Abstract: This paper at first presents approximate analytical
solutions for systems of fractional differential equations using the
differential transform method. The application of differential
transform method, developed for differential equations of integer
order, is extended to derive approximate analytical solutions of
systems of fractional differential equations. The solutions of our
model equations are calculated in the form of convergent series with
easily computable components. After that a drive-response
synchronization method with linear output error feedback is
presented for “generalized projective synchronization" for a class of
fractional-order chaotic systems via a scalar transmitted signal.
Genesio_Tesi and Duffing systems are used to illustrate the
effectiveness of the proposed synchronization method.
Abstract: In contemporary global and dynamically developing environment there is a need of the strategic planning fundamental. It is complicated, but at the same time important process from the point of view of continual keeping of competitive advantage. The aim of the paper is formulation of strategic goals for the needs of the small enterprises. There will be used Balanced Scorecard as a balanced system of the indicators for the clearing and transferring vision into particular goals. In particular perspectives the theme will be focused on strategic goals. Consequently will be mention the concept of the competitiveness IDINMOSU. This connect to Balanced Scorecard.
Abstract: Brucellosis is a zoonotic disease; its symptoms and appearances are not exclusive in human and its traditional diagnosis is based on culture, serological methods and conventional PCR. For more sensitive, specific detection and differentiation of Brucella spp., the real time PCR method is recommended. This research has performed to determine the presence and prevalence of Brucella spp. and differentiation of Brucella abortus and Brucella melitensis in house mouse (Mus musculus) in west of Iran. A TaqMan analysis and single-step PCR was carried out in total 326 DNA of Mouse's spleen samples. From the total number of 326 samples, 128 (39.27%) gave positive results for Brucella spp. by conventional PCR, also 65 and 32 out of the 128 specimens were positive for B. melitensis, B. abortus, respectively. These results indicate a high presence of this pathogen in this area and that real time PCR is considerably faster than current standard methods for identification and differentiation of Brucella species. To our knowledge, this study is the first prevalence report of direct identification and differentiation of B. abortus and B. melitensis by real time PCR in mouse tissue samples in Iran.
Abstract: Morphological operators transform the original image
into another image through the interaction with the other image of
certain shape and size which is known as the structure element.
Mathematical morphology provides a systematic approach to analyze
the geometric characteristics of signals or images, and has been
applied widely too many applications such as edge detection,
objection segmentation, noise suppression and so on. Fuzzy
Mathematical Morphology aims to extend the binary morphological
operators to grey-level images. In order to define the basic
morphological operations such as fuzzy erosion, dilation, opening
and closing, a general method based upon fuzzy implication and
inclusion grade operators is introduced. The fuzzy morphological
operations extend the ordinary morphological operations by using
fuzzy sets where for fuzzy sets, the union operation is replaced by a
maximum operation, and the intersection operation is replaced by a
minimum operation.
In this work, it consists of two articles. In the first one, fuzzy set
theory, fuzzy Mathematical morphology which is based on fuzzy
logic and fuzzy set theory; fuzzy Mathematical operations and their
properties will be studied in details. As a second part, the application
of fuzziness in Mathematical morphology in practical work such as
image processing will be discussed with the illustration problems.
Abstract: This paper describes the designs of a first and second
generation autonomous gas monitoring system and the successful
field trial of the final system (2nd generation). Infrared sensing
technology is used to detect and measure the greenhouse gases
methane (CH4) and carbon dioxide (CO2) at point sources. The
ability to monitor real-time events is further enhanced through the
implementation of both GSM and Bluetooth technologies to
communicate these data in real-time. These systems are robust,
reliable and a necessary tool where the monitoring of gas events in
real-time are needed.
Abstract: This paper investigates experimentally and
analytically the torsion behavior of steel fibered high strength self
compacting concrete beams reinforced by GFRP bars. Steel fibered
high strength self compacting concrete (SFHSSCC) and GFRP bars
became in the recent decades a very important materials in the
structural engineering field. The use of GFRP bars to replace steel
bars has emerged as one of the many techniques put forward to
enhance the corrosion resistance of reinforced concrete structures.
High strength concrete and GFRP bars attract designers and
architects as it allows improving the durability as well as the esthetics
of a construction. One of the trends in SFHSSCC structures is to
provide their ductile behavior and additional goal is to limit
development and propagation of macro-cracks in the body of
SFHSSCC elements. SFHSSCC and GFRP bars are tough, improve
the workability, enhance the corrosion resistance of reinforced
concrete structures, and demonstrate high residual strengths after
appearance of the first crack. Experimental studies were carried out
to select effective fiber contents. Three types of volume fraction from
hooked shape steel fibers are used in this study, the hooked steel
fibers were evaluated in volume fractions ranging between 0.0%,
0.75% and 1.5%. The beams shape is chosen to create the required
forces (i.e. torsion and bending moments simultaneously) on the test
zone. A total of seven beams were tested, classified into three groups.
All beams, have 200cm length, cross section of 10×20cm,
longitudinal bottom reinforcement of 3
Abstract: This paper discusses a method for improving accuracy
of fuzzy-rule-based classifiers using particle swarm optimization
(PSO). Two different fuzzy classifiers are considered and optimized.
