Abstract: The major part of light weight timber constructions
consists of insulation. Mineral wool is the most commonly used
insulation due to its cost efficiency and easy handling. The fiber
orientation and porosity of this insulation material enables flowthrough.
The air flow resistance is low. If leakage occurs in the
insulated bay section, the convective flow may cause energy losses
and infiltration of the exterior wall with moisture and particles. In
particular the infiltrated moisture may lead to thermal bridges and
growth of health endangering mould and mildew. In order to prevent
this problem, different numerical calculation models have been
developed. All models developed so far have a potential for
completion. The implementation of the flow-through properties of
mineral wool insulation may help to improve the existing models.
Assuming that the real pressure difference between interior and
exterior surface is larger than the prescribed pressure difference in the
standard test procedure for mineral wool ISO 9053 / EN 29053,
measurements were performed using the measurement setup for
research on convective moisture transfer “MSRCMT".
These measurements show, that structural inhomogeneities of
mineral wool effect the permeability only at higher pressure
differences, as applied in MSRCMT. Additional microscopic
investigations show, that the location of a leak within the
construction has a crucial influence on the air flow-through and the
infiltration rate. The results clearly indicate that the empirical values
for the acoustic resistance of mineral wool should not be used for the
calculation of convective transfer mechanisms.
Abstract: In today's day and age, one of the important topics in
information security is authentication. There are several alternatives
to text-based authentication of which includes Graphical Password
(GP) or Graphical User Authentication (GUA). These methods stems
from the fact that humans recognized and remembers images better
than alphanumerical text characters. This paper will focus on the
security aspect of GP algorithms and what most researchers have
been working on trying to define these security features and
attributes. The goal of this study is to develop a fuzzy decision model
that allows automatic selection of available GP algorithms by taking
into considerations the subjective judgments of the decision makers
who are more than 50 postgraduate students of computer science. The
approach that is being proposed is based on the Fuzzy Analytic
Hierarchy Process (FAHP) which determines the criteria weight as a
linear formula.
Abstract: Literature reveals that many investors rely on technical trading rules when making investment decisions. If stock markets are efficient, one cannot achieve superior results by using these trading rules. However, if market inefficiencies are present, profitable opportunities may arise. The aim of this study is to investigate the effectiveness of technical trading rules in 34 emerging stock markets. The performance of the rules is evaluated by utilizing White-s Reality Check and the Superior Predictive Ability test of Hansen, along with an adjustment for transaction costs. These tests are able to evaluate whether the best model performs better than a buy-and-hold benchmark. Further, they provide an answer to data snooping problems, which is essential to obtain unbiased outcomes. Based on our results we conclude that technical trading rules are not able to outperform a naïve buy-and-hold benchmark on a consistent basis. However, we do find significant trading rule profits in 4 of the 34 investigated markets. We also present evidence that technical analysis is more profitable in crisis situations. Nevertheless, this result is relatively weak.
Abstract: This paper reports the tensile fracture location
characterizations of dissimilar friction stir welds between 5754
aluminium alloy and C11000 copper. The welds were produced using
three shoulder diameter tools; namely, 15, 18 and 25 mm by varying
the process parameters. The rotational speeds considered were 600,
950 and 1200 rpm while the feed rates employed were 50, 150 and
300 mm/min to represent the low, medium and high settings
respectively. The tensile fracture locations were evaluated using the
optical microscope to identify the fracture locations and were
characterized. It was observed that 70% of the tensile samples failed
in the Thermo Mechanically Affected Zone (TMAZ) of copper at the
weld joints. Further evaluation of the fracture surfaces of the pulled
tensile samples revealed that welds with low Ultimate Tensile
Strength either have defects or intermetallics present at their joint
interfaces.
Abstract: A cancelable palmprint authentication system
proposed in this paper is specifically designed to overcome the
limitations of the contemporary biometric authentication system. In
this proposed system, Geometric and pseudo Zernike moments are
employed as feature extractors to transform palmprint image into a
lower dimensional compact feature representation. Before moment
computation, wavelet transform is adopted to decompose palmprint
image into lower resolution and dimensional frequency subbands.
