CFD Study of Turbine Submergence Effects on Aeration of a Stirred Tank

For many chemical and biological processes, the understanding of the mixing phenomenon and flow behavior in a stirred tank is of major importance. A three-dimensional numerical study was performed using the software Fluent, to study the flow field in a stirred tank with a Rushton turbine. In this work, we first studied the flow generated in the tank with a Rushton turbine. Then, we studied the effect of the variation of turbine’s submergence on the thermodynamic quantities defining the flow field. For that, four submergences were considered, while maintaining the same rotational speed (N =250rpm). This work intends to optimize the aeration performances of a Rushton turbine in a stirred tank.

A Design of Supply Chain Management System with Flexible Planning Capability

In production planning (PP) periods with excess capacity and growing demand, the manufacturers have two options to use the excess capacity. First, it could do more changeovers and thus reduce lot sizes, inventories, and inventory costs. Second, it could produce in excess of demand in the period and build additional inventory that can be used to satisfy future demand increments, thus delaying the purchase of the next machine that is required to meet the growth in demand. In this study we propose an enhanced supply chain planning model with flexible planning capability. In addition, a 3D supply chain planning system is illustrated.

A Comparison of First and Second Order Training Algorithms for Artificial Neural Networks

Minimization methods for training feed-forward networks with Backpropagation are compared. Feedforward network training is a special case of functional minimization, where no explicit model of the data is assumed. Therefore due to the high dimensionality of the data, linearization of the training problem through use of orthogonal basis functions is not desirable. The focus is functional minimization on any basis. A number of methods based on local gradient and Hessian matrices are discussed. Modifications of many methods of first and second order training methods are considered. Using share rates data, experimentally it is proved that Conjugate gradient and Quasi Newton?s methods outperformed the Gradient Descent methods. In case of the Levenberg-Marquardt algorithm is of special interest in financial forecasting.

Evolutionary Search Techniques to Solve Set Covering Problems

Set covering problem is a classical problem in computer science and complexity theory. It has many applications, such as airline crew scheduling problem, facilities location problem, vehicle routing, assignment problem, etc. In this paper, three different techniques are applied to solve set covering problem. Firstly, a mathematical model of set covering problem is introduced and solved by using optimization solver, LINGO. Secondly, the Genetic Algorithm Toolbox available in MATLAB is used to solve set covering problem. And lastly, an ant colony optimization method is programmed in MATLAB programming language. Results obtained from these methods are presented in tables. In order to assess the performance of the techniques used in this project, the benchmark problems available in open literature are used.

Mapping Semantic Networks to Undirected Networks

There exists an injective, information-preserving function that maps a semantic network (i.e a directed labeled network) to a directed network (i.e. a directed unlabeled network). The edge label in the semantic network is represented as a topological feature of the directed network. Also, there exists an injective function that maps a directed network to an undirected network (i.e. an undirected unlabeled network). The edge directionality in the directed network is represented as a topological feature of the undirected network. Through function composition, there exists an injective function that maps a semantic network to an undirected network. Thus, aside from space constraints, the semantic network construct does not have any modeling functionality that is not possible with either a directed or undirected network representation. Two proofs of this idea will be presented. The first is a proof of the aforementioned function composition concept. The second is a simpler proof involving an undirected binary encoding of a semantic network.

A Nano-Scaled SRAM Guard Band Design with Gaussian Mixtures Model of Complex Long Tail RTN Distributions

This paper proposes, for the first time, how the challenges facing the guard-band designs including the margin assist-circuits scheme for the screening-test in the coming process generations should be addressed. The increased screening error impacts are discussed based on the proposed statistical analysis models. It has been shown that the yield-loss caused by the misjudgment on the screening test would become 5-orders of magnitude larger than that for the conventional one when the amplitude of random telegraph noise (RTN) caused variations approaches to that of random dopant fluctuation. Three fitting methods to approximate the RTN caused complex Gamma mixtures distributions by the simple Gaussian mixtures model (GMM) are proposed and compared. It has been verified that the proposed methods can reduce the error of the fail-bit predictions by 4-orders of magnitude.