The first classifier is based on Mamdani fuzzy inference system
(M_PSO fuzzy classifier). The second classifier is based on Takagi-
Sugeno fuzzy inference system (TS_PSO fuzzy classifier). The
parameters of the proposed fuzzy classifiers including premise
(antecedent) parameters, consequent parameters and structure of
fuzzy rules are optimized using PSO. Experimental results show that
higher classification accuracy can be obtained with a lower number
of fuzzy rules by using the proposed PSO fuzzy classifiers. The
performances of M_PSO and TS_PSO fuzzy classifiers are compared
to other fuzzy based classifiers
Abstract: This paper presents the findings of two experiments that were performed on the Redundancy in Wireless Connection Model (RiWC) using the 802.11b standard. The experiments were simulated using OPNET 11.5 Modeler software. The first was aimed at finding the maximum number of simultaneous Voice over Internet Protocol (VoIP) users the model would support under the G.711 and G.729 codec standards when the packetization interval was 10 milliseconds (ms). The second experiment examined the model?s VoIP user capacity using the G.729 codec standard along with background traffic using the same packetization interval as in the first experiment. To determine the capacity of the model under various experiments, we checked three metrics: jitter, delay and data loss. When background traffic was added, we checked the response time in addition to the previous three metrics. The findings of the first experiment indicated that the maximum number of simultaneous VoIP users the model was able to support was 5, which is consistent with recent research findings. When using the G.729 codec, the model was able to support up to 16 VoIP users; similar experiments in current literature have indicated a maximum of 7 users. The finding of the second experiment demonstrated that the maximum number of VoIP users the model was able to support was 12, with the existence of background traffic.
Abstract: For the first time since 1940 and presentation of
theodorson-s theory, distribution of thrust, torque and efficiency
along the blade of a counter rotating propeller axial fan was studied
with a novel method in this research. A constant chord, constant
pitch symmetric fan was investigated with Reynolds Stress
Turbulence method in this project and H.E.S. method was utilized to
obtain distribution profiles from C.F.D. tests outcome. C.F.D. test
results were validated by estimation from Playlic-s analytical method.
Final results proved ability of H.E.S. method to obtain distribution
profiles from C.F.D test results and demonstrated interesting facts
about effects of solidity and differences between distributions in front
and rear section.
Abstract: Firms have invested heavily in knowledge
management (KM) with the aim to build a knowledge capability and
use it to achieve a competitive advantage. Research has shown,
however, that not all knowledge management projects succeed. Some
studies report that about 84% of knowledge management projects
fail. This paper has integrated studies on the impediments to
knowledge management into a theoretical framework. Based on this
framework, five cases documenting failed KM initiatives were
analysed. The analysis gave us a clear picture about why certain KM
projects fail. The high failure rate of KM can be explained by the
gaps that exist between users and management in terms of KM
perceptions and objectives
Abstract: Contemporary science and technologies largely widen
the gap between the spiritual and rational of the society. Industrial
and technological breakthroughs might radically affect most
processes in the society, thus losing the cultural heritage. The
thinkers recognized the dangers of the decadence in the first place. In
the present article the ways of preserving cultural heritage have been
investigated. Memory has always been a necessary condition for selfidentification,
- continuity is based on this. The authors have
supported the hypothesis that continuity and ethnic memory are the
very mechanisms that preserve cultural heritage. Such problemformulating
will facilitate another, new look at the material, spiritual
and arts spheres of the cultural heritage of numerous ethnic groups.
The fundamental works by major European and Kazakh scientists
have been taken as a basis for the research done.
Abstract: Thermal water hammer is a special type of water
hammer which rarely occurs in heat exchangers. In biphasic fluids, if
steam bubbles are surrounded by condensate, regarding lower
condensate temperature than steam, they will suddenly collapse. As a
result, the vacuum caused by an extreme change in volume lead to
movement of the condensates in all directions and their collision the
force produced by this collision leads to a severe stress in the pipe
wall. This phenomenon is a special type of water hammer. According
to fluid mechanics, this phenomenon is a particular type of transient
flows during which abrupt change of fluid leads to sudden pressure
change inside the tube. In this paper, the mechanism of abrupt failure
of 80 tubes of 481 tubes of a methanol heat exchanger is discussed.
Initially, due to excessive temperature differences between heat
transfer fluids and simultaneous failure of 80 tubes, thermal shock
was presupposed as the reason of failure. Deeper investigation on
cross-section of failed tubes showed that failure was, ductile type of
failure, so the first hypothesis was rejected. Further analysis and more
accurate experiments revealed that failure of tubes caused by thermal
water hammer. Finally, the causes of thermal water hammer and
various solutions to avoid such mechanism are discussed.
Abstract: Resistance of denial of service attacks is a key security requirement in voting protocols. Acquisti protocol plays an important role in development of internet voting protocols and claims its security without strong physical assumptions. In this study firstly Acquisti protocol is modeled in extended applied pi calculus, and then resistance of denial of service attacks is proved with ProVerif. The result is that it is not resistance of denial of service attacks because two denial of service attacks are found. Finally we give the method against the denial of service attacks.