This reduces the computational load of moment calculation
drastically. The generated wavelet-moment based feature
representation is used to generate cancelable verification key with a
set of random data. This private binary key can be canceled and
replaced. Besides that, this key also possesses high data capture
offset tolerance, with highly correlated bit strings for intra-class
population. This property allows a clear separation of the genuine
and imposter populations, as well as zero Equal Error Rate
achievement, which is hardly gained in the conventional biometric
based authentication system.
Abstract: We have developed a database for membrane protein functions, which has more than 3000 experimental data on functionally important amino acid residues in membrane proteins along with sequence, structure and literature information. Further, we have proposed different methods for identifying membrane proteins based on their functions: (i) discrimination of membrane transport proteins from other globular and membrane proteins and classifying them into channels/pores, electrochemical and active transporters, and (ii) β-signal for the insertion of mitochondrial β-barrel outer membrane proteins and potential targets. Our method showed an accuracy of 82% in discriminating transport proteins and 68% to classify them into three different transporters. In addition, we have identified a motif for targeting β-signal and potential candidates for mitochondrial β-barrel membrane proteins. Our methods can be used as effective tools for genome-wide annotations.
Abstract: The methanolic extracts from seeds of tamarind
(Tamarindus indica) was prepared by Soxhlet apparatus extraction
and evaluated for total phenolic content by Folin-Ciocalteu method.
Then, methanolic extract was screened biological activities (In vitro)
for anti-melanogenic activity by tyrosinase inhibition test, antiinflammation
activity by cyclooxygenase 1 (COX-1) and
cyclooxygenase 2 (COX-2) inhibition test, and cytotoxic screening
test with Vero cells. The results showed that total phenolic content,
which contained in extract, was contained 27.72 mg of gallic acid
equivalent per g of dry weight. The ability to inhibit tyrosinase
enzyme, which exerted by Tamarind seed extracts (1 mg/ml) was
52.13 ± 0.42 %. The extract was not possessed inhibitory effect to
COX-1 and COX-2 enzymes and cytotoxic effect to Vero cells. The
finding is concludes that tested seed extract was possessed
antimelanogenic activity with non-toxic effects. However, there was
not exhibited anti-inflammatory activity. Further studies include the
use of advance biological models to confirm this biological activity,
as well as, the isolation and characterization of the purified
compounds that it was contained.
Abstract: One of the major, difficult tasks in automated video
surveillance is the segmentation of relevant objects in the scene.
Current implementations often yield inconsistent results on average
from frame to frame when trying to differentiate partly occluding
objects. This paper presents an efficient block-based segmentation
algorithm which is capable of separating partly occluding objects and
detecting shadows. It has been proven to perform in real time with a
maximum duration of 47.48 ms per frame (for 8x8 blocks on a
720x576 image) with a true positive rate of 89.2%. The flexible
structure of the algorithm enables adaptations and improvements with
little effort. Most of the parameters correspond to relative differences
between quantities extracted from the image and should therefore not
depend on scene and lighting conditions. Thus presenting a
performance oriented segmentation algorithm which is applicable in
all critical real time scenarios.
Abstract: Controlled release urea has become popular in agricultural industry as it helps to solve environmental issues and increase crop yield. Recently biomass was identified to replace the polymer used as a coating material in the conventional coated urea. In this paper spreading and contact angle of biomass droplet (lignin, cellulose and clay) on urea surface are investigated experimentally. There were two tests were conducted, sessile drop for contact angle measurement and pendant drop for contact angle measurement. A different concentration of biomass droplet was released from 30 mm above a substrate. Glass was used as a controlled substrate. Images were recorded as soon as the droplet impacted onto the urea before completely adsorb into the urea. Digitized droplets were then used to identify the droplet-s surface tension and contact angle. There is large difference observed between the low surface tension and high surface tension liquids, where the wetting and spreading diameter is higher for lower surface tension. From the contact angle results, the data showed that the biomass coating films were possible as wetting liquid (θ < 90º). Contact angle of biomass coating material gives good indication for the wettablity of a liquid on urea surface.