Removal of Copper (II) from Aqueous Solutions Using Teak (Tectona grandis L.f) Leaves

The experiments were performed in a batch set up under different concentrations of Cu (II) (0.2 g.l-1 to 0.9 g.l-1), pH (4- 6), temperatures (20oC – 40oC) with varying teak leaves powder (as biosorbent) dosage of 0.3 g.l-1 to 0.5 g.l-1. The kinetics of interactions were tested with pseudo first order Lagergran equation and the value for k1 was found to be 6.909 x 10-3 min-1. The biosorption data gave a good fit with Langmuir and Fruendlich isotherms and the Langmuir monolayer capacity (qm) was found to be 166.78 mg. g-1. Similarly the Freundlich adsorption capacity (Kf) was estimated as 2.49 l g-1. The mean values of the thermodynamic parameters ΔH, ΔS, and ΔG were -62.42 KJ. mol-1, -0.219 KJ.mol-1 K-1 and -1.747 KJ.mol-1 at 293 K from a solution containing 0.4 g l-1 of Cu(II) showing the biosorption to be thermodynamically favourable. These results show good potentiality of using teak leaves as a biosorbent for the removal of Cu(II) from aqueous solutions.

Maya Semantic Technique: A Mathematical Technique Used to Determine Partial Semantics for Declarative Sentences

This research uses computational linguistics, an area of study that employs a computer to process natural language, and aims at discerning the patterns that exist in declarative sentences used in technical texts. The approach is mathematical, and the focus is on instructional texts found on web pages. The technique developed by the author and named the MAYA Semantic Technique is used here and organized into four stages. In the first stage, the parts of speech in each sentence are identified. In the second stage, the subject of the sentence is determined. In the third stage, MAYA performs a frequency analysis on the remaining words to determine the verb and its object. In the fourth stage, MAYA does statistical analysis to determine the content of the web page. The advantage of the MAYA Semantic Technique lies in its use of mathematical principles to represent grammatical operations which assist processing and accuracy if performed on unambiguous text. The MAYA Semantic Technique is part of a proposed architecture for an entire web-based intelligent tutoring system. On a sample set of sentences, partial semantics derived using the MAYA Semantic Technique were approximately 80% accurate. The system currently processes technical text in one domain, namely Cµ programming. In this domain all the keywords and programming concepts are known and understood.

Optimal External Merge Sorting Algorithm with Smart Block Merging

Like other external sorting algorithms, the presented algorithm is a two step algorithm including internal and external steps. The first part of the algorithm is like the other similar algorithms but second part of that is including a new easy implementing method which has reduced the vast number of inputoutput operations saliently. As decreasing processor operating time does not have any effect on main algorithm speed, any improvement in it should be done through decreasing the number of input-output operations. This paper propose an easy algorithm for choose the correct record location of the final list. This decreases the time complexity and makes the algorithm faster.

The Effect of a Graded Band Gap Window on the Performance of a Single Junction AlxGa1-xAs/GaAs Solar Cell

We have modeled the effect of a graded band gap window on the performance of a single junction AlxGa1-xAs/GaAs solar cell. First, we study the electrical characteristics of a single junction AlxGa1-xAs/GaAs solar cell, by employing an optimized structure for this solar cell, we show that grading the band gap of the window can increase the conversion efficiency of the solar cell by about 1.5%, and can also improve the quantum efficiency of the solar cell especially at shorter wavelengths.

Hydrolysis Characteristics of Polycrystalline Lithium Hydride Powders and Sintered Bulk

Ambient hydrolysis products in moist air and hydrolysis kinetics in argon with humidity of RH1.5% for polycrystalline LiH powders and sintered bulks were investigated by X-ray diffraction, Raman spectroscopy and gravimetry. The results showed that the hydrolysis products made up a layered structure of LiOH•H2O/LiOH/Li2O from surface of the sample to inside. In low humid argon atmosphere, the primary hydrolysis product was Li2O rather than LiOH. The hydrolysis kinetic curves of LiH bulks present a paralinear shape, which could be explained by the “Layer Diffusion Control" model. While a three-stage hydrolysis kinetic profile was observed for LiH powders under the same experimental conditions. The first two sections were similar to that of the bulk samples, and the third section also presents a linear reaction kinetics but with a smaller reaction rate compared to the second section because of a larger exothermic effect for the hydrolysis reaction of LiH powder.

