Abstract: Equations with differentials relating to the inverse of an unknown function rather than to the unknown function itself are solved exactly for some special cases and numerically for the general case. Invertibility combined with differentiability over connected domains forces solutions always to be monotone. Numerical function inversion is key to all solution algorithms which either are of a forward type or a fixed point type considering whole approximate solution functions in each iteration. The given considerations are restricted to ordinary differential equations with inverted functions (ODEIs) of first order. Forward type computations, if applicable, admit consistency of order one and, under an additional accuracy condition, convergence of order one.
Abstract: The objective of this study is to investigate fire
behaviors, experimentally and numerically, in a scaled version of an
underground station. The effect of ventilation velocity on the fire is
examined. Fire experiments are simulated by burning 10 ml
isopropyl alcohol fuel in a fire pool with dimensions 5cm x 10cm x 4
mm at the center of 1/100 scaled underground station model. A
commercial CFD program FLUENT was used in numerical
simulations. For air flow simulations, k-ω SST turbulence model and
for combustion simulation, non-premixed combustion model are
used. This study showed that, the ventilation velocity is increased
from 1 m/s to 3 m/s the maximum temperature in the station is found
to be less for ventilation velocity of 1 m/s. The reason for these
experimental result lies on the relative dominance of oxygen supply
effect on cooling effect. Without piston effect, maximum temperature
occurs above the fuel pool. However, when the ventilation velocity
increased the flame was tilted in the direction of ventilation and the
location of maximum temperature moves along the flow direction.
The velocities measured experimentally in the station at different
locations are well matched by the CFD simulation results. The
prediction of general flow pattern is satisfactory with the smoke
visualization tests. The backlayering in velocity is well predicted by
CFD simulation. However, all over the station, the CFD simulations
predicted higher temperatures compared to experimental
measurements.
Abstract: In this paper we present modeling and simulation for
physical vapor deposition for metallic bipolar plates. In the models
we discuss the application of different models to simulate the
transport of chemical reactions of the gas species in the gas chamber.
The so called sputter process is an extremely sensitive process to
deposit thin layers to metallic plates. We have taken into account
lower order models to obtain first results with respect to the gas
fluxes and the kinetics in the chamber.
The model equations can be treated analytically in some
circumstances and complicated multi-dimensional models are solved
numerically with a software-package (UG unstructed grids, see [1]).
Because of multi-scaling and multi-physical behavior of the models,
we discuss adapted schemes to solve more accurate in the different
domains and scales. The results are discussed with physical
experiments to give a valid model for the assumed growth of thin
layers.
Abstract: Low temperature (LT) is one of the most abiotic
stresses causing loss of yield in wheat (T. aestivum). Four major
genes in wheat (Triticum aestivum L.) with the dominant alleles
designated Vrn–A1,Vrn–B1,Vrn–D1 and Vrn4, are known to have
large effects on the vernalization response, but the effects on cold
hardiness are ambiguous. Poor cold tolerance has restricted winter
wheat production in regions of high winter stress [9]. It was known
that nearly all wheat chromosomes [5] or at least 10 chromosomes of
21 chromosome pairs are important in winter hardiness [15]. The
objective of present study was to clarify the role of each chromosome
in cold tolerance. With this purpose we used 20 isogenic lines of
wheat. In each one of these isogenic lines only a chromosome from
‘Bezostaya’ variety (a winter habit cultivar) was substituted to
‘Capple desprez’ variety. The plant materials were planted in
controlled conditions with 20º C and 16 h day length in moderately
cold areas of Iran at Karaj Agricultural Research Station in 2006-07
and the acclimation period was completed for about 4 weeks in a
cold room with 4º C. The cold hardiness of these isogenic lines was
measured by LT50 (the temperature in which 50% of the plants are
killed by freezing stress).The experimental design was completely
randomized block design (RCBD)with three replicates. The results
showed that chromosome 5A had a major effect on freezing
tolerance, and then chromosomes 1A and 4A had less effect on this
trait. Further studies are essential to understanding the importance of
each chromosome in controlling cold hardiness in wheat.
