Abstract: The objective of this work is to show a procedure for
mesh generation in a fluidized bed using large eddy simulations
(LES) of a filtered two-fluid model. The experimental data were
obtained by [1] in a laboratory fluidized bed. Results show that it is
possible to use mesh with less cells as compared to RANS turbulence
model with granular kinetic theory flow (KTGF). Also, the numerical
results validate the experimental data near wall of the bed, which
cannot be predicted by RANS.model.
Abstract: TiO2/MgO composite films were prepared by coating
the magnesium acetate solution in the pores of mesoporous TiO2
films using a dip coating method. Concentrations of magnesium
acetate solution were varied in a range of 1x10-4 – 1x10-1 M. The
TiO2/MgO composite films were characterized by scanning electron
microscopy (SEM), transmission electron microscropy (TEM),
electrochemical impedance spectroscopy(EIS) , transient voltage
decay and I-V test. The TiO2 films and TiO2/MgO composite films
were immersed in a 0.3 mM N719 dye solution. The Dye-sensitized
solar cells with the TiO2/MgO/N719 structure showed an optimal
concentration of magnesium acetate solution of 1x10-3 M resulting in
the MgO film estimated thickness of 0.0963 nm and giving the
maximum efficiency of 4.85%. The improved efficiency of dyesensitized
solar cell was due to the magnesium oxide film as the wide
band gap coating decays the electron back transfer to the triiodide
electrolyte and reduce charge recombination.
Abstract: As emails communications have no consistent
authentication procedure to ensure the authenticity, we present an
investigation analysis approach for detecting forged emails based on
Random Forests and Naïve Bays classifiers. Instead of investigating
the email headers, we use the body content to extract a unique writing
style for all the possible suspects. Our approach consists of four main
steps: (1) The cybercrime investigator extract different effective
features including structural, lexical, linguistic, and syntactic
evidence from previous emails for all the possible suspects, (2) The
extracted features vectors are normalized to increase the accuracy
rate. (3) The normalized features are then used to train the learning
engine, (4) upon receiving the anonymous email (M); we apply the
feature extraction process to produce a feature vector. Finally, using
the machine learning classifiers the email is assigned to one of the
suspects- whose writing style closely matches M. Experimental
results on real data sets show the improved performance of the
proposed method and the ability of identifying the authors with a
very limited number of features.
Abstract: The Bayesian Optimization Algorithm (BOA) is an algorithm based on the estimation of distributions. It uses techniques from modeling data by Bayesian networks to estimating the joint distribution of promising solutions. To obtain the structure of Bayesian network, different search algorithms can be used. The key point that BOA addresses is whether the constructed Bayesian network could generate new and useful solutions (strings), which could lead the algorithm in the right direction to solve the problem. Undoubtedly, this ability is a crucial factor of the efficiency of BOA. Varied search algorithms can be used in BOA, but their performances are different. For choosing better ones, certain suitable method to present their ability difference is needed. In this paper, a greedy search algorithm and a stochastic search algorithm are used in BOA to solve certain optimization problem. A method using Kullback-Leibler (KL) Divergence to reflect their difference is described.
Abstract: In the 21. century it comes true, that competitiveness of the firm is - to a considerable level - influenced by its participation in the chain of suppliers, customers and partners and by the way how the subject cooperates in the chain. This is valid also for new forms of enterprise such as virtual organization or virtual firm. In the first part of the paper there are determined the differences between these forms of enterprise. Another part will bring methodological framework for analysis of the factors, that influence the competitiveness of the virtual organization from spontaneity and order point of view.
Abstract: This study suggests a model of a new set of evaluation criteria that will be used to measure the efficiency of real-world E-commerce websites. Evaluation criteria include design, usability and performance for websites, the Data Envelopment Analysis (DEA) technique has been used to measure the websites efficiency. An efficient Web site is defined as a site that generates the most outputs, using the smallest amount of inputs. Inputs refer to measurements representing the amount of effort required to build, maintain and perform the site. Output is amount of traffic the site generates. These outputs are measured as the average number of daily hits and the average number of daily unique visitors.
