Abstract: This study deals with Computational Fluid Dynamics
(CFD) studies of the interactions between the air flow and louvered
fins which equipped the automotive heat exchangers. 3D numerical
simulation results are obtained by using the ANSYS Fluent 13.0 code
and compared to experimental data. The paper studies the effect of
louver angle and louver pitch geometrical parameters, on overall
thermal hydraulic performances of louvered fins.
The comparison between CFD simulations and experimental data
show that established 3-D CFD model gives a good agreement. The
validation agrees, with about 7% of deviation respectively of friction
and Colburn factors to experimental results. As first, it is found that
the louver angle has a strong influence on the heat transfer rate. Then,
louver angle and louver pitch variation of the louvers and their effects
on thermal hydraulic performances are studied. In addition to this
study, it is shown that the second half of the fin takes has a
significant contribution on pressure drop increase without any
increase in heat transfer.
Abstract: Prime Factorization based on Quantum approach in
two phases has been performed. The first phase has been achieved at
Quantum computer and the second phase has been achieved at the
classic computer (Post Processing). At the second phase the goal is to
estimate the period r of equation xrN ≡ 1 and to find the prime factors
of the composite integer N in classic computer. In this paper we
present a method based on Randomized Approach for estimation the
period r with a satisfactory probability and the composite integer N
will be factorized therefore with the Randomized Approach even the
gesture of the period is not exactly the real period at least we can find
one of the prime factors of composite N. Finally we present some
important points for designing an Emulator for Quantum Computer
Simulation.
Abstract: Sharing motivations of viral advertisements by
consumers and the impacts of these advertisements on the
perceptions for brand will be questioned in this study. Three
fundamental questions are answered in the study. These are
advertisement watching and sharing motivations of individuals,
criteria of liking viral advertisement and the impact of individual
attitudes for viral advertisement on brand perception respectively.
This study will be carried out via a viral advertisement which was
practiced in Turkey. The data will be collected by survey method and
the sample of the study consists of individuals who experienced the
practice of sample advertisement. Data will be collected by online
survey method and will be analyzed by using SPSS statistical
package program.
Recently traditional advertisement mind have been changing. New
advertising approaches which have significant impacts on consumers
have been argued. Viral advertising is a modernist advertisement
mind which offers significant advantages to brands apart from
traditional advertising channels such as television, radio and
magazines. Viral advertising also known as Electronic Word-of-
Mouth (eWOM) consists of free spread of convincing messages sent
by brands among interpersonal communication. When compared to
the traditional advertising, a more provocative thematic approach is
argued.
The foundation of this approach is to create advertisements that
are worth sharing with others by consumers. When that fact is taken
into consideration, in a manner of speaking it can also be stated that
viral advertising is media engineering.
The content worth sharing makes people being a volunteer
spokesman of a brand and strengthens the emotional bonds among
brand and consumer. Especially for some sectors in countries which
are having traditional advertising channel limitations, viral
advertising creates vital advantages.
Abstract: Our study proposes an alternative method in building
Fuzzy Rule-Based System (FRB) from Support Vector Machine
(SVM). The first set of fuzzy IF-THEN rules is obtained through
an equivalence of the SVM decision network and the zero-ordered
Sugeno FRB type of the Adaptive Network Fuzzy Inference System
(ANFIS). The second set of rules is generated by combining the
first set based on strength of firing signals of support vectors using
Gaussian kernel. The final set of rules is then obtained from the
second set through input scatter partitioning. A distinctive advantage
of our method is the guarantee that the number of final fuzzy IFTHEN
rules is not more than the number of support vectors in the
trained SVM. The final FRB system obtained is capable of performing
classification with results comparable to its SVM counterpart, but it
has an advantage over the black-boxed SVM in that it may reveal
human comprehensible patterns.
Abstract: The need in cognitive radio system for a simple, fast, and independent technique to sense the spectrum occupancy has led to the energy detection approach. Energy detector is known by its dependency on noise variation in the system which is one of its major drawbacks. In this paper, we are aiming to improve its performance by utilizing a weighted collaborative spectrum sensing, it is similar to the collaborative spectrum sensing methods introduced previously in the literature. These weighting methods give more improvement for collaborative spectrum sensing as compared to no weighting case. There is two method proposed in this paper: the first one depends on the channel status between each sensor and the primary user while the second depends on the value of the energy measured in each sensor.
