significant value depending of the different level of questionnaire. Via the developed software, each right or wrong answers in questionnaire increase or decrease the real time speed of their vehicle toys. Moreover the rate of vehicle's speed increase or decrease depends on the difficulty level of each question. The aim of the work is to attract the student’s interest in a learning process and also to improve their scores. The developed real time game was tested using independent populations of students of age groups: 8-10, 11-14, 15-18 years. Standard educational and statistical analysis tools were used for the evaluation analysis of the game. Results reveal that students using the developed real time control game scored much higher (60%) than students using a traditional simulation game on the same questionnaire. Results further indicate that student's interest in repeating the developed real time control gaming was far higher (70%) than the interest of students using a traditional simulation game.
Abstract: Attack graph is an integral part of modeling the
overview of network security. System administrators use attack graphs to determine how vulnerable their systems are and to determine
what security measures to deploy to defend their systems. Previous methods on AGG(attack graphs generation) are aiming at
the whole network, which makes the process of AGG complex and
non-scalable. In this paper, we propose a new approach which is
simple and scalable to AGG by decomposing the whole network into atomic domains. Each atomic domain represents a host with a specific privilege. Then the process for AGG is achieved by communications
among all the atomic domains. Our approach simplifies the process
of design for the whole network, and can gives the attack graphs including each attack path for each host, and when the network changes we just carry on the operations of corresponding atomic
domains which makes the process of AGG scalable.
Abstract: A block backward differentiation formula of uniform
order eight is proposed for solving first order stiff initial value
problems (IVPs). The conventional 8-step Backward Differentiation
Formula (BDF) and additional methods are obtained from the same
continuous scheme and assembled into a block matrix equation which
is applied to provide the solutions of IVPs on non-overlapping
intervals. The stability analysis of the method indicates that the
method is L0-stable. Numerical results obtained using the proposed
new block form show that it is attractive for solutions of stiff problems
and compares favourably with existing ones.
Abstract: This paper discusses a new heavy tailed distribution based data hiding into discrete cosine transform (DCT) coefficients of image, which provides statistical security as well as robustness against steganalysis attacks. Unlike other data hiding algorithms, the proposed technique does not introduce much effect in the stegoimage-s DCT coefficient probability plots, thus making the presence of hidden data statistically undetectable. In addition the proposed method does not compromise on hiding capacity. When compared to the generic block DCT based data-hiding scheme, our method found more robust against a variety of image manipulating attacks such as filtering, blurring, JPEG compression etc.
Abstract: In this chapter, we have studied Variation of velocity in incompressible fluid over a moving surface. The boundary layer equations are on a fixed or continuously moving flat plate in the same or opposite direction to the free stream with suction and injection. The boundary layer equations are transferred from partial differential equations to ordinary differential equations. Numerical solutions are obtained by using Runge-Kutta and Shooting methods. We have found numerical solution to velocity and skin friction coefficient.
Abstract: In this paper, self-starting block hybrid method of
order (5,5,5,5)T is proposed for the solution of the special second
order ordinary differential equations with associated initial or
boundary conditions. The continuous hybrid formulations enable us
to differentiate and evaluate at some grids and off – grid points to
obtain four discrete schemes, which were used in block form for
parallel or sequential solutions of the problems. The computational
burden and computer time wastage involved in the usual reduction of
second order problem into system of first order equations are avoided
by this approach. Furthermore, a stability analysis and efficiency of
the block method are tested on stiff ordinary differential equations,
and the results obtained compared favorably with the exact solution.
Abstract: Paleoclimate was reconstructed by the clay mineral
assemblages of shale units of Pabdeh (Paleocene- Oligocene), Gurpi
(Upper Cretaceous), Kazhdumi (Albian-Cenomanian) and Gadvan
(Aptian-Neocomian) formations in the Bangestan anticline. To
compare with clay minerals assemblages in these formations,
selected samples also taken from available formations in drilled wells
in Ahvaz, Marun, Karanj, and Parsi oil fields. Collected samples
prepared using standard clay mineral methodology. They were
treated as normal, glycolated and heated oriented glass slides. Their
identification was made on X-Ray diffractographs. Illite % varies
from 8 to 36. Illite quantity increased from Pabdeh to Gurpi
Formation. This may be due to dominant dry climate. Kaolinite is in
range of 12-49%. Its variation style in different formations could be a
marker of climate changes from wet to dry which is supported by the
lithological changes. Chlorite (4-28%) can also be detected in those
samples without any kaolinite. Mixed layer minerals as the mixture
of illite-chlorite and illite-vermiculite-montmorillonite are varied
from 6 to 36%, decreased during Kazhdumi deposition from the base
to the top. This result may be according to decreasing of illite
leaching process. Vermiculite was also determined in very less
quantity and found in those units without kaolinite. Montmorillonite
varies from 8 to 43%, and its presence is due to terrestrial
depositional condition. Stratigraphical documents is also supported
this idea that clay mineral distribution is a function of the climate
changes. It seems, thus, the present results can be indicated a possible
procedure for ancient climate changes evaluation.
Abstract: An important official knowledge in each country is to
have a comprehensive knowledge about markets of each group of
products. Drink markets are one the most important markets of each
country as a sub-group of nourishment markets. This paper is going
to study these markets in Iran. To do so, first, two drink products are
selected as pilot, including milk and concentrate. Then, for each
product, two groups of information are estimated for the last five
years, including 1) total consumption (demand) and 2) total
production. Finally, the two groups of productions are compared
statistically by means of two statistical tests called t test and Mann-
Whitney test. The implemented Different related tables and figures
are also illustrated to show the method more explicitly.
Abstract: In studies on psychological health and children-s personality development and in researches on emotional distresses, children-s behavioral disorders associated with mother deprivation, are known as the major cause of mental disorders. Therefore, for identification of children-s attachment styles in nursery-s children are of significant importance. For this purpose, to compare the attachment styles between children of nursery with those provided care by their families, the Separation Anxiety Test (SAT) of Slough and et al was administered on 72 children (36 in nursery and 36 family-cared). The results indicated, almost half of children in both groups have insecure attachment styles. Tendency ratio of both groups of children towards Secure and Ambivalent Insecure styles are almost the same. However the avoidant style of attachment in children of nursery is more than those provided care by their families. The children under family care compared to the children of nursery, in the situations of separation from their mothers in the first day of school and sleeping in their room, have shown more self reliance.