Abstract: Numerical investigations were conducted to study the
influence of flexural reinforcement ratio on the diagonal cracking
strength and ultimate shear strength of reinforced concrete (RC)
beams without stirrups. Three-dimensional nonlinear finite element
analyses (FEAs) of the beams with flexural reinforcement ratios
ranging from 0.58% to 2.20% subjected to a mid-span concentrated
load were carried out. It is observed that the load-deflection and loadstrain
curves obtained from the numerical analyses agree with those
obtained from the experiments. It is concluded that flexural
reinforcement ratio has a significant effect on the shear strength and
deflection capacity of RC beams without stirrups. The predictions of
diagonal cracking strength and ultimate shear strength of beams
obtained by using the equations defined by a number of codes and
researchers are compared with each other and with the experimental
values.
Abstract: Neural activity in the human brain starts from the
early stages of prenatal development. This activity or signals
generated by the brain are electrical in nature and represent not only
the brain function but also the status of the whole body. At the
present moment, three methods can record functional and
physiological changes within the brain with high temporal resolution
of neuronal interactions at the network level: the
electroencephalogram (EEG), the magnet oencephalogram (MEG),
and functional magnetic resonance imaging (fMRI); each of these has
advantages and shortcomings. EEG recording with a large number of
electrodes is now feasible in clinical practice. Multichannel EEG
recorded from the scalp surface provides very valuable but indirect
information about the source distribution. However, deep electrode
measurements yield more reliable information about the source
locations intracranial recordings and scalp EEG are used with the
source imaging techniques to determine the locations and strengths of
the epileptic activity. As a source localization method, Low
Resolution Electro-Magnetic Tomography (LORETA) is solved for
the realistic geometry based on both forward methods, the Boundary
Element Method (BEM) and the Finite Difference Method (FDM). In
this paper, we review the findings EEG- LORETA about epilepsy.
Abstract: This paper proposes a linear model for optimizing
domestic energy consumption in Romania. The particularity of the
model is that it is putting in competition both tangible technologies
and thermal insulation projects with different financing modes.
The model is optimizing the energy system by minimizing the
global discounted cost in household sector, by integrating residential
lighting, space heating, hot water, combined space heating – hot
water, as well as space cooling, in a monolithic model. Another
demand sector included is the passenger transport.
This paper focuses on space heating part, analyzing technical and
economic issues related to investment decisions to envelope and
insulate buildings, in order to minimize energy consumption.
Abstract: In this work new macroporous Ni electrodes modified
with Au nanoparticles for hydrogen production have been developed.
The supporting macroporous Ni electrodes have been obtained by
means of the electrodeposition at high current densities. Then, the Au
nanoparticles were synthesized and added to the electrode surface.
The electrocatalytic behaviour of the developed electrocatalysts was
studied by means of pseudo-steady-state polarization curves,
electrochemical impedance spectroscopy (EIS) and hydrogen
discharge curves. The size of the Au synthetized nanoparticles shows
a monomodal distribution, with a very sharp band between 10 and 50
nm. The characteristic parameters d10, d50 and d90 were 14, 20 and
31 nm respectively. From Tafel polarization data has been concluded
that the Au nanoparticles improve the catalytic activity of the
developed electrodes towards the HER respect to the macroporous Ni
electrodes. EIS permits to obtain the electrochemically active area by
means of the roughness factor value. All the developed electrodes
show roughness factor values in the same order of magnitude. From
the activation energy results it can be concluded that the Au
nanoparticles improve the intrinsic catalytic activity of the
macroporous Ni electrodes.
Abstract: Durability of Membrane Electrode Assembly for
Proton Exchange Membrane Fuel Cells was evaluated in both steady
state and accelerated decay modes. Steady state mode was carried out
at constant current of 800mA/cm2 for 2500 hours using air as cathode
feed and pure hydrogen as anode feed. The degradation of the cell
voltage was 0.015V after such 2500 hrs operation. The degradation
rate was therefore calculated to be 6uV/hr. Continuously Vigorous
fluctuation of the cell voltage, which was switched between OCV and
0.2V, was employed for the accelerated decay mode. No obvious
change in performance of the MEA was observed after 10000 cycles
of such operation.