Abstract: Tourism and coastal lines are the business sectors
since centuries especially in the European Nations and Albania is one
such spots. However, in recent decades tourism is experienced as
vulnerability of the surrounding ecological conditions of air, soil,
water, land and the communities that are dependant and sharing the
ecosystem among flora and fauna. Experts opine that apart from the
maintenance of near-originality of ecological biodiversity the tourism
rather known as ecotourism an indigenous socio-cultural
maintenance of indigenous/traditional knowledge of the local people
must be well cared in order to sustain on sustainable grounds. As a
general tendency, growth of tourism has been affected by the deterioration in the economic conditions on one aspect and unsustainable ecological areas affected since human interventions
earlier to this has negative impact on futuristic tourist spots. However, tourism in Albania as of now is 11% of GDP and coastal regions accounting to 2-4%. An amicable Mediterranean
climate with 300 sunny days similar parameters of Greece and Spain
throws up sustainable ecotourism in future decades provided public services namely, transportation, road safety, lodging, food
availability, recreational regiments, banking accessibility are as per
the World Tourism Organizations- protocols. Thus as of Albanian
situation, classification of ecotourism activities to safe-guard the localities with its maintenance of ecological land, water and climate
has become a paramount importance with a wanting and satisfactory options through harnessing human energy for profit and fitness of
ecological flora and fauna. A check on anthropogenic wastes and
their safer utilizations inclusive of agricultural and industrial
operations in line with Lalzi Bay Coastal Line are of utmost importance for the reason that the Adriatic Sea Coast is the one long
stretch of Albanian Lifeline. The present work is based on the methodology of the sustainable management of the same issue.
Abstract: The quest of providing more secure identification
system has led to a rise in developing biometric systems. Dorsal
hand vein pattern is an emerging biometric which has attracted the
attention of many researchers, of late. Different approaches have
been used to extract the vein pattern and match them. In this work,
Principle Component Analysis (PCA) which is a method that has
been successfully applied on human faces and hand geometry is
applied on the dorsal hand vein pattern. PCA has been used to obtain
eigenveins which is a low dimensional representation of vein pattern
features. Low cost CCD cameras were used to obtain the vein
images. The extraction of the vein pattern was obtained by applying
morphology. We have applied noise reduction filters to enhance the
vein patterns. The system has been successfully tested on a database
of 200 images using a threshold value of 0.9. The results obtained are
encouraging.
Abstract: This paper considers the problem of Null-Steering beamforming using Neural Network (NN) approach for antenna array system. Two cases are presented. First, unlike the other authors, the estimated Direction Of Arrivals (DOAs) are used for antenna array weights NN-based determination and the imprecise DOAs estimations are taken into account. Second, the blind null-steering beamforming is presented. In this case the antenna array outputs are presented at the input of the NN without DOAs estimation. The results of computer simulations will show much better relative mean error performances of the first NN approach compared to the NNbased blind beamforming.
Abstract: The present work faces the problem of automatic enumeration and recognition of an unknown and time-varying number of environmental sound sources while using a single microphone. The assumption that is made is that the sound recorded is a realization of sound sources belonging to a group of audio classes which is known a-priori. We describe two variations of the same principle which is to calculate the distance between the current unknown audio frame and all possible combinations of the classes that are assumed to span the soundscene. We concentrate on categorizing environmental sound sources, such as birds, insects etc. in the task of monitoring the biodiversity of a specific habitat.
Abstract: Due to the emergence of “Humanized Healthcare"
introduced by Professor Dr. Prawase Wasi in 2003[1], the
development of this paradigm tends to be widely implemented. The
organizations included Healthcare Accreditation Institute (public
organization), National Health Foundation, Mahidol University in
cooperation with Thai Health Promotion Foundation, and National
Health Security Office (Thailand) have selected the hospitals or
infirmaries that are qualified for humanized healthcare since 2008-
2010 and 35 of them are chosen to be the outstandingly navigating
organizations for the development of humanized healthcare,
humanized healthcare award [2].
