Abstract: For many chemical and biological processes, the understanding of the mixing phenomenon and flow behavior in a stirred tank is of major importance. A three-dimensional numerical study was performed using the software Fluent, to study the flow field in a stirred tank with a Rushton turbine. In this work, we first studied the flow generated in the tank with a Rushton turbine. Then, we studied the effect of the variation of turbine’s submergence on the thermodynamic quantities defining the flow field. For that, four submergences were considered, while maintaining the same rotational speed (N =250rpm). This work intends to optimize the aeration performances of a Rushton turbine in a stirred tank.
Abstract: In production planning (PP) periods with excess capacity
and growing demand, the manufacturers have two options to use the excess capacity. First, it could do more changeovers and thus reduce lot sizes, inventories, and inventory costs. Second, it could produce in excess of demand in the period and build additional inventory that can be used to satisfy future demand increments, thus
delaying the purchase of the next machine that is required to meet the growth in demand. In this study we propose an enhanced supply
chain planning model with flexible planning capability. In addition, a 3D supply chain planning system is illustrated.
Abstract: Minimization methods for training feed-forward networks with Backpropagation are compared. Feedforward network training is a special case of functional minimization, where no explicit model of the data is assumed. Therefore due to the high dimensionality of the data, linearization of the training problem through use of orthogonal basis functions is not desirable. The focus is functional minimization on any basis. A number of methods based on local gradient and Hessian matrices are discussed. Modifications of many methods of first and second order training methods are considered. Using share rates data, experimentally it is proved that Conjugate gradient and Quasi Newton?s methods outperformed the Gradient Descent methods. In case of the Levenberg-Marquardt algorithm is of special interest in financial forecasting.
Abstract: Set covering problem is a classical problem in
computer science and complexity theory. It has many applications,
such as airline crew scheduling problem, facilities location problem,
vehicle routing, assignment problem, etc. In this paper, three
different techniques are applied to solve set covering problem.
Firstly, a mathematical model of set covering problem is introduced
and solved by using optimization solver, LINGO. Secondly, the
Genetic Algorithm Toolbox available in MATLAB is used to solve
set covering problem. And lastly, an ant colony optimization method
is programmed in MATLAB programming language. Results
obtained from these methods are presented in tables. In order to
assess the performance of the techniques used in this project, the
benchmark problems available in open literature are used.
Abstract: There exists an injective, information-preserving function
that maps a semantic network (i.e a directed labeled network)
to a directed network (i.e. a directed unlabeled network). The edge
label in the semantic network is represented as a topological feature
of the directed network. Also, there exists an injective function that
maps a directed network to an undirected network (i.e. an undirected
unlabeled network). The edge directionality in the directed network
is represented as a topological feature of the undirected network.
Through function composition, there exists an injective function that
maps a semantic network to an undirected network. Thus, aside from
space constraints, the semantic network construct does not have any
modeling functionality that is not possible with either a directed
or undirected network representation. Two proofs of this idea will
be presented. The first is a proof of the aforementioned function
composition concept. The second is a simpler proof involving an
undirected binary encoding of a semantic network.
Abstract: This paper proposes, for the first time, how the
challenges facing the guard-band designs including the margin
assist-circuits scheme for the screening-test in the coming process
generations should be addressed. The increased screening error
impacts are discussed based on the proposed statistical analysis
models. It has been shown that the yield-loss caused by the
misjudgment on the screening test would become 5-orders of
magnitude larger than that for the conventional one when the
amplitude of random telegraph noise (RTN) caused variations
approaches to that of random dopant fluctuation. Three fitting methods
to approximate the RTN caused complex Gamma mixtures
distributions by the simple Gaussian mixtures model (GMM) are
proposed and compared. It has been verified that the proposed
methods can reduce the error of the fail-bit predictions by 4-orders of
magnitude.