Image Processing Using Color and Object Information for Wireless Capsule Endoscopy

Wireless capsule endoscopy provides real-time images in the digestive tract. Capsule images are usually low resolution and are diverse images due to travel through various regions of human body. Color information has been a primary reference in predicting abnormalities such as bleeding. Often color is not sufficient for this purpose. In this study, we took morphological shapes into account as additional, but important criterion. First, we processed gastric images in order to indentify various objects in the image. Then, we analyzed color information in the object. In this way, we could remove unnecessary information and increase the accuracy. Compared to our previous investigations, we could handle images of various degrees of brightness and improve our diagnostic algorithm.

Multi-VSS Scheme by Shifting Random Grids

Visual secret sharing (VSS) was proposed by Naor and Shamir in 1995. Visual secret sharing schemes encode a secret image into two or more share images, and single share image can’t obtain any information about the secret image. When superimposes the shares, it can restore the secret by human vision. Due to the traditional VSS have some problems like pixel expansion and the cost of sophisticated. And this method only can encode one secret image. The schemes of encrypting more secret images by random grids into two shares were proposed by Chen et al. in 2008. But when those restored secret images have much distortion, those schemes are almost limited in decoding. In the other words, if there is too much distortion, we can’t encrypt too much information. So, if we can adjust distortion to very small, we can encrypt more secret images. In this paper, four new algorithms which based on Chang et al.’s scheme be held in 2010 are proposed. First algorithm can adjust distortion to very small. Second algorithm distributes the distortion into two restored secret images. Third algorithm achieves no distortion for special secret images. Fourth algorithm encrypts three secret images, which not only retain the advantage of VSS but also improve on the problems of decoding.

Bridge Analysis Structure under Human Induced Dynamic Load

The paper deals with the analysis of the dynamic response of footbridges under human - induced dynamic loads. This is a frequently occurring and often dominant load for footbridges as it stems from the very purpose of a footbridge - to convey pedestrian. Due to the emergence of new materials and advanced engineering technology, slender footbridges are increasingly becoming popular to satisfy the modern transportation needs and the aesthetical requirements of the society. These structures however are always lively with low stiffness, low mass, low damping and low natural frequencies. As a consequence, they are prone to vibration induced by human activities and can suffer severe vibration serviceability problems, particularly in the lateral direction. Pedestrian bridges are designed according to first and second limit states, these are the criteria involved in response to static design load. However, it is necessary to assess the dynamic response of bridge design load on pedestrians and assess it impact on the comfort of the user movement. Usually the load is considered a person or a small group which can be assumed in perfect motion synchronization. Already one person or small group can excite significant vibration of the deck. In order to calculate the dynamic response to the movement of people, designer needs available and suitable computational model and criteria. For the calculation program ANSYS based on finite element method was used.

Kazakhstan and Hague Conference on Private International Law: The Unification of Collision of Law in International Trade

This article discusses the prospects of participation of the Republic of Kazakhstan in Hague Conference on Private International Law on the unification of collision law in the international trade. The article analyzes some conventions on international trade. The appropriate conclusions based on the opinions of scientists and experts in this field have been made. First, all issues presented in the form of gaps or spaces in conventions should be the subject to direct negotiations in the course of the activities of Hague Conference, and have a comprehensive feature, be transparent and taken under simplified procedure. Secondly, one should not underestimate the value of conventions that do not become active due to various reasons and having a positive impact on the development and improvement of national legislation and practice in the field of private international law. Thirdly, Kazakhstan has to reconsider its attitude to Hague Conference, having become its full member and aiming at providing constructive and fruitful cooperation with both the organization itself and its member states.

