Abstract: Hydrate phase equilibria for the binary CO2+water and
CH4+water mixtures in silica gel pore of nominal diameters 6, 30, and
100 nm were measured and compared with the calculated results based
on van der Waals and Platteeuw model. At a specific temperature,
three-phase hydrate-water-vapor (HLV) equilibrium curves for pore
hydrates were shifted to the higher-pressure condition depending on
pore sizes when compared with those of bulk hydrates. Notably,
hydrate phase equilibria for the case of 100 nominal nm pore size were
nearly identical with those of bulk hydrates. The activities of water in
porous silica gels were modified to account for capillary effect, and
the calculation results were generally in good agreement with the
experimental data. The structural characteristics of gas hydrates in
silica gel pores were investigated through NMR spectroscopy.
Abstract: This paper describes the evolution of language
politics and the part played by political leaders with reference to
the Dravidian parties in Tamil Nadu. It explores the interesting
evolution from separatism to coalition in sustaining the values of
parliamentary democracy and federalism. It seems that the
appropriation of language politics is fully ascribed to the DMK
leadership under Annadurai and Karunanidhi. For them, the Tamil
language is a self-determining power, a terrain of nationhood, and
a perennial source of social and political powers. The DMK
remains a symbol of Tamil nationalist party playing language
politics in the interest of the Tamils. Though electoral alliances
largely determine the success, the language politics still has
significant space in the politics of Tamil Nadu. Ironically, DMK
moves from the periphery to centre for getting national recognition
for the Tamils as well as for its own maximization of power. The
evolution can be seen in two major phases as: language politics for
party building; and language politics for state building with three
successive political processes, namely, language politics in the
process of separatism, representative politics and coalition. The
much pronounced Dravidian Movement is radical enough to
democratize the party ideology to survive the spirit of
parliamentary democracy. This has secured its own rewards in
terms of political power. The political power provides the means to
achieve the social and political goal of the political party.
Language politics and leadership pattern actualized this trend
though the movement is shifted from separatism to coalition.
Abstract: We propose a control design scheme that aims to
prevent undesirable liquid outpouring and suppress sloshing during
the forward and backward tilting phases of the pouring process, for
the case of liquid containers carried by manipulators. The proposed
scheme combines a partial inverse dynamics controller with a PID
controller, tuned with the use of a “metaheuristic" search algorithm.
The “metaheuristic" search algorithm tunes the PID controller based
on simulation results of the plant-s linearization around the operating
point corresponding to the critical tilting angle, where outpouring
initiates. Liquid motion is modeled using the well-known pendulumtype
model. However, the proposed controller does not require
measurements of the liquid-s motion within the tank.
Abstract: Sixteen female Holstein calves allocated in three
treatments including: 1: control, 2: fed raw fiber concentrate (RFC)
for 45 days and 3: fed RFC for 90 days. RFC supplement (Vitacel®
200) was added to milk immediately before feeding (10 g/L milk).
Withers height and body weights of calves were measured monthly.
Individual dry matter intake was recorded daily. Blood samples were
taken monthly. The result showed that calves consumed RFC had
significantly greater weaning and final body weight. Treatment effect
on dry matter intake was not significant (p>0.05). Calves fed RFC
had better feed efficiency. Withers height of calves fed RFC were
taller than the control group (p
Abstract: Security has been an important issue and concern in the
smart home systems. Smart home networks consist of a wide range of
wired or wireless devices, there is possibility that illegal access to
some restricted data or devices may happen. Password-based
authentication is widely used to identify authorize users, because this
method is cheap, easy and quite accurate. In this paper, a neural
network is trained to store the passwords instead of using verification
table. This method is useful in solving security problems that
happened in some authentication system. The conventional way to
train the network using Backpropagation (BPN) requires a long
training time. Hence, a faster training algorithm, Resilient
Backpropagation (RPROP) is embedded to the MLPs Neural
Network to accelerate the training process. For the Data Part, 200
sets of UserID and Passwords were created and encoded into binary
as the input. The simulation had been carried out to evaluate the
performance for different number of hidden neurons and combination
of transfer functions. Mean Square Error (MSE), training time and
number of epochs are used to determine the network performance.
From the results obtained, using Tansig and Purelin in hidden and
output layer and 250 hidden neurons gave the better performance. As
a result, a password-based user authentication system for smart home
by using neural network had been developed successfully.