Abstract: The mountain road slope failures triggered by
earthquake activities and torrential rain namely to create the disaster.
Province Road No. 24 is a main route to the Wutai Township. The area
of the study is located at the mileages between 46K and 47K along the
road. However, the road has been suffered frequent damages as a result
of landslide and slope failures during typhoon seasons. An
understanding of the sliding behaviors in the area appears to be
necessary. Slope failures triggered by earthquake activities and heavy
rainfalls occur frequently. The study is to understand the mechanism
of slope failures and to look for the way to deal with the situation. In
order to achieve these objectives, this paper is based on theoretical and
structural geology data interpretation program to assess the potential
slope sliding behavior. The study showed an intimate relationship
between the landslide behavior of the slopes and the stratum materials,
based on structural geology analysis method to analysis slope stability
and finds the slope safety coefficient to predict the sites of destroyed
layer. According to the case study and parameter analyses results, the
slope mainly slips direction compared to the site located in the
southeast area. Find rainfall to result in the rise of groundwater level is
main reason of the landslide mechanism. Future need to set up
effective horizontal drain at corrective location, that can effective
restrain mountain road slope failures and increase stability of slope.
Abstract: Most of the concurrent transactional protocols consider
serializability as a correctness criterion of the transactions execution.
Usually, the proof of the serializability relies on mathematical proofs
for a fixed finite number of transactions. In this paper, we introduce
a protocol to deal with an infinite number of transactions which are
iterated infinitely often. We specify serializability of the transactions
and the protocol using a specification language based on temporal
logics. It is worthwhile using temporal logics such as LTL (Lineartime
Temporal Logic) to specify transactions, to gain full automatic
verification by using model checkers.
Abstract: An effect of rolling temperature on the mechanical properties and microstructural evolution of an Al-Mg-Si alloy was studied. The material was rolled up to a true strain of ~0.7 at three different temperatures viz; room temperature, liquid propanol and liquid nitrogen. The liquid nitrogen rolled sample exhibited superior properties with a yield and tensile strength of 332 MPa and 364 MPa, respectively, with a reasonably good ductility of ~9%. The liquid nitrogen rolled sample showed around 54 MPa increase in tensile strength without much reduction in the ductility as compared to the as received T6 condition alloy. The microstructural details revealed equiaxed grains in the annealed and solutionized sample and elongated grains in the rolled samples. In addition, the cryorolled samples exhibited fine grain structure compared to the room temperature rolled samples.
Abstract: In this paper, gate leakage current has been mitigated
by the use of novel nanoscale MOSFET with Source/Drain-to-Gate
Non-overlapped and high-k spacer structure for the first time. A
compact analytical model has been developed to study the gate
leakage behaviour of proposed MOSFET structure. The result
obtained has found good agreement with the Sentaurus Simulation.
Fringing gate electric field through the dielectric spacer induces
inversion layer in the non-overlap region to act as extended S/D
region. It is found that optimal Source/Drain-to-Gate Non-overlapped
and high-k spacer structure has reduced the gate leakage current to
great extent as compared to those of an overlapped structure. Further,
the proposed structure had improved off current, subthreshold slope
and DIBL characteristic. It is concluded that this structure solves the
problem of high leakage current without introducing the extra series
resistance.
Abstract: The requirements analysis, modeling, and simulation have consistently been one of the main challenges during the development of complex systems. The scenarios and the state machines are two successful models to describe the behavior of an interactive system. The scenarios represent examples of system execution in the form of sequences of messages exchanged between objects and are a partial view of the system. In contrast, state machines can represent the overall system behavior. The automation of processing scenarios in the state machines provide some answers to various problems such as system behavior validation and scenarios consistency checking. In this paper, we propose a method for translating scenarios in state machines represented by Discreet EVent Specification and procedure to detect implied scenarios. Each induced DEVS model represents the behavior of an object of the system. The global system behavior is described by coupling the atomic DEVS models and validated through simulation. We improve the validation process with integrating formal methods to eliminate logical inconsistencies in the global model. For that end, we use the Z notation.