Abstract: Rapid progress in process automation and tightening
quality standards result in a growing demand being placed on fault
detection and diagnostics methods to provide both speed and
reliability of motor quality testing. Doubly fed induction generators
are used mainly for wind energy conversion in MW power plants.
This paper presents a detection of an inter turn stator and an open
phase faults, in a doubly fed induction machine whose stator and
rotor are supplied by two pulse width modulation (PWM) inverters.
The method used in this article to detect these faults, is based on
Park-s Vector Approach, using a neural network.
Abstract: This research aimed to study correlation between
work satisfaction and organization core value of officers in
Waterworks Authority, Bangkean Branch. Sample group of the study
was 112 officers who worked in the Waterworks Authority,
Bangkean Branch. Questionnaires were employed as a research tools,
while, Percentage, Mean, Standard Deviation, T-test, One-way
ANOVA, and Pearson Product Moment Correlation were claimed as
statistics used in this study. Researcher found that overall and
individual aspects of work satisfaction namely, work characteristic,
work progress, and colleagues significantly correlated with
organization core value in aspect of perception in choice of work at
0.5, 0.01, and 0.01 respectively. Also, such aspects were compatible
with income at .05 which indicated the low level of correlation, mid
low correlation respectively at the same direction, same direction,
opposite direction, and same direction, correspondingly.
Abstract: The aims of this study were to compare the
differences of being good membership behavior among faculties and
staffs of Suan Sunandha Rajabhat University with different sex, age,
income, education, marital status, and working period, and
investigate the relationships between organizational commitment and
being good membership behavior. The research methodology
employed a questionnaire as a quantitative method. The respondents
were 305 faculties and staffs of Suan Sunandha Rajabhat University.
This research used Percentage, Mean, Standard Deviation, t-test,
One-Way ANOVA Analysis of Variance, and Pearson’s Product
Moment Correlation Coefficient in data analysis. The results showed
that organizational commitment among faculties and staffs of Suan
Sunandha Rajabhat University was at a high level. In addition,
differences in sex, age, income, education, marital status, and
working period revealed differences in being good membership
behavior. The results also indicated that organizational commitment
was significantly related to being good membership behavior.
Abstract: Defining strategic position of the organizations within
the industry environment is one of the basic and most important
phases of strategic planning to which extent that one of the
fundamental schools of strategic planning is the strategic positioning
school. In today-s knowledge-based economy and dynamic
environment, it is essential for universities as the centers of
education, knowledge creation and knowledge worker evolvement.
Till now, variant models with different approaches to strategic
positioning are deployed in defining the strategic position within the
various industries. Balanced Scorecard as one of the powerful models
for strategic positioning, analyzes all aspects of the organization
evenly. In this paper with the consideration of BSC strength in
strategic evaluation, it is used for analyzing the environmental
position of the best-s Iranian Business Schools. The results could be
used in developing strategic plans for these schools as well as other
Iranian Management and Business Schools.
Abstract: In this research, the authors analyze network stability
using agent-based simulation. Firstly, the authors focus on analyzing
large networks (eight agents) by connecting different two stable small
social networks (A small stable network is consisted on four agents.).
Secondly, the authors analyze the network (eight agents) shape which
is added one agent to a stable network (seven agents). Thirdly, the
authors analyze interpersonal comparison of utility. The “star-network
"was not found on the result of interaction among stable two small
networks. On the other hand, “decentralized network" was formed
from several combination. In case of added one agent to a stable
network (seven agents), if the value of “c"(maintenance cost of per
a link) was larger, the number of patterns of stable network was
also larger. In this case, the authors identified the characteristics of a
large stable network. The authors discovered the cases of decreasing
personal utility under condition increasing total utility.
Abstract: In the normal operation conditions of a pico satellite,
conventional Unscented Kalman Filter (UKF) gives sufficiently good
estimation results. However, if the measurements are not reliable
because of any kind of malfunction in the estimation system, UKF
gives inaccurate results and diverges by time. This study, introduces
Robust Unscented Kalman Filter (RUKF) algorithms with the filter
gain correction for the case of measurement malfunctions. By the use
of defined variables named as measurement noise scale factor, the
faulty measurements are taken into the consideration with a small
weight and the estimations are corrected without affecting the
characteristic of the accurate ones. Two different RUKF algorithms,
one with single scale factor and one with multiple scale factors, are
proposed and applied for the attitude estimation process of a pico
satellite. The results of these algorithms are compared for different
types of measurement faults in different estimation scenarios and
recommendations about their applications are given.