Abstract: This paper focuses on cost and profit analysis of
single-server Markovian queuing system with two priority classes. In
this paper, functions of total expected cost, revenue and profit of the
system are constructed and subjected to optimization with respect to
its service rates of lower and higher priority classes. A computing
algorithm has been developed on the basis of fast converging
numerical method to solve the system of non linear equations formed
out of the mathematical analysis. A novel performance measure of
cost and profit analysis in view of its economic interpretation for the
system with priority classes is attempted to discuss in this paper. On
the basis of computed tables observations are also drawn to enlighten
the variational-effect of the model on the parameters involved
therein.
Abstract: A new strategy for oriented immobilization of proteins was proposed. The strategy contains two steps. The first step is to search for a docking site away from the active site on the protein surface. The second step is trying to find a ligand that is able to grasp the targeted site of the protein. To avoid ligand binding to the active site of protein, the targeted docking site is selected to own opposite charges to those near the active site. To enhance the ligand-protein binding, both hydrophobic and electrostatic interactions need to be included. The targeted docking site should therefore contain hydrophobic amino acids. The ligand is then selected through the help of molecular docking simulations. The enzyme α-amylase derived from Aspergillus oryzae (TAKA) was taken as an example for oriented immobilization. The active site of TAKA is surrounded by negatively charged amino acids. All the possible hydrophobic sites on the surface of TAKA were evaluated by the free energy estimation through benzene docking. A hydrophobic site on the opposite side of TAKA-s active site was found to be positive in net charges. A possible ligand, 3,3-,4,4- – Biphenyltetra- carboxylic acid (BPTA), was found to catch TAKA by the designated docking site. Then, the BPTA molecules were grafted onto silica gels and measured the affinity of TAKA adsorption and the specific activity of thereby immobilized enzymes. It was found that TAKA had a dissociation constant as low as 7.0×10-6 M toward the ligand BPTA on silica gel. The increase in ionic strength has little effect on the adsorption of TAKA, which indicated the existence of hydrophobic interaction between ligands and proteins. The specific activity of the immobilized TAKA was compared with the randomly adsorbed TAKA on primary amine containing silica gel. It was found that the orderly immobilized TAKA owns a specific activity twice as high as the one randomly adsorbed by ionic interaction.
Abstract: The purpose of this paper is to propose a framework for constructing correct parallel processing programs based on Equivalent Transformation Framework (ETF). ETF regards computation as In the framework, a problem-s domain knowledge and a query are described in definite clauses, and computation is regarded as transformation of the definite clauses. Its meaning is defined by a model of the set of definite clauses, and the transformation rules generated must preserve meaning. We have proposed a parallel processing method based on “specialization", a part of operation in the transformations, which resembles substitution in logic programming. The method requires “Memo-tree", a history of specialization to maintain correctness. In this paper we proposes the new method for the specialization-base parallel processing without Memo-tree.
Abstract: Super-quadrics can represent a set of implicit surfaces,
which can be used furthermore as primitive surfaces to construct a
complex object via Boolean set operations in implicit surface
modeling. In fact, super-quadrics were developed to create a
parametric surface by performing spherical product on two parametric
curves and some of the resulting parametric surfaces were also
represented as implicit surfaces. However, because not every
parametric curve can be redefined implicitly, this causes only implicit
super-elliptic and super-hyperbolic curves are applied to perform
spherical product and so only implicit super-ellipsoids and
hyperboloids are developed in super-quadrics. To create implicit
surfaces with more diverse shapes than super-quadrics, this paper
proposes an implicit representation of spherical product, which
performs spherical product on two implicit curves like super-quadrics
do. By means of the implicit representation, many new implicit curves
such as polygonal, star-shaped and rose-shaped curves can be used to
develop new implicit surfaces with a greater variety of shapes than
super-quadrics, such as polyhedrons, hyper-ellipsoids, superhyperboloids
and hyper-toroids containing star-shaped and roseshaped
major and minor circles. Besides, the newly developed implicit
surfaces can also be used to define new primitive implicit surfaces for
constructing a more complex implicit surface in implicit surface
modeling.
Abstract: Fuzzy logic can be used when knowledge is
incomplete or when ambiguity of data exists. The purpose of
this paper is to propose a proactive fuzzy set- based model for
reacting to the risk inherent in investment activities relative to
a complete view of portfolio management. Fuzzy rules are
given where, depending on the antecedents, the portfolio size
may be slightly or significantly decreased or increased. The
decision maker considers acceptable bounds on the proportion
of acceptable risk and return. The Fuzzy Controller model
allows learning to be achieved as 1) the firing strength of each
rule is measured, 2) fuzzy output allows rules to be updated,
and 3) new actions are recommended as the system continues
to loop. An extension is given to the fuzzy controller that
evaluates potential financial loss before adjusting the
portfolio. An application is presented that illustrates the
algorithm and extension developed in the paper.