The research aims to study the current issue, characteristics and
patterns of hospital administration contributing to humanized
healthcare system in Thailand. The selected case studies are from
four hospitals including Dansai Crown Prince Hospital, Leoi;
Ubolrattana Hospital, Khon Kaen; Kapho Hospital, Pattani; and
Prathai Hospital, Nakhonrachasima. The methodology is in-depth
interviewing with 10 staffs working as hospital executive directors,
and representatives from leader groups including directors,
multidisciplinary hospital committees, personnel development
committees, physicians and nurses in each hospital. (Total=40) In
addition, focus group discussions between hospital staffs and general
people (including patients and their relatives, the community leader,
and other people) are held by means of setting 4 groups including 8
people within each group. (Total=128) The observation on the
working in each hospital is also implemented. The findings of the
study reveal that there are five important aspects found in each
hospital including (1) the quality improvement under the mental and
spiritual development policy from the chief executives and lead
teams, leaders as Role model and they have visionary leadership; (2)
the participation hospital administration system focusing on learning
process and stakeholder- needs, spiritual human resource
management and development; (3) the relationship among people
especially staffs, team work skills, mutual understanding, effective
communication and personal inner-development; (4) organization
culture relevant to the awareness of patients- rights as well as the
participation policy including spiritual growth achieving to the same
goals, sharing vision, developing public mind, and caring; and (5)
healing structures or environment providing warmth and convenience
for hospital staffs, patients and their relatives and visitors.
Abstract: This paper presents the results of an analytical study
on the seismic response of a Multi-Span-Simply-Supported precast
bridge in Washington State. The bridge was built in the early 1960's
along Interstate 5 and was widened the first time in 1979 and the
second time in 2001. The primary objective of this research project
is to determine the seismic vulnerability of the bridge in order to
develop the required retrofit measure. The seismic vulnerability of
the bridge is evaluated using two seismic evaluation methods
presented in the FHWA Seismic Retrofitting Manual for Highway
Bridges, Method C and Method D2. The results of the seismic
analyses demonstrate that Method C and Method D2 vary markedly
in terms of the information they provide to the bridge designer
regarding the vulnerability of the bridge columns.
Abstract: One of the main processes of supply chain
management is supplier selection process which its accurate
implementation can dramatically increase company competitiveness.
In presented article model developed based on the features of
second tiers suppliers and four scenarios are predicted in order to
help the decision maker (DM) in making up his/her mind. In addition
two tiers of suppliers have been considered as a chain of suppliers.
Then the proposed approach is solved by a method combined of
concepts of fuzzy set theory (FST) and linear programming (LP)
which has been nourished by real data extracted from an engineering
design and supplying parts company. At the end results reveal the
high importance of considering second tier suppliers features as
criteria for selecting the best supplier.
Abstract: A Rotary Disc Contactor with inner diameter of
9.1cm and maximum operating height of 40cm has been used to
investigate break up phenomenon. Water-Toluene, Water as
continuous phase and Toluene as dispersed phase, was selected as
chemical system in the experiments. The mentioned chemical system
has high interfacial tension so it was possible to form big drops
which permit accurate investigation on break up phenomenon as well
as the first and second critical rotor speeds.
In this study, Break up phenomenon has been studied as a function
of mother drop size, rotor speed and continuous phase height. Further
more; the effects of mother drop size and continuous phase height on
the first and second critical rotor speeds were investigated. Finally,
two modified correlations were proposed to estimate the first and
second critical speeds.
Abstract: The main mission of Ezilla is to provide a friendly
interface to access the virtual machine and quickly deploy the high
performance computing environment. Ezilla has been developed by
Pervasive Computing Team at National Center for High-performance
Computing (NCHC). Ezilla integrates the Cloud middleware,
virtualization technology, and Web-based Operating System (WebOS)
to form a virtual computer in distributed computing environment. In
order to upgrade the dataset and speedup, we proposed the sensor
observation system to deal with a huge amount of data in the
Cassandra database. The sensor observation system is based on the
Ezilla to store sensor raw data into distributed database. We adopt the
Ezilla Cloud service to create virtual machines and login into virtual
machine to deploy the sensor observation system. Integrating the
sensor observation system with Ezilla is to quickly deploy experiment
environment and access a huge amount of data with distributed
database that support the replication mechanism to protect the data
security.
Abstract: Random Oracle Model (ROM) is an effective method
for measuring the practical security of cryptograph. In this paper, we
try to use it into information hiding system (IHS). Because IHS has its
own properties, the ROM must be modified if it is used into IHS.
Firstly, we fully discuss why and how to modify each part of ROM
respectively. The main changes include: 1) Divide the attacks that IHS
may be suffered into two phases and divide the attacks of each phase
into several kinds. 2) Distinguish Oracles and Black-boxes clearly. 3)
Define Oracle and four Black-boxes that IHS used. 4) Propose the
formalized adversary model. And 5) Give the definition of judge.