Abstract: Bicycle usage for exercise, recreation, and commuting
to work in Australia shows that pedal cycling is the fourth most
popular activity with 10.6% increase in participants between 2001
and 2007. As with other means of transport, accident and injury
becomes common although mandatory bicycle helmet wearing has
been introduced. The research aims to develop a face surrogate made
of sandwich of rigid foam and rubber sheets to represent human
facial bone under blunt impact. The facial surrogate will serve as an
important test device for further development of facial-impact
protection for cyclist. A test procedure was developed to simulate the
energy of impact and record data to evaluate the effect of impact on
facial bones. Drop tests were performed to establish a suitable
combination of materials. It was found that the sandwich structure of
rigid extruded-polystyrene foam (density of 40 kg/m3 with a pattern
of 6-mm-holes), Neoprene rubber sponge, and Abrasaflex rubber
backing, had impact characteristics comparable to that of human
facial bone. In particular, the foam thickness of 30 mm and 25 mm
was found suitable to represent human zygoma (cheekbone) and
maxilla (upper-jaw bone), respectively.
Abstract: In China, with the rapid urbanization and
industrialization, and highly accelerated economic development have
resulted in degradation of water resource. The water quality
deterioration usual result from eutrophication in most cases, so how to
dispose this type pollution water higher efficiently is an urgent task.
Hower, different with traditional technology, constructed wetlands are
effective treatment systems that can be very useful because they are
simple technology and low operational cost. A pilot-scale treatment
including constructed wetlands was constructed at XingYun Lake,
Yuxi, China, and operated as primary treatment measure before
eutrophic-lake water draining to riverine landscape. Water quality
indices were determined during the experiment, the results indicated
that treatment removal efficiencies were high for Nitrate nitrogen,
Chlorophyll–a and Algae, the final removal efficiency reached to
95.20%, 93.33% and 99.87% respectively, but the removal efficiency
of Total phosphorous and Total nitrogen only reach to 68.83% and
50.00% respectively.
Abstract: Geometry optimizations of metal complexes of Salen(bis(Salicylidene)1,2-ethylenediamine) were carried out at HF and DFT methods employing Lanl2DZ basis set. In this work structural, energies, bond lengths and other physical properties between Mn2+,Cu2+ and Ni2+ ions coordinated by salen–type ligands are examined. All calculations were performed using Gaussian 98W program series. To investigate local aromaticities, NICS were calculated at all centers of rings. The higher the band gap indicating a higher global aromaticity. The possible binding energies have been evaluated. We have evaluated Frequencies and Zero-point energy with freq calculation. The NICS(Nucleous Independent Chemical Shift) Results show Ni(II) complexes are antiaromatic and aromaticites of Mn(II) complexes are larger than Cu(II) complexes. The energy Results show Cu(II) complexes are stability than Mn(II) and Ni(II) complexes.
Abstract: In the present Jordan hotels scenario, service quality is
a vital competitive policy to keep customer support and build great
base. Hotels are trying to win customer loyalty by providing enhanced
quality services. This paper attempts to examine the impact of tourism
service quality dimension in the Jordanian five star hotels. A total of
322 surveys were administrated to tourists who were staying at three
branches Marriott hotel in Jordan. The results show that dimensions of
service quality such as empathy, reliability, responsiveness and
tangibility significantly predict customer loyalty. Specifically, among
the dimension of tourism service quality, the most significant predictor
of customer loyalty is tangibility. This paper implies that five star
hotels in Jordan should also come forward and try their best to present
better tourism service quality to win back their customers- loyalty.
Abstract: In this study is presented a general methodology to
predict the performance of a continuous near-critical fluid extraction
process to remove compounds from aqueous solutions using hollow
fiber membrane contactors. A comprehensive 2D mathematical
model was developed to study Porocritical extraction process. The
system studied in this work is a membrane based extractor of ethanol
and acetone from aqueous solutions using near-critical CO2.