Abstract: Socio-economic development, which is seen around
the world today, has contributed to the emergence of new problems
of a social nature. Different political, historical, geographical or
economic conditions cause that, in addition to global issues of social
policy such as an aging population, unemployment, migration,
countries, regions, there are also specific new problems that require
diagnosis, individualized approach and efficient, planned solutions.
These should include, among others, digital addiction, peer violence,
obesity among children, the problem of ‘legal highs’, stress,
depression, diseases associated with environmental pollution etc. The
central authorities, selected most often with the tools specific to
representative democracy, that is, the general election, for many
reasons, inter alia, organizational, communication, are not able to
effectively diagnose their intensity, territorial distribution, and thus to
effectively fight them. This article aims to show how in Poland,
citizens influence solving problems related to the broader social
policy implemented at the local government level and indicates the
possibilities of improving those solutions. The conclusions of
theoretical analysis have been supported by empirical studies, which
tested the use of instruments of participatory democracy in the
planning and creation of communal strategies for solving social
problems in one of the Polish voivodeships.
Abstract: Designing cost-efficient, secure network protocols for
Wireless Sensor Networks (WSNs) is a challenging problem because
sensors are resource-limited wireless devices. Security services such
as authentication and improved pairwise key establishment are
critical to high efficient networks with sensor nodes. For sensor
nodes to correspond securely with each other efficiently, usage of
cryptographic techniques is necessary. In this paper, two key
predistribution schemes that enable a mobile sink to establish a
secure data-communication link, on the fly, with any sensor nodes.
The intermediate nodes along the path to the sink are able to verify
the authenticity and integrity of the incoming packets using a
predicted value of the key generated by the sender’s essential power.
The proposed schemes are based on the pairwise key with the mobile
sink, our analytical results clearly show that our schemes perform
better in terms of network resilience to node capture than existing
schemes if used in wireless sensor networks with mobile sinks.
Abstract: Any signal transmitted over a channel is corrupted by noise and interference. A host of channel coding techniques has been proposed to alleviate the effect of such noise and interference. Among these Turbo codes are recommended, because of increased capacity at higher transmission rates and superior performance over convolutional codes. The multimedia elements which are associated with ample amount of data are best protected by Turbo codes. Turbo decoder employs Maximum A-posteriori Probability (MAP) and Soft Output Viterbi Decoding (SOVA) algorithms. Conventional Turbo coded systems employ Equal Error Protection (EEP) in which the protection of all the data in an information message is uniform. Some applications involve Unequal Error Protection (UEP) in which the level of protection is higher for important information bits than that of other bits. In this work, enhancement to the traditional Log MAP decoding algorithm is being done by using optimized scaling factors for both the decoders. The error correcting performance in presence of UEP in Additive White Gaussian Noise channel (AWGN) and Rayleigh fading are analyzed for the transmission of image with Discrete Cosine Transform (DCT) as source coding technique. This paper compares the performance of log MAP, Modified log MAP (MlogMAP) and Enhanced log MAP (ElogMAP) algorithms used for image transmission. The MlogMAP algorithm is found to be best for lower Eb/N0 values but for higher Eb/N0 ElogMAP performs better with optimized scaling factors. The performance comparison of AWGN with fading channel indicates the robustness of the proposed algorithm. According to the performance of three different message classes, class3 would be more protected than other two classes. From the performance analysis, it is observed that ElogMAP algorithm with UEP is best for transmission of an image compared to Log MAP and MlogMAP decoding algorithms.