Abstract: The experiments were performed in a batch set up
under different concentrations of Cu (II) (0.2 g.l-1 to 0.9 g.l-1), pH (4-
6), temperatures (20oC – 40oC) with varying teak leaves powder (as
biosorbent) dosage of 0.3 g.l-1 to 0.5 g.l-1. The kinetics of interactions
were tested with pseudo first order Lagergran equation and the value
for k1 was found to be 6.909 x 10-3 min-1. The biosorption data gave
a good fit with Langmuir and Fruendlich isotherms and the Langmuir
monolayer capacity (qm) was found to be 166.78 mg. g-1. Similarly
the Freundlich adsorption capacity (Kf) was estimated as 2.49 l g-1.
The mean values of the thermodynamic parameters ΔH, ΔS, and ΔG
were -62.42 KJ. mol-1, -0.219 KJ.mol-1 K-1 and -1.747 KJ.mol-1 at
293 K from a solution containing 0.4 g l-1 of Cu(II) showing the
biosorption to be thermodynamically favourable. These results show
good potentiality of using teak leaves as a biosorbent for the removal
of Cu(II) from aqueous solutions.
Abstract: This research uses computational linguistics, an area of study that employs a computer to process natural language, and aims at discerning the patterns that exist in declarative sentences used in technical texts. The approach is mathematical, and the focus is on instructional texts found on web pages. The technique developed by the author and named the MAYA Semantic Technique is used here and organized into four stages. In the first stage, the parts of speech in each sentence are identified. In the second stage, the subject of the sentence is determined. In the third stage, MAYA performs a frequency analysis on the remaining words to determine the verb and its object. In the fourth stage, MAYA does statistical analysis to determine the content of the web page. The advantage of the MAYA Semantic Technique lies in its use of mathematical principles to represent grammatical operations which assist processing and accuracy if performed on unambiguous text. The MAYA Semantic Technique is part of a proposed architecture for an entire web-based intelligent tutoring system. On a sample set of sentences, partial semantics derived using the MAYA Semantic Technique were approximately 80% accurate. The system currently processes technical text in one domain, namely Cµ programming. In this domain all the keywords and programming concepts are known and understood.
Abstract: Like other external sorting algorithms, the presented
algorithm is a two step algorithm including internal and external
steps. The first part of the algorithm is like the other similar
algorithms but second part of that is including a new easy
implementing method which has reduced the vast number of inputoutput
operations saliently. As decreasing processor operating time
does not have any effect on main algorithm speed, any improvement
in it should be done through decreasing the number of input-output
operations. This paper propose an easy algorithm for choose the
correct record location of the final list. This decreases the time
complexity and makes the algorithm faster.
Abstract: We have modeled the effect of a graded band gap
window on the performance of a single junction AlxGa1-xAs/GaAs
solar cell. First, we study the electrical characteristics of a single
junction AlxGa1-xAs/GaAs solar cell, by employing an optimized
structure for this solar cell, we show that grading the band gap of the
window can increase the conversion efficiency of the solar cell by
about 1.5%, and can also improve the quantum efficiency of the solar
cell especially at shorter wavelengths.
Abstract: Ambient hydrolysis products in moist air and
hydrolysis kinetics in argon with humidity of RH1.5% for
polycrystalline LiH powders and sintered bulks were investigated by
X-ray diffraction, Raman spectroscopy and gravimetry. The results
showed that the hydrolysis products made up a layered structure of
LiOH•H2O/LiOH/Li2O from surface of the sample to inside. In low
humid argon atmosphere, the primary hydrolysis product was Li2O
rather than LiOH. The hydrolysis kinetic curves of LiH bulks present a
paralinear shape, which could be explained by the “Layer Diffusion
Control" model. While a three-stage hydrolysis kinetic profile was
observed for LiH powders under the same experimental conditions.
The first two sections were similar to that of the bulk samples, and the
third section also presents a linear reaction kinetics but with a smaller
reaction rate compared to the second section because of a larger
exothermic effect for the hydrolysis reaction of LiH powder.