Predictions of extraction percentages obtained by simulations have
been compared to the experimental values reported by Bothun et al.
[5]. Simulations of extraction percentage of ethanol and acetone
show an average difference of 9.3% and 6.5% with the experimental
data, respectively. More accurate predictions of the extraction of
acetone could be explained by a better estimation of the transport
properties in the aqueous phase that controls the extraction of this
solute.
Abstract: The problem addressed herein is the efficient management of the Grid/Cluster intense computation involved, when the preconditioned Bi-CGSTAB Krylov method is employed for the iterative solution of the large and sparse linear system arising from the discretization of the Modified Helmholtz-Dirichlet problem by the Hermite Collocation method. Taking advantage of the Collocation ma-trix's red-black ordered structure we organize efficiently the whole computation and map it on a pipeline architecture with master-slave communication. Implementation, through MPI programming tools, is realized on a SUN V240 cluster, inter-connected through a 100Mbps and 1Gbps ethernet network,and its performance is presented by speedup measurements included.
Abstract: The mixing of pollutions and sediments in near shore regions of natural water bodies depends heavily on the characteristics such as the strength and frequency of flow instability. In the present paper, the instability of natural convection induced by absorption of solar radiation in littoral regions is considered. Spectral analysis is conducted on the quasi-steady state flow to reveal the power and frequency modes of the instability at various positions. Results indicate that the power of instability, the number of frequency modes, the prominence of higher frequency modes, and the highest frequency mode increase with the offshore distance and/or Rayleigh number. Harmonic modes are present at relatively low Rayleigh numbers. For a given offshore distance, the position with the strongest power of instability is located adjacent to the sloping bottom while the frequency modes are the same over the local depth. As the Rayleigh number increases, the unstable region extends toward the shore.
Abstract: Modern civilization has come in recent decades into a new phase in its development, called the information society. The concept of "information society" has become one of the most common. Therefore, the attempt to understand what exactly the society we live in, what are its essential features, and possible future scenarios, is important to the social and philosophical analysis. At the heart of all these deep transformations is more increasing, almost defining role knowledge and information as play substrata of «information society». The mankind opened for itself and actively exploits a new resource – information. Information society puts forward on the arena new type of the power, at the heart of which activity – mastering by a new resource: information and knowledge. The password of the new power – intelligence as synthesis of knowledge, information and communications, the strength of mind, fundamental sociocultural values. In a postindustrial society, the power of knowledge and information is crucial in the management of the company, pushing into the background the influence of money and state coercion.
Abstract: Distillation column is one of the most common
operations in process industries and is while the most expensive unit
of the amount of energy consumption. Many ideas have been
presented in the related literature for optimizing energy consumption
in distillation columns. This paper studies the different heat
integration methods in a distillation column which separate Benzene,
Toluene, Xylene, and C9+. Three schemes of heat integration
including, indirect sequence (IQ), indirect sequence with forward
energy integration (IQF), and indirect sequence with backward
energy integration (IQB) has been studied in this paper. Using
shortcut method these heat integration schemes were simulated with
Aspen HYSYS software and compared with each other with
regarding economic considerations. The result shows that the energy
consumption has been reduced 33% in IQF and 28% in IQB in
comparison with IQ scheme. Also the economic result shows that the
total annual cost has been reduced 12% in IQF and 8% in IQB
regarding with IQ scheme. Therefore, the IQF scheme is most
economic than IQB and IQ scheme.
Abstract: Today’s technology is heavily dependent on web applications. Web applications are being accepted by users at a very rapid pace. These have made our work efficient. These include webmail, online retail sale, online gaming, wikis, departure and arrival of trains and flights and list is very long. These are developed in different languages like PHP, Python, C#, ASP.NET and many more by using scripts such as HTML and JavaScript. Attackers develop tools and techniques to exploit web applications and legitimate websites. This has led to rise of web application security; which can be broadly classified into Declarative Security and Program Security. The most common attacks on the applications are by SQL Injection and XSS which give access to unauthorized users who totally damage or destroy the system. This paper presents a detailed literature description and analysis on Web Application Security, examples of attacks and steps to mitigate the vulnerabilities.