Abstract: We consider a typical problem in the assembly of
printed circuit boards (PCBs) in a two-machine flow shop system to
simultaneously minimize the weighted sum of weighted tardiness and
weighted flow time. The investigated problem is a group scheduling
problem in which PCBs are assembled in groups and the interest is to
find the best sequence of groups as well as the boards within each
group to minimize the objective function value. The type of setup
operation between any two board groups is characterized as carryover
sequence-dependent setup time, which exactly matches with the real
application of this problem. As a technical constraint, all of the
boards must be kitted before the assembly operation starts (kitting
operation) and by kitting staff. The main idea developed in this paper
is to completely eliminate the role of kitting staff by assigning the
task of kitting to the machine operator during the time he is idle
which is referred to as integration of internal (machine) and external
(kitting) setup times. Performing the kitting operation, which is a
preparation process of the next set of boards while the other boards
are currently being assembled, results in the boards to continuously
enter the system or have dynamic arrival times. Consequently, a
dynamic PCB assembly system is introduced for the first time in the
assembly of PCBs, which also has characteristics similar to that of
just-in-time manufacturing. The problem investigated is
computationally very complex, meaning that finding the optimal
solutions especially when the problem size gets larger is impossible.
Thus, a heuristic based on Genetic Algorithm (GA) is employed. An
example problem on the application of the GA developed is
demonstrated and also numerical results of applying the GA on
solving several instances are provided.
Abstract: The main aim of this study is to identify the most
influential variables that cause defects on the items produced by a
casting company located in Turkey. To this end, one of the items
produced by the company with high defective percentage rates is
selected. Two approaches-the regression analysis and decision treesare
used to model the relationship between process parameters and
defect types. Although logistic regression models failed, decision tree
model gives meaningful results. Based on these results, it can be
claimed that the decision tree approach is a promising technique for
determining the most important process variables.
Abstract: Many corporations are seriously concerned about
security of networks and therefore, their network supervisors are still
reluctant to install WLANs. In this regards, the IEEE802.11i standard
was developed to address the security problems, even though the
mistrust of the wireless LAN technology is still existing. The thought
was that the best security solutions could be found in open standards
based technologies that can be delivered by Virtual Private
Networking (VPN) being used for long time without addressing any
security holes for the past few years. This work, addresses this issue
and presents a simulated wireless LAN of IEEE802.11g protocol, and
analyzes impact of integrating Virtual Private Network technology to
secure the flow of traffic between the client and the server within the
LAN, using OPNET WLAN utility. Two Wireless LAN scenarios
have been introduced and simulated. These are based on normal
extension to a wired network and VPN over extension to a wired
network. The results of the two scenarios are compared and indicate
the impact of improving performance, measured by response time
and load, of Virtual Private Network over wireless LAN.
Abstract: Software maintenance and mainly software
comprehension pose the largest costs in the software lifecycle. In
order to assess the cost of software comprehension, various
complexity measures have been proposed in the literature. This paper
proposes new cognitive-spatial complexity measures, which combine
the impact of spatial as well as architectural aspect of the software to
compute the software complexity. The spatial aspect of the software
complexity is taken into account using the lexical distances (in
number of lines of code) between different program elements and the
architectural aspect of the software complexity is taken into
consideration using the cognitive weights of control structures
present in control flow of the program. The proposed measures are
evaluated using standard axiomatic frameworks and then, the
proposed measures are compared with the corresponding existing
cognitive complexity measures as well as the spatial complexity
measures for object-oriented software. This study establishes that the
proposed measures are better indicators of the cognitive effort
required for software comprehension than the other existing
complexity measures for object-oriented software.
Abstract: Employing a recently introduced unified adaptive filter
theory, we show how the performance of a large number of important
adaptive filter algorithms can be predicted within a general framework
in nonstationary environment. This approach is based on energy conservation
arguments and does not need to assume a Gaussian or white
distribution for the regressors. This general performance analysis can
be used to evaluate the mean square performance of the Least Mean
Square (LMS) algorithm, its normalized version (NLMS), the family
of Affine Projection Algorithms (APA), the Recursive Least Squares
(RLS), the Data-Reusing LMS (DR-LMS), its normalized version
(NDR-LMS), the Block Least Mean Squares (BLMS), the Block
Normalized LMS (BNLMS), the Transform Domain Adaptive Filters
(TDAF) and the Subband Adaptive Filters (SAF) in nonstationary
environment. Also, we establish the general expressions for the
steady-state excess mean square in this environment for all these
adaptive algorithms. Finally, we demonstrate through simulations that
these results are useful in predicting the adaptive filter performance.