Abstract: The paper presents an applied study of a multivariate AR(p) process fitted to daily data from U.S. commodity futures markets with the use of Bayesian statistics. In the first part a detailed description of the methods used is given. In the second part two BVAR models are chosen one with assumption of lognormal, the second with normal distribution of prices conditioned on the parameters. For a comparison two simple benchmark models are chosen that are commonly used in todays Financial Mathematics. The article compares the quality of predictions of all the models, tries to find an adequate rate of forgetting of information and questions the validity of Efficient Market Hypothesis in the semi-strong form.
Abstract: Iris localization is a very important approach in
biometric identification systems. Identification process usually is
implemented in three levels: iris localization, feature extraction, and
pattern matching finally. Accuracy of iris localization as the first step
affects all other levels and this shows the importance of iris
localization in an iris based biometric system. In this paper, we
consider Daugman iris localization method as a standard method,
propose a new method in this field and then analyze and compare the
results of them on a standard set of iris images. The proposed method
is based on the detection of circular edge of iris, and improved by
fuzzy circles and surface energy difference contexts. Implementation
of this method is so easy and compared to the other methods, have a
rather high accuracy and speed. Test results show that the accuracy of
our proposed method is about Daugman method and computation
speed of it is 10 times faster.
Abstract: In this paper, a fragile watermarking scheme is proposed for color image specified object-s authentication. The color image is first transformed from RGB to YST color space, suitable for watermarking the color media. The T channel corresponds to the chrominance component of a color image andYS ÔèÑ T , therefore selected for embedding the watermark. The T channel is first divided into 2×2 non-overlapping blocks and the two LSBs are set to zero. The object that is to be authenticated is also divided into 2×2 nonoverlapping blocks and each block-s intensity mean is computed followed by eight bit encoding. The generated watermark is then embedded into T channel randomly selected 2×2 block-s LSBs using 2D-Torus Automorphism. Selection of block size is paramount for exact localization and recovery of work. The proposed scheme is blind, efficient and secure with ability to detect and locate even minor tampering applied to the image with full recovery of original work. The quality of watermarked media is quite high both subjectively and objectively. The technique is suitable for class of images with format such as gif, tif or bitmap.
Abstract: Polyurethane foam (PUF) is formed by a chemical
reaction of polyol and isocyanate. The aim is to understand the
impact of Silicone on synthesizing polyurethane in differentiate
volume of molding. The method used was one step process, which is
simultaneously caried out a blending polyol (petroleum polyol and
soybean polyol), a TDI (2,4):MDI (4,4-) (80:20), a distilled water,
and a silicone. The properties of the material were measured via a
number of parameters, which are polymer density, compressive
strength, and cellular structures. It is found that density of
polyurethane using silicone with volume of molding either 250 ml or
500 ml is lower than without using silicone.
Abstract: This study aims at investigating the empirical
relationships between risk preference, internet preference, and
internet knowledge which are known as user characteristics, in
addition to perceived risk of the customers on the internet purchase
intention. In order to test the relationships between the variables of
model 174, a questionnaire was collected from the students with
previous online experience. For the purpose of data analysis,
confirmatory factor analysis (CFA) and structural equation model
(SEM) was used.
Test results show that the perceived risk affects the internet
purchase intention, and increase or decrease of perceived risk
influences the purchase intention when the customer does the internet
shopping. Other factors such as internet preference, knowledge of the
internet, and risk preference affect the internet purchase intention.
Abstract: This paper attempts to identify the significance of
Information and Communications Technology (ICT) and
competitiveness to the profit efficiency of commercial banks in
Malaysia. The profit efficiency of commercial banks in Malaysia, the
dependent variable, was estimated using the Stochastic Frontier
Approach (SFA) on a sample of unbalanced panel data, covering 23
commercial banks, between 1995 to 2007. Based on the empirical
results, ICT was not found to exert a significant impact on profit
efficiency, whereas competitiveness, non ICT stock expenditure and
ownership were significant contributors. On the other hand, the size
of banks was found to have significantly reduced profit efficiency,
opening up for various interpretations of the interrelated role of ICT
and competition.
Abstract: Artificial Intelligence (AI) methods are increasingly being used for problem solving. This paper concerns using AI-type learning machines for power quality problem, which is a problem of general interest to power system to provide quality power to all appliances. Electrical power of good quality is essential for proper operation of electronic equipments such as computers and PLCs. Malfunction of such equipment may lead to loss of production or disruption of critical services resulting in huge financial and other losses. It is therefore necessary that critical loads be supplied with electricity of acceptable quality. Recognition of the presence of any disturbance and classifying any existing disturbance into a particular type is the first step in combating the problem. In this work two classes of AI methods for Power quality data mining are studied: Artificial Neural Networks (ANNs) and Support Vector Machines (SVMs). We show that SVMs are superior to ANNs in two critical respects: SVMs train and run an order of magnitude faster; and SVMs give higher classification accuracy.