Abstract: Wireless capsule endoscopy provides real-time images in the digestive tract. Capsule images are usually low resolution and are diverse images due to travel through various regions of human body. Color information has been a primary reference in predicting abnormalities such as bleeding. Often color is not sufficient for this purpose. In this study, we took morphological shapes into account as additional, but important criterion. First, we processed gastric images in order to indentify various objects in the image. Then, we analyzed color information in the object. In this way, we could remove unnecessary information and increase the accuracy. Compared to our previous investigations, we could handle images of various degrees of brightness and improve our diagnostic algorithm.
Abstract: Visual secret sharing (VSS) was proposed by Naor and Shamir in 1995. Visual secret sharing schemes encode a secret image into two or more share images, and single share image can’t obtain any information about the secret image. When superimposes the shares, it can restore the secret by human vision. Due to the traditional VSS have some problems like pixel expansion and the cost of sophisticated. And this method only can encode one secret image. The schemes of encrypting more secret images by random grids into two shares were proposed by Chen et al. in 2008. But when those restored secret images have much distortion, those schemes are almost limited in decoding. In the other words, if there is too much distortion, we can’t encrypt too much information. So, if we can adjust distortion to very small, we can encrypt more secret images. In this paper, four new algorithms which based on Chang et al.’s scheme be held in 2010 are proposed. First algorithm can adjust distortion to very small. Second algorithm distributes the distortion into two restored secret images. Third algorithm achieves no distortion for special secret images. Fourth algorithm encrypts three secret images, which not only retain the advantage of VSS but also improve on the problems of decoding.
Abstract: The paper deals with the analysis of the dynamic
response of footbridges under human - induced dynamic loads.
This is a frequently occurring and often dominant load for
footbridges as it stems from the very purpose of a footbridge - to
convey pedestrian. Due to the emergence of new materials and
advanced engineering technology, slender footbridges are
increasingly becoming popular to satisfy the modern transportation
needs and the aesthetical requirements of the society. These
structures however are always lively with low stiffness, low mass,
low damping and low natural frequencies. As a consequence, they are
prone to vibration induced by human activities and can suffer severe
vibration serviceability problems, particularly in the lateral direction.
Pedestrian bridges are designed according to first and second limit
states, these are the criteria involved in response to static design load.
However, it is necessary to assess the dynamic response of bridge
design load on pedestrians and assess it impact on the comfort of the
user movement. Usually the load is considered a person or a small
group which can be assumed in perfect motion synchronization.
Already one person or small group can excite significant vibration of
the deck. In order to calculate the dynamic response to the movement
of people, designer needs available and suitable computational model
and criteria. For the calculation program ANSYS based on finite
element method was used.
Abstract: This article discusses the prospects of participation of
the Republic of Kazakhstan in Hague Conference on Private
International Law on the unification of collision law in the
international trade.
The article analyzes some conventions on international trade. The
appropriate conclusions based on the opinions of scientists and
experts in this field have been made. First, all issues presented in the
form of gaps or spaces in conventions should be the subject to direct
negotiations in the course of the activities of Hague Conference, and
have a comprehensive feature, be transparent and taken under
simplified procedure.
Secondly, one should not underestimate the value of conventions
that do not become active due to various reasons and having a
positive impact on the development and improvement of national
legislation and practice in the field of private international law.
Thirdly, Kazakhstan has to reconsider its attitude to Hague
Conference, having become its full member and aiming at providing
constructive and fruitful cooperation with both the organization itself
and its member states.
Abstract: As the Social network game(SNG) is rising
dramatically worldwide, an interesting aspect has appeared in the
demographic analysis. That is the ratio of the game users by gender.
Although the ratio of male and female users in online game was
60:40% previously, the ratio of male and female users in SNG stood at
47:53% which shows that the ratio of female users is higher than that
of male users. Here, it should be noted that 35% in those 53% female
users are the first-time users of game. This fact suggests that women
who were not interested in game previously has taken an interest in
SNG. Notwithstanding this issue, there have been little studies on the
female users of SNG although there are many studies that analyzed the
tendency of female users- online game play. This study conducted the
analyzed how the game-playing tendency of SNG gamers was
manifested in the game by gender. For that, this study will identify the
tendency of SNG users by gender based on the preceding studies that
analyzed the online game users by gender. The subject of this study
was confined to the farm and urban construction simulation games
which were offered based on the mobile application platform.