Abstract: A sensory network consists of multiple detection
locations called sensor nodes, each of which is tiny, featherweight
and portable. A single path routing protocols in wireless sensor
network can lead to holes in the network, since only the nodes
present in the single path is used for the data transmission. Apart
from the advantages like reduced computation, complexity and
resource utilization, there are some drawbacks like throughput,
increased traffic load and delay in data delivery. Therefore, multipath
routing protocols are preferred for WSN. Distributing the traffic
among multiple paths increases the network lifetime. We propose a
scheme, for the data to be transmitted through a dominant path to
save energy. In order to obtain a high delivery ratio, a basic route
reconstruction protocol is utilized to reconstruct the path whenever a
failure is detected. A basic reconstruction routing (BRR) algorithm is
proposed, in which a node can leap over path failure by using the
already existing routing information from its neighbourhood while
the composed data is transmitted from the source to the sink. In order
to save the energy and attain high data delivery ratio, data is
transmitted along a multiple path, which is achieved by BRR
algorithm whenever a failure is detected. Further, the analysis of
how the proposed protocol overcomes the drawback of the existing
protocols is presented. The performance of our protocol is compared
to AOMDV and energy efficient node-disjoint multipath routing
protocol (EENDMRP). The system is implemented using NS-2.34.
The simulation results show that the proposed protocol has high
delivery ratio with low energy consumption.
Abstract: The main function of Medium Access Control (MAC) is to share the channel efficiently between all nodes. In the real-time scenario, there will be certain amount of wastage in bandwidth due to back-off periods. More bandwidth will be wasted in idle state if the back-off period is very high and collision may occur if the back-off period is small. So, an optimization is needed for this problem. The main objective of the work is to reduce delay due to back-off period thereby reducing collision and increasing throughput. Here a method, called the virtual back-off algorithm (VBA) is used to optimize the back-off period and thereby it increases throughput and reduces collisions. The main idea is to optimize the number of transmission for every node. A counter is introduced at each node to implement this idea. Here counter value represents the sequence number. VBA is classified into two types VBA with counter sharing (VBA-CS) and VBA with no counter sharing (VBA-NCS). These two classifications of VBA are compared for various parameters. Simulation is done in NS-2 environment. The results obtained are found to be promising.
Abstract: Hybrid electric vehicles can reduce pollution and
improve fuel economy. Power-split hybrid electric vehicles (HEVs)
provide two power paths between the internal combustion engine
(ICE) and energy storage system (ESS) through the gears of an
electrically variable transmission (EVT). EVT allows ICE to operate
independently from vehicle speed all the time. Therefore, the ICE can
operate in the efficient region of its characteristic brake specific fuel
consumption (BSFC) map. The two-mode powertrain can operate in
input-split or compound-split EVT modes and in four different fixed
gear configurations. Power-split architecture is advantageous because
it combines conventional series and parallel power paths. This
research focuses on input-split and compound-split modes in the
two-mode power-split powertrain. Fuzzy Logic Control (FLC) for an
internal combustion engine (ICE) and PI control for electric machines
(EMs) are derived for the urban driving cycle simulation. These
control algorithms reduce vehicle fuel consumption and improve ICE
efficiency while maintaining the state of charge (SOC) of the energy
storage system in an efficient range.
Abstract: The novel 3D SnO cabbages self-assembled by
nanosheets were successfully synthesized via template-free
hydrothermal growth method under facile conditions. The XRD
results manifest that the as-prepared SnO is tetragonal phase. The
TEM and HRTEM results show that the cabbage nanosheets are
polycrystalline structure consisted of considerable single-crystalline
nanoparticles. Two typical Raman modes A1g=210 and Eg=112 cm-1
of SnO are observed by Raman spectroscopy. Moreover, galvanostatic
cycling tests has been performed using the SnO cabbages as anode
material of lithium ion battery and the electrochemical results suggest
that the synthesized SnO cabbage structures are a promising anode
material for lithium ion batteries.