Abstract: None of the processing models in the software
development has explained the software systems performance
evaluation and modeling; likewise, there exist uncertainty in the
information systems because of the natural essence of requirements,
and this may cause other challenges in the processing of software
development. By definition an extended version of UML (Fuzzy-
UML), the functional requirements of the software defined
uncertainly would be supported. In this study, the behavioral
description of uncertain information systems by the aid of fuzzy-state
diagram is crucial; moreover, the introduction of behavioral diagrams
role in F-UML is investigated in software performance modeling
process. To get the aim, a fuzzy sub-profile is used.
Abstract: In the area where the high quality water is not
available, unconventional water sources are used to irrigate.
Household leachate is one of the sources which are used in dry and
semi dry areas in order to water the barer trees and plants. It meets
the plants needs and also has some effects on the soil, but at the same
time it might cause some problems as well. This study in order to
evaluate the effect of using Compost leachate on the density of soil
iron in form of a statistical pattern called ''Split Plot'' by using two
main treatments, one subsidiary treatment and three repetitions of the
pattern in a three month period. The main N treatments include:
irrigation using well water as a blank treatments and the main I
treatments include: irrigation using leachate and well water
concurrently. Some subsidiary treatments were DI (Drop Irrigation)
and SDI (Sub Drop Irrigation). Then in the established plots, 36
biannual pine and cypress shrubs were randomly grown. Two months
later the treatment begins. The results revealed that there was a
significant variation between the main treatment and the instance
regarding pH decline in the soil which was related to the amount of
leachate injected into the soil. After some time and using leachate the
pH level fell, as much as 0.46 and also increased due to the great
amounts of leachate. The underneath drop irrigation ends in better
results than sub drop irrigation since it keeps the soil texture fixed.
Abstract: Perturbed-Chain Statistical Association Fluid Theory (PC-SAFT) equation of state (EOS) is a modified SAFT EOS with three pure component specific parameters: segment number (m), diameter (σ) and energy (ε). These PC-SAFT parameters need to be determined for each component under the conditions of interest by fitting experimental data, such as vapor pressure, density or heat capacity. PC-SAFT parameters for propane, ethylene and hydrogen in supercritical region were successfully estimated by fitting experimental density data available in literature. The regressed PCSAFT parameters were compared with the literature values by means of estimating pure component density and calculating average absolute deviation between the estimated and experimental density values. PC-SAFT parameters available in literature especially for ethylene and hydrogen estimated density in supercritical region reasonably well. However, the regressed PC-SAFT parameters performed better in supercritical region than the PC-SAFT parameters from literature.
Abstract: This paper presents an exact analytical model for
optimizing stability of thin-walled, composite, functionally graded
pipes conveying fluid. The critical flow velocity at which divergence
occurs is maximized for a specified total structural mass in order to
ensure the economic feasibility of the attained optimum designs. The
composition of the material of construction is optimized by defining
the spatial distribution of volume fractions of the material
constituents using piecewise variations along the pipe length. The
major aim is to tailor the material distribution in the axial direction so
as to avoid the occurrence of divergence instability without the
penalty of increasing structural mass. Three types of boundary
conditions have been examined; namely, Hinged-Hinged, Clamped-
Hinged and Clamped-Clamped pipelines. The resulting optimization
problem has been formulated as a nonlinear mathematical
programming problem solved by invoking the MatLab optimization
toolbox routines, which implement constrained function
minimization routine named “fmincon" interacting with the
associated eigenvalue problem routines. In fact, the proposed
mathematical models have succeeded in maximizing the critical flow
velocity without mass penalty and producing efficient and economic
designs having enhanced stability characteristics as compared with
the baseline designs.
Abstract: As part of national epidemiological survey on bovine
viral diarrhea virus (BVDV), a total of 274 dejecta samples were
collected from 14 cattle farms in 8 areas of Xinjiang Uygur
Autonomous Region in northwestern China. Total RNA was extracted
from each sample, and 5--untranslated region (UTR) of BVDV
genome was amplified by using two-step reverse
transcriptase-polymerase chain reaction (RT-PCR). The PCR products
were subsequently sequenced to study the genetic variations of BVDV
in these areas. Among the 274 samples, 33 samples were found
virus-positive. According to sequence analysis of the PCR products,
the 33 samples could be arranged into 16 groups. All the sequences,
however, were highly conserved with BVDV Osloss strains. The virus
possessed theses sequences belonged to BVDV-1b subtype by
phylogenetic analysis. Based on these data, we established a typing
tree for BVDV in these areas. Our results suggested that BVDV-1b
was a predominant subgenotype in northwestern China and no
correlation between the genetic and geographical distances could be
observed above the farm level.