Regarding the methodology of study, the first focus group
interview(FGI) was conducted with the male and female users who
had played games on Social network service(SNS) until recently. Later,
the second one-on-one in-depth interview was conducted to gain an
insight into the psychological state of the subjects.
Abstract: In this paper, a novel scheme is proposed for Ownership Identification and Color Image Authentication by deploying Cryptography & Digital Watermarking. The color image is first transformed from RGB to YST color space exclusively designed for watermarking. Followed by color space transformation, each channel is divided into 4×4 non-overlapping blocks with selection of central 2×2 sub-blocks. Depending upon the channel selected two to three LSBs of each central 2×2 sub-block are set to zero to hold the ownership, authentication and recovery information. The size & position of sub-block is important for correct localization, enhanced security & fast computation. As YS ÔèÑ T so it is suitable to embed the recovery information apart from the ownership and authentication information, therefore 4×4 block of T channel along with ownership information is then deployed by SHA160 to compute the content based hash that is unique and invulnerable to birthday attack or hash collision instead of using MD5 that may raise the condition i.e. H(m)=H(m'). For recovery, intensity mean of 4x4 block of each channel is computed and encoded upto eight bits. For watermark embedding, key based mapping of blocks is performed using 2DTorus Automorphism. Our scheme is oblivious, generates highly imperceptible images with correct localization of tampering within reasonable time and has the ability to recover the original work with probability of near one.
Abstract: The main objective of this work is to provide a fault detection and isolation based on Markov parameters for residual generation and a neural network for fault classification. The diagnostic approach is accomplished in two steps: In step 1, the system is identified using a series of input / output variables through an identification algorithm. In step 2, the fault is diagnosed comparing the Markov parameters of faulty and non faulty systems. The Artificial Neural Network is trained using predetermined faulty conditions serves to classify the unknown fault. In step 1, the identification is done by first formulating a Hankel matrix out of Input/ output variables and then decomposing the matrix via singular value decomposition technique. For identifying the system online sliding window approach is adopted wherein an open slit slides over a subset of 'n' input/output variables. The faults are introduced at arbitrary instances and the identification is carried out in online. Fault residues are extracted making a comparison of the first five Markov parameters of faulty and non faulty systems. The proposed diagnostic approach is illustrated on benchmark problems with encouraging results.
Abstract: Deciding the numerous parameters involved in
designing a competent artificial neural network is a complicated task.
The existence of several options for selecting an appropriate
architecture for neural network adds to this complexity, especially
when different applications of heterogeneous natures are concerned.
Two completely different applications in engineering and medical
science were selected in the present study including prediction of
workpiece's surface roughness in ultrasonic-vibration assisted turning
and papilloma viruses oncogenicity. Several neural network
architectures with different parameters were developed for each
application and the results were compared. It was illustrated in this
paper that some applications such as the first one mentioned above
are apt to be modeled by a single network with sufficient accuracy,
whereas others such as the second application can be best modeled
by different expert networks for different ranges of output.
Development of knowledge about the essentials of neural networks
for different applications is regarded as the cornerstone of
multidisciplinary network design programs to be developed as a
means of reducing inconsistencies and the burden of the user
intervention.
Abstract: Two completely different approaches for a Gigabit
Ethernet compliant stream transmission over 50m of 1mm PMMA SI-POF have been experimentally demonstrated and are compared in this paper. The first solution is based on a commercial RC-LED
transmission and a careful optimization of the physical layer architecture, realized during the POF-PLUS EU Project. The second solution exploits the performance of an edge-emitting laser at the
transmitter side in order to avoid any sort of electrical equalization at the receiver side.