Abstract: The system for analyzing and eliciting public
grievances serves its main purpose to receive and process all sorts of
complaints from the public and respond to users. Due to the more
number of complaint data becomes big data which is difficult to store
and process. The proposed system uses HDFS to store the big data
and uses MapReduce to process the big data. The concept of cache
was applied in the system to provide immediate response and timely
action using big data analytics. Cache enabled big data increases the
response time of the system. The unstructured data provided by the
users are efficiently handled through map reduce algorithm. The
processing of complaints takes place in the order of the hierarchy of
the authority. The drawbacks of the traditional database system used
in the existing system are set forth by our system by using Cache
enabled Hadoop Distributed File System. MapReduce framework
codes have the possible to leak the sensitive data through
computation process. We propose a system that add noise to the
output of the reduce phase to avoid signaling the presence of
sensitive data. If the complaints are not processed in the ample time,
then automatically it is forwarded to the higher authority. Hence it
ensures assurance in processing. A copy of the filed complaint is sent
as a digitally signed PDF document to the user mail id which serves
as a proof. The system report serves to be an essential data while
making important decisions based on legislation.
Abstract: This paper presents a novel algorithm for secure,
reliable and flexible transmission of big data in two hop wireless
networks using cooperative jamming scheme. Two hop wireless
networks consist of source, relay and destination nodes. Big data has
to transmit from source to relay and from relay to destination by
deploying security in physical layer. Cooperative jamming scheme
determines transmission of big data in more secure manner by
protecting it from eavesdroppers and malicious nodes of unknown
location. The novel algorithm that ensures secure and energy balance
transmission of big data, includes selection of data transmitting
region, segmenting the selected region, determining probability ratio
for each node (capture node, non-capture and eavesdropper node) in
every segment, evaluating the probability using binary based
evaluation. If it is secure transmission resume with the two- hop
transmission of big data, otherwise prevent the attackers by
cooperative jamming scheme and transmit the data in two-hop
transmission.
Abstract: In this paper, a summary of analytical and
experimental studies into the behavior of a new hysteretic damper,
designed for seismic protection of structures is presented. The Multidirectional
Torsional Hysteretic Damper (MRSD) is a patented
invention in which a symmetrical arrangement of identical cylindrical
steel cores is so configured as to yield in torsion while the structure
experiences planar movements due to earthquake shakings. The new
device has certain desirable properties. Notably, it is characterized by
a variable and controllable-via-design post-elastic stiffness. The
mentioned property is a result of MRSD’s kinematic configuration
which produces this geometric hardening, rather than being a
secondary large-displacement effect. Additionally, the new system is
capable of reaching high force and displacement capacities, shows
high levels of damping, and very stable cyclic response. The device
has gone through many stages of design refinement, multiple
prototype verification tests and development of design guide-lines
and computer codes to facilitate its implementation in practice.
Practicality of the new device, as offspring of an academic sphere, is
assured through extensive collaboration with industry in its final
design stages, prototyping and verification test programs.
Abstract: We present a refined multiscale Shannon entropy for
analyzing electroencephalogram (EEG), which reflects the underlying
dynamics of EEG over multiple scales. The rationale behind
this method is that neurological signals such as EEG possess
distinct dynamics over different spectral modes. To deal with the
nonlinear and nonstationary nature of EEG, the recently developed
empirical mode decomposition (EMD) is incorporated, allowing a
decomposition of EEG into its inherent spectral components, referred
to as intrinsic mode functions (IMFs). By calculating the Shannon
entropy of IMFs in a time-dependent manner and summing them over
adaptive multiple scales, it results in an adaptive subscale entropy
measure of EEG. Simulation and experimental results show that
the proposed entropy properly reveals the dynamical changes over
multiple scales.
Abstract: A Japanese manga character, Doraemon, was made by
Fujiko F. Fujio in 1969, was made into animation in 1973. The main
character, Doraemon, is a robot cat, and is a well-known Japanese
animated character. However, Doraemon is not only regarded as an
animation character but it is also used in educational and technological
programs in Japan.
This paper focuses on the background of Doraemon, educational
and technological perspectives on Doraemon, and comparison of the
original Japanese animation and the US remade version, and the
animator Fujiko’s dreams and hopes for Doraemon will be examined.
Since Doraemon has been exported as animation and manga to
overseas, perspectives toward Doraemon have changed. For example,
changes of stories and characters can been seen in the present
Doraemon animation. Not only the overseas TV productions which
broadcast Doraemon but also the Japanese production has to consider
violence, sexuality, etc. when editing episodes. Because of
representation of cultural differences, Japanese animation is thought to
contain more violence, discrimination, and sexuality in animation.