Abstract: Authentication of multimedia contents has gained much attention in recent times. In this paper, we propose a secure semi-fragile watermarking, with a choice of two watermarks to be embedded. This technique operates in integer wavelet domain and makes use of semi fragile watermarks for achieving better robustness. A self-recovering algorithm is employed, that hides the image digest into some Wavelet subbands to detect possible malevolent object manipulation undergone by the image (object replacing and/or deletion). The Semi-fragility makes the scheme tolerant for JPEG lossy compression as low as quality of 70%, and locate the tempered area accurately. In addition, the system ensures more security because the embedded watermarks are protected with private keys. The computational complexity is reduced using parameterized integer wavelet transform. Experimental results show that the proposed scheme guarantees the safety of watermark, image recovery and location of the tempered area accurately.
Abstract: Reentry trajectory optimization is a multi-constraints
optimal control problem which is hard to solve. To tackle it, we
proposed a new algorithm named CDEN(Constrained Differential
Evolution Newton-Raphson Algorithm) based on Differential Evolution(
DE) and Newton-Raphson.We transform the infinite dimensional
optimal control problem to parameter optimization which is finite
dimensional by discretize control parameter. In order to simplify
the problem, we figure out the control parameter-s scope by process
constraints. To handle constraints, we proposed a parameterless constraints
handle process. Through comprehensive analyze the problem,
we use a new algorithm integrated by DE and Newton-Raphson to
solve it. It is validated by a reentry vehicle X-33, simulation results
indicated that the algorithm is effective and robust.
Abstract: Orthogonal frequency division multiplexing (OFDM)
has developed into a popular scheme for wideband digital
communications used in consumer applications such as digital broadcasting, wireless networking and broadband internet access. In
the OFDM system, carrier frequency offset (CFO) causes intercarrier
interference (ICI) which significantly degrades the system error performance. In this paper we provide an exact evaluation method for error performance analysis of arbitrary 2-D modulation OFDM systems with CFO, and analyze the effect of CFO on error performance.
Abstract: This paper presents an application of power line
carrier (PLC) for electrical power telemetering. This system has a
special capability of transmitting the measured values to a centralized
computer via power lines. The PLC modem as a passive high-pass
filter is designed for transmitting and receiving information. Its
function is to send the information carrier together with transmitted
data by superimposing it on the 50 Hz power frequency signal. A
microcontroller is employed to function as the main processing of the
modem. It is programmed for PLC control and interfacing with other
devices. Each power meter, connected via a PLC modem, is assigned
with a unique identification number (address) for distinguishing each
device from one another.
Abstract: This research is intended to develop a raw material allocation model in timber processing industry in Perum Perhutani Unit I, Central Java, Indonesia. The model can be used to determine the quantity of allocation of timber between chain in the supply chain to select supplier considering factors that are log price and the distance. In determining the quantity of allocation of timber between chains in the supply chain, the model considers the optimal inventory in each chain. Whilst the optimal inventory is determined based on demand forecast, the capacity and safety stock. Problem solving allocation is conducted by developing linear programming model that aims to minimize the total cost of the purchase, transportation cost and storage costs at each chain. The results of numerical examples show that the proposed model can generate savings of the purchase cost of 20.84% and select suppliers with mileage closer.
Abstract: This study was carried out to evaluate concentration
of micro minerals (Zn, Fe, Mn, Cu and Se) of forages and their
distribution in fiber fraction (neutral detergent fiber/NDF and acid
detergent fiber/ADF) in South Sumatra during dry and rainy seasons.