Abstract: Global Positioning System (GPS) technology is widely used today in the areas of geodesy and topography as well as in aeronautics mainly for military purposes. Due to the military usage of GPS, full access and use of this technology is being denied to the civilian user who must then work with a less accurate version. In this paper we focus on the estimation of the receiver coordinates ( X, Y, Z ) and its clock bias ( δtr ) of a fixed point based on pseudorange measurements of a single GPS receiver. Utilizing the instantaneous coordinates of just 4 satellites and their clock offsets, by taking into account the atmospheric delays, we are able to derive a set of pseudorange equations. The estimation of the four unknowns ( X, Y, Z , δtr ) is achieved by introducing an extended Kalman filter that processes, off-line, all the data collected from the receiver. Higher performance of position accuracy is attained by appropriate tuning of the filter noise parameters and by including other forms of biases.
Abstract: Hearing impairment is the number one chronic
disability affecting many people in the world. Background noise is
particularly damaging to speech intelligibility for people with
hearing loss especially for sensorineural loss patients. Several
investigations on speech intelligibility have demonstrated
sensorineural loss patients need 5-15 dB higher SNR than the normal
hearing subjects. This paper describes Discrete Hartley Transform
Power Normalized Least Mean Square algorithm (DHT-LMS) to
improve the SNR and to reduce the convergence rate of the Least
Means Square (LMS) for sensorineural loss patients. The DHT
transforms n real numbers to n real numbers, and has the convenient
property of being its own inverse. It can be effectively used for noise
cancellation with less convergence time. The simulated result shows
the superior characteristics by improving the SNR at least 9 dB for
input SNR with zero dB and faster convergence rate (eigenvalue ratio
12) compare to time domain method and DFT-LMS.
Abstract: Dexamethasone (Dex) is a synthetic glucocorticoid
that is used in therapy. However prolonged treatments with high
doses are often required. This causes side effects that interfere with
the activity of several endocrine systems, including the gonadotropic
axis.
The aim of our study is to determine the effect of Dex on testicular
function in prepubertal Wistar rats.
Newborn Wistar rats are submitted to intraperitoneal injection of
Dex (1μg of Dex dissolved in NaCl 0.9% / 5g bw) for 20 days and
then sacrificed at the age of 40days. A control group received NaCl
0.9%. The rat is weighed daily. The plasmatic levels of testosterone,
LH and FSH were measured by radioimmunoassay. A histomorphometric
study was performed on sections of testis.
Treated groups showed a significant decrease in body weight (p
Abstract: Understanding the number of people and the flow of
the persons is useful for efficient promotion of the institution
managements and company-s sales improvements. This paper
introduces an automated method for counting passerby using virtualvertical
measurement lines. The process of recognizing a passerby is
carried out using an image sequence obtained from the USB camera.
Space-time image is representing the human regions which are
treated using the segmentation process. To handle the problem of
mismatching, different color space are used to perform the template
matching which chose automatically the best matching to determine
passerby direction and speed. A relation between passerby speed and
the human-pixel area is used to distinguish one or two passersby. In
the experiment, the camera is fixed at the entrance door of the hall in
a side viewing position. Finally, experimental results verify the
effectiveness of the presented method by correctly detecting and
successfully counting them in order to direction with accuracy of
97%.
Abstract: Hand gesture is one of the typical methods used in
sign language for non-verbal communication. It is most commonly
used by people who have hearing or speech problems to
communicate among themselves or with normal people. Various sign
language systems have been developed by manufacturers around the
globe but they are neither flexible nor cost-effective for the end
users. This paper presents a system prototype that is able to
automatically recognize sign language to help normal people to
communicate more effectively with the hearing or speech impaired
people. The Sign to Voice system prototype, S2V, was developed
using Feed Forward Neural Network for two-sequence signs
detection. Different sets of universal hand gestures were captured
from video camera and utilized to train the neural network for
classification purpose. The experimental results have shown that
neural network has achieved satisfactory result for sign-to-voice
translation.