With responses from overseas, the Japanese production was cautious
about the US remade version. They cared about the US Broadcast
Standard, and tried to consider US customs and culture in the US
remade version. Seeing the difference, acculturation is necessary for
exports of animation overseas. Moreover, observing different aspects
of Doraemon domestically, Doraemon provides dreams and hopes to
children.
Abstract: The paper deals with the classical fiber bundle model
of equal load sharing, sometimes referred to as the Daniels’ bundle
or the democratic bundle. Daniels formulated a multidimensional
integral and also a recursive formula for evaluation of the
strength cumulative distribution function. This paper describes
three algorithms for evaluation of the recursive formula and also
their implementations with source codes in the Python high-level
programming language. A comparison of the algorithms are provided
with respect to execution time. Analysis of orders of magnitudes of
addends in the recursion is also provided.
Abstract: Kidney cancer is the most lethal urological cancer
accounting for 3% of adult malignancies. VHL, a tumor-suppressor
gene, is best known to be associated with renal cell carcinoma
(RCC). The VHL functions as negative regulator of hypoxia inducible
factors. Recent sequencing efforts have identified several novel
frequent mutations of histone modifying and chromatin remodeling
genes in ccRCC (clear cell RCC) including PBRM1 and SETD2. The
PBRM1 gene encodes the BAF180 protein, which involved in
transcriptional activation and repression of selected genes. SETD2
encodes a histone methyltransferase, which may play a role in
suppressing tumor development. In this study, RNAs of 30 paired
tumor and normal samples that were grouped according to the types
of kidney cancer and clinical characteristics of patients, including
gender and average age were examined by RT-PCR, SSCP and
sequencing techniques. VHL, PBRM1 and SETD2 expressions were
relatively down-regulated. However, statistically no significance was
found (Wilcoxon signed rank test, p>0.05). Interestingly, no mutation
was observed on the contrary of previous studies. Understanding the
molecular mechanisms involved in the pathogenesis of RCC has
aided the development of molecular-targeted drugs for kidney cancer.
Further analysis is required to identify the responsible genes rather
than VHL, PBRM1 and SETD2 in kidney cancer.
Abstract: Microscopic simulation tool kits allow for
consideration of the two processes of railway operations and the
previous timetable production. Block occupation conflicts on both
process levels are often solved by using defined train priorities. These
conflict resolutions (dispatching decisions) generate reactionary
delays to the involved trains. The sum of reactionary delays is
commonly used to evaluate the quality of railway operations, which
describes the timetable robustness. It is either compared to an
acceptable train performance or the delays are appraised
economically by linear monetary functions. It is impossible to
adequately evaluate dispatching decisions without a well-founded
objective function. This paper presents a new approach for the
evaluation of dispatching decisions. The approach uses mode choice
models and considers the behaviour of the end-customers. These
models evaluate the reactionary delays in more detail and consider
other competing modes of transport. The new approach pursues the
coupling of a microscopic model of railway operations with the
macroscopic choice mode model. At first, it will be implemented for
railway operations process but it can also be used for timetable
production. The evaluation considers the possibility for the customer
to interchange to other transport modes. The new approach starts to
look at rail and road, but it can also be extended to air travel. The
result of mode choice models is the modal split. The reactions by the
end-customers have an impact on the revenue of the train operating
companies. Different purposes of travel have different payment
reserves and tolerances towards late running. Aside from changes to
revenues, longer journey times can also generate additional costs.
The costs are either time- or track-specific and arise from required
changes to rolling stock or train crew cycles. Only the variable values
are summarised in the contribution margin, which is the base for the
monetary evaluation of delays. The contribution margin is calculated
for different possible solutions to the same conflict. The conflict
resolution is optimised until the monetary loss becomes minimal. The
iterative process therefore determines an optimum conflict resolution
by monitoring the change to the contribution margin. Furthermore, a
monetary value of each dispatching decision can also be derived.