Abstract: In Algeria, some fruit trees produce fruits in free nature. Such trees are Celtis australis, Crataegus azarolus, Crataegus monogyna and Zizyphus lotus. In spite of their appreciable consumption, their nutritional value remains unknown. The objective of this study is the determination of sugars in the pulpe and almond of the above fruits. The biochemical analysis shows that these fruits present interesting contents of soluble sugars which confers significant caloric intakes to them. As well as significant fibres which give them therapeutic and industrial benefits? The analysis of the almonds shows that it contains considerable contents of sugars which enable them to be an energetic food.
Abstract: This paper is to develop a fuzzy net present value (FNPV) method by taking vague cash flow and imprecise required rate of return into account for evaluating the value of the Build-Operate-Transfer (BOT) sport facilities. In order to clearly manifest a more realistic capital budgeting model based on the classical net present value (NPV) method, some uncertain financial elements in NPV formula will be fuzzified as triangular fuzzy numbers. Through the conscientious manipulation of fuzzy set theory, we will find that the proposed FNPV model is a more explicit extension of classical (crisp) model and could be more practicable for the financial managers to capture the essence of capital budgeting of sport facilities than non-fuzzy model.
Abstract: This paper deals with the problem of constructing
constraints in non safe Petri Nets and then reducing the number of the
constructed constraints. In a system, assigning some linear constraints
to forbidden states is possible. Enforcing these constraints on the
system prevents it from entering these states. But there is no a
systematic method for assigning constraints to forbidden states in non
safe Petri Nets. In this paper a useful method is proposed for
constructing constraints in non safe Petri Nets. But when the number of these constraints is large enforcing them on the system may complicate the Petri Net model. So, another method is proposed for reducing the number of constructed constraints.
Abstract: The usage of internet is rapidly increasing and the usage of mobile agent technology in internet environment has a great demand. The security issue one of main obstacles that restrict the mobile agent technology to spread. This paper proposes Secure-Image Mechanism (SIM) as a new mechanism to protect mobile agents against malicious hosts. . SIM aims to protect mobile agent by using the symmetric encryption and hash function in cryptography science. This mechanism can prevent the eavesdropping and alteration attacks. It assists the mobile agents to continue their journey normally incase attacks occurred.
Abstract: Bonding has become a routine procedure in several
dental specialties – from prosthodontics to conservative dentistry and
even orthodontics. In many of these fields it is important to be able to
investigate the bonded interfaces to assess their quality. All currently
employed investigative methods are invasive, meaning that samples
are destroyed in the testing procedure and cannot be used again. We
have investigated the interface between human enamel and bonded
ceramic brackets non-invasively, introducing a combination of new
investigative methods – optical coherence tomography (OCT),
fluorescence OCT and confocal microscopy (CM). Brackets were
conventionally bonded on conditioned buccal surfaces of teeth. The
bonding was assessed using these methods. Three dimensional
reconstructions of the detected material defects were developed using
manual and semi-automatic segmentation. The results clearly prove
that OCT, fluorescence OCT and CM are useful in orthodontic
bonding investigations.
Abstract: Network reconfiguration in distribution system is realized by changing the status of sectionalizing switches to reduce the power loss in the system. This paper presents a new method which applies an artificial bee colony algorithm (ABC) for determining the sectionalizing switch to be operated in order to solve the distribution system loss minimization problem. The ABC algorithm is a new population based metaheuristic approach inspired by intelligent foraging behavior of honeybee swarm. The advantage of ABC algorithm is that it does not require external parameters such as cross over rate and mutation rate as in case of genetic algorithm and differential evolution and it is hard to determine these parameters in prior. The other advantage is that the global search ability in the algorithm is implemented by introducing neighborhood source production mechanism which is a similar to mutation process. To demonstrate the validity of the proposed algorithm, computer simulations are carried out on 14, 33, and 119-bus systems and compared with different approaches available in the literature. The proposed method has outperformed the other methods in terms of the quality of solution and computational efficiency.