Secondly, based on ROM of IHS, the security against known original
cover attack (KOCA-KOCA-security) is defined. Then, we give an
actual information hiding scheme and prove that it is
KOCA-KOCA-secure. Finally, we conclude the paper and propose the
open problems of further research.
Abstract: Scatter behavior of fatigue life in die-cast AM60B
alloy was investigated. For comparison, those in rolled AM60B alloy
and die-cast A365-T5 aluminum alloy were also studied. Scatter
behavior of pore size was also investigated to discuss dominant
factors for fatigue life scatter in die-cast materials. Three-parameter
Weibull function was suitable to explain the scatter behavior of both
fatigue life and pore size. The scatter of fatigue life in die-cast
AM60B alloy was almost comparable to that in die-cast A365-T5
alloy, while it was significantly large compared to that in the rolled
AM60B alloy. Scatter behavior of pore size observed at fracture
nucleation site on the fracture surface was comparable to that
observed on the specimen cross-section and also to that of fatigue
life. Therefore, the dominant factor for large scatter of fatigue life in
die-cast alloys would be the large scatter of pore size. This
speculation was confirmed by the fracture mechanics fatigue life
prediction, where the pore observed at fatigue crack nucleation site
was assumed as the pre-existing crack.
Abstract: In this paper first, Two buildings have been modeled
and then analyzed using nonlinear static analysis method under two
different conditions in Nonlinear SAP 2000 software. In the first
condition the interaction of soil adjacent to the walls of basement are
ignored while in the second case this interaction have been modeled
using Gap elements of nonlinear SAP2000 software. Finally,
comparing the results of two models, the effects of soil-structure on
period, target point displacement, internal forces, shape deformations
and base shears have been studied. According to the results, this
interaction has always increased the base shear of buildings,
decreased the period of structure and target point displacement, and
often decreased the internal forces and displacements.
Abstract: Real-time 3D applications have to guarantee
interactive rendering speed. There is a restriction for the number of
polygons which is rendered due to performance of a graphics hardware
or graphics algorithms. Generally, the rendering performance will be
drastically increased when handling only the dynamic 3d models,
which is much fewer than the static ones. Since shapes and colors of
the static objects don-t change when the viewing direction is fixed, the
information can be reused. We render huge amounts of polygon those
cannot handled by conventional rendering techniques in real-time by
using a static object image and merging it with rendering result of the
dynamic objects. The performance must be decreased as a
consequence of updating the static object image including removing
an static object that starts to move, re-rending the other static objects
being overlapped by the moving ones. Based on visibility of the object
beginning to move, we can skip the updating process. As a result, we
enhance rendering performance and reduce differences of rendering
speed between each frame. Proposed method renders total
200,000,000 polygons that consist of 500,000 dynamic polygons and
the rest are static polygons in about 100 frames per second.
Abstract: In the current research, we present an operation framework and protection mechanism to facilitate secure environment to protect mobile agents against tampering. The system depends on the presence of an authentication authority. The advantage of the proposed system is that security measures is an integral part of the design, thus common security retrofitting problems do not arise. This is due to the presence of AlGamal encryption mechanism to protect its confidential content and any collected data by the agent from the visited host . So that eavesdropping on information from the agent is no longer possible to reveal any confidential information. Also the inherent security constraints within the framework allow the system to operate as an intrusion detection system for any mobile agent environment. The mechanism is tested for most of the well known severe attacks against agents and networked systems. The scheme proved a promising performance that makes it very much recommended for the types of transactions that needs highly secure environments, e. g., business to business.
Abstract: The dome with ribs and rings, which covers the
ROMEXPO pavilion from Bucharest, was designed after the collapse
of the single layer reticulated dome. In this paper, it was made the
checking of the structure, under the dynamic loads with three
recorded accelerograms calibrated according to Romanian seismic
design code P100-1/2006. Under the action the dynamic loadings, it
was made a time-history analysis to determine the zones where the
plastic hinges appear, at what accelerations and their position on the
structure. The studied dome is formed by 32 spatial semi arches and
three rings: one circular ring located at the top of the dome and
another two rings, design as trusses, the first near the supports and the
second as an intermediate rings above the skylights. Above the
skylights up to the top, the dome is tight together with purlins and
bracings.