Seven species of commonly forages namely Axonopus compressus,
Panicum maximum, Pennisetum purpuphoides, Leucaena
leucocephala, Centrocema pubescens, Calopogonium mucunoides
and Acacia mangium were collected at native pasture during rainy
and dry seasons. The results showed that micro minerals
concentration of forages and their distribution in fiber fraction varied
among species and season. In general, concentration of micro
minerals was slightly higher in rainy season compared to dry season
either in grass or legumes forages. In grass, concentration of Fe and
Mn were above the critical level, while 33.3 %, 100 % and 16.7 % of
evaluated grass were deficient in Zn, Cu and Se. Data on legume
forages show that 75 % of legumes were deficient in Zn and Mn, 62.5
% deficient in Cu and 50 % deficient in Se. There was no species of
legume deficient in Fe. Distribution of micro minerals in NDF and
ADF were also significantly affected by species and season and
depends on the kinds of element measured. Generally, micro minerals
were associated in fiber fractions much higher during dry season
compared to rainy season. Iron (Fe) and selenium (Se) in forages
were the highest elements associated in NDF and ADF, while the
lowest was found in Copper (Cu).
Abstract: Designing modern machine tools is a complex task. A
simulation tool to aid the design work, a virtual machine, has
therefore been developed in earlier work. The virtual machine
considers the interaction between the mechanics of the machine
(including structural flexibility) and the control system. This paper
exemplifies the usefulness of the virtual machine as a tool for product
development. An optimisation study is conducted aiming at
improving the existing design of a machine tool regarding weight and
manufacturing accuracy at maintained manufacturing speed. The
problem can be categorised as constrained multidisciplinary multiobjective
multivariable optimisation. Parameters of the control and
geometric quantities of the machine are used as design variables. This
results in a mix of continuous and discrete variables and an
optimisation approach using a genetic algorithm is therefore
deployed. The accuracy objective is evaluated according to
international standards. The complete systems model shows nondeterministic
behaviour. A strategy to handle this based on statistical
analysis is suggested. The weight of the main moving parts is reduced
by more than 30 per cent and the manufacturing accuracy is
improvement by more than 60 per cent compared to the original
design, with no reduction in manufacturing speed. It is also shown
that interaction effects exist between the mechanics and the control,
i.e. this improvement would most likely not been possible with a
conventional sequential design approach within the same time, cost
and general resource frame. This indicates the potential of the virtual
machine concept for contributing to improved efficiency of both
complex products and the development process for such products.
Companies incorporating such advanced simulation tools in their
product development could thus improve its own competitiveness as
well as contribute to improved resource efficiency of society at large.
Abstract: The purposes of this research were 1) to investigate
behavior of media exposure and participation in environmental
activities of King Mongkut-s University of Technology Thonburi
(KMUTT) dormitory students, 2) to compare the correlation between
faculties and participation in environmental activities of KMUTT
dormitory students, and 3) to compare the correlation between media
exposure and participation in environmental activities of KMUTT
dormitory students. The tool used for collecting data was
questionnaire. The research findings revealed that dormitory students
were mostly exposed to the environmental media via public relations
boards for general media and KMUTT dormitory media. Dormitory
students were daily exposed to media via websites on the internet and
weekly for other media. Dormitory students participation in the
environmental activities was at high level (x = 3.65) on an
individual basis and was at medium level (x = 2.76) on a collective
basis. Faculties did not correlate with the participation in
environmental activities of dormitory students at the .01 statistical
level and media exposure via various media correlated with
participation in environmental activities of dormitory students at the
.01 statistical level.
Abstract: MicroRNAs (miRNAs) are a class of non-coding
RNAs that hybridize to mRNAs and induce either translation
repression or mRNA cleavage. Recently, it has been reported that
miRNAs could possibly play an important role in human diseases. By
integrating miRNA target genes, cancer genes, miRNA and mRNA
expression profiles information, a database is developed to link
miRNAs to cancer target genes. The database provides experimentally
verified human miRNA target genes information, including oncogenes
and tumor suppressor genes. In addition, fragile sites information for
miRNAs, and the strength of the correlation of miRNA and its target
mRNA expression level for nine tissue types are computed, which
serve as an indicator for suggesting miRNAs could play a role in
human cancer. The database is freely accessible at
http://ppi.bioinfo.asia.edu.tw/mirna_target/index.html.