Analysis on the Game-Playing Tendency of SNGs (Social Network Games) users by Gender

As the Social network game(SNG) is rising dramatically worldwide, an interesting aspect has appeared in the demographic analysis. That is the ratio of the game users by gender. Although the ratio of male and female users in online game was 60:40% previously, the ratio of male and female users in SNG stood at 47:53% which shows that the ratio of female users is higher than that of male users. Here, it should be noted that 35% in those 53% female users are the first-time users of game. This fact suggests that women who were not interested in game previously has taken an interest in SNG. Notwithstanding this issue, there have been little studies on the female users of SNG although there are many studies that analyzed the tendency of female users- online game play. This study conducted the analyzed how the game-playing tendency of SNG gamers was manifested in the game by gender. For that, this study will identify the tendency of SNG users by gender based on the preceding studies that analyzed the online game users by gender. The subject of this study was confined to the farm and urban construction simulation games which were offered based on the mobile application platform. Regarding the methodology of study, the first focus group interview(FGI) was conducted with the male and female users who had played games on Social network service(SNS) until recently. Later, the second one-on-one in-depth interview was conducted to gain an insight into the psychological state of the subjects.

Embedded Semi-Fragile Signature Based Scheme for Ownership Identification and Color Image Authentication with Recovery

In this paper, a novel scheme is proposed for Ownership Identification and Color Image Authentication by deploying Cryptography & Digital Watermarking. The color image is first transformed from RGB to YST color space exclusively designed for watermarking. Followed by color space transformation, each channel is divided into 4×4 non-overlapping blocks with selection of central 2×2 sub-blocks. Depending upon the channel selected two to three LSBs of each central 2×2 sub-block are set to zero to hold the ownership, authentication and recovery information. The size & position of sub-block is important for correct localization, enhanced security & fast computation. As YS ÔèÑ T so it is suitable to embed the recovery information apart from the ownership and authentication information, therefore 4×4 block of T channel along with ownership information is then deployed by SHA160 to compute the content based hash that is unique and invulnerable to birthday attack or hash collision instead of using MD5 that may raise the condition i.e. H(m)=H(m'). For recovery, intensity mean of 4x4 block of each channel is computed and encoded upto eight bits. For watermark embedding, key based mapping of blocks is performed using 2DTorus Automorphism. Our scheme is oblivious, generates highly imperceptible images with correct localization of tampering within reasonable time and has the ability to recover the original work with probability of near one.

Mathematical Approach towards Fault Detection and Isolation of Linear Dynamical Systems

The main objective of this work is to provide a fault detection and isolation based on Markov parameters for residual generation and a neural network for fault classification. The diagnostic approach is accomplished in two steps: In step 1, the system is identified using a series of input / output variables through an identification algorithm. In step 2, the fault is diagnosed comparing the Markov parameters of faulty and non faulty systems. The Artificial Neural Network is trained using predetermined faulty conditions serves to classify the unknown fault. In step 1, the identification is done by first formulating a Hankel matrix out of Input/ output variables and then decomposing the matrix via singular value decomposition technique. For identifying the system online sliding window approach is adopted wherein an open slit slides over a subset of 'n' input/output variables. The faults are introduced at arbitrary instances and the identification is carried out in online. Fault residues are extracted making a comparison of the first five Markov parameters of faulty and non faulty systems. The proposed diagnostic approach is illustrated on benchmark problems with encouraging results.

A Performance Appraisal of Neural Networks Developed for Response Prediction across Heterogeneous Domains

Deciding the numerous parameters involved in designing a competent artificial neural network is a complicated task. The existence of several options for selecting an appropriate architecture for neural network adds to this complexity, especially when different applications of heterogeneous natures are concerned. Two completely different applications in engineering and medical science were selected in the present study including prediction of workpiece's surface roughness in ultrasonic-vibration assisted turning and papilloma viruses oncogenicity. Several neural network architectures with different parameters were developed for each application and the results were compared. It was illustrated in this paper that some applications such as the first one mentioned above are apt to be modeled by a single network with sufficient accuracy, whereas others such as the second application can be best modeled by different expert networks for different ranges of output. Development of knowledge about the essentials of neural networks for different applications is regarded as the cornerstone of multidisciplinary network design programs to be developed as a means of reducing inconsistencies and the burden of the user intervention.

Two Different Solutions for Gigabit Ethernet Transmission over POF

Two completely different approaches for a Gigabit Ethernet compliant stream transmission over 50m of 1mm PMMA SI-POF have been experimentally demonstrated and are compared in this paper. The first solution is based on a commercial RC-LED transmission and a careful optimization of the physical layer architecture, realized during the POF-PLUS EU Project. The second solution exploits the performance of an edge-emitting laser at the transmitter side in order to avoid any sort of electrical equalization at the receiver side.