Abstract: If there exists a nonempty, proper subset S of the set of all (n+1)(n+2)/2 inertias such that S Ôèå i(A) is sufficient for any n×n zero-nonzero pattern A to be inertially arbitrary, then S is called a critical set of inertias for zero-nonzero patterns of order n. If no proper subset of S is a critical set, then S is called a minimal critical set of inertias. In [Kim, Olesky and Driessche, Critical sets of inertias for matrix patterns, Linear and Multilinear Algebra, 57 (3) (2009) 293-306], identifying all minimal critical sets of inertias for n×n zero-nonzero patterns with n ≥ 3 and the minimum cardinality of such a set are posed as two open questions by Kim, Olesky and Driessche. In this note, the minimum cardinality of all critical sets of inertias for 4 × 4 irreducible zero-nonzero patterns is identified.
Abstract: This research work proposes a model of network security systems aiming to prevent production system in a data center from being attacked by intrusions. Conceptually, we introduce a decoy system as a part of the security system for luring intrusions, and apply network intrusion detection (NIDS), coupled with the decoy system to perform intrusion prevention. When NIDS detects an activity of intrusions, it will signal a redirection module to redirect all malicious traffics to attack the decoy system instead, and hence the production system is protected and safe. However, in a normal situation, traffic will be simply forwarded to the production system as usual. Furthermore, we assess the performance of the model with various bandwidths, packet sizes and inter-attack intervals (attacking frequencies).
Abstract: A considerable progress has been achieved in transient
stability analysis (TSA) with various FACTS controllers. But, all
these controllers are associated with single transmission line. This
paper is intended to discuss a new approach i.e. a multi-line FACTS
controller which is interline power flow controller (IPFC) for TSA of
a multi-machine power system network. A mathematical model of
IPFC, termed as power injection model (PIM) presented and this
model is incorporated in Newton-Raphson (NR) power flow
algorithm. Then, the reduced admittance matrix of a multi-machine
power system network for a three phase fault without and with IPFC
is obtained which is required to draw the machine swing curves. A
general approach based on L-index has also been discussed to find
the best location of IPFC to reduce the proximity to instability of a
power system. Numerical results are carried out on two test systems
namely, 6-bus and 11-bus systems. A program in MATLAB has
been written to plot the variation of generator rotor angle and speed
difference curves without and with IPFC for TSA and also a simple
approach has been presented to evaluate critical clearing time for test
systems. The results obtained without and with IPFC are compared
and discussed.
Abstract: In this paper, we present an algorithm for computing a
Schur factorization of a real nonsymmetric matrix with ordered diagonal
blocks such that upper left blocks contains the largest magnitude
eigenvalues. Especially in case of multiple eigenvalues, when matrix
is non diagonalizable, we construct an invariant subspaces with few
additional tricks which are heuristic and numerical results shows the
stability and accuracy of the algorithm.
Abstract: Presented herein is an assessment of current nonlinear
static procedures (NSPs) for seismic evaluation of bucklingrestrained
braced frames (BRBFs) which have become a favorable
lateral-force resisting system for earthquake resistant buildings. The
bias and accuracy of modal, improved modal pushover analysis
(MPA, IMPA) and mass proportional pushover (MPP) procedures
are comparatively investigated when they are applied to BRBF
buildings subjected to two sets of strong ground motions. The
assessment is based on a comparison of seismic displacement
demands such as target roof displacements, peak floor/roof
displacements and inter-story drifts. The NSP estimates are compared
to 'exact' results from nonlinear response history analysis (NLRHA).
The response statistics presented show that the MPP
procedure tends to significantly overestimate seismic demands of
lower stories of tall buildings considered in this study while MPA
and IMPA procedures provide reasonably accurate results in
estimating maximum inter-story drift over all stories of studied BRBF
systems.
Abstract: India recognizes the personal laws of the various
religious communities that reside in the country. At the same time all
the institutions of the state in India are committed to the value of
secularism. This paper has been developed on the basis of a case
study that indicates the dynamics of religion in the working of the
lower judiciary in India. Majority of the commentary on religion and
the judiciary has focused on debates surrounding the existence and
application of personal laws. This paper, through a case study in the
lower judiciary, makes an attempt to examine whether the interface
between religion and the judiciary goes beyond personal laws.
The first part of this paper explains the history and application of
personal laws in social, political and legal contexts in India. The
second part examines the case study located in two courts of first
instance, following into the third part which provides an analysis of
the empirical evidence. The fourth part focuses on preliminary
observations about why there is a hesitancy to speak about religion in
relation to the working of the judicial system.
Abstract: In order to meet the limits imposed on automotive
emissions, engine control systems are required to constrain air/fuel
ratio (AFR) in a narrow band around the stoichiometric value, due to
the strong decay of catalyst efficiency in case of rich or lean mixture.
This paper presents a model of a sample spark ignition engine and
demonstrates Simulink-s capabilities to model an internal combustion
engine from the throttle to the crankshaft output. We used welldefined
physical principles supplemented, where appropriate, with
empirical relationships that describe the system-s dynamic behavior
without introducing unnecessary complexity. We also presents a PID
tuning method that uses an adaptive fuzzy system to model the
relationship between the controller gains and the target output
response, with the response specification set by desired percent
overshoot and settling time. The adaptive fuzzy based input-output
model is then used to tune on-line the PID gains for different
response specifications. Experimental results demonstrate that better
performance can be achieved with adaptive fuzzy tuning relative to
similar alternative control strategies. The actual response
specifications with adaptive fuzzy matched the desired response
specifications.
Abstract: Innovation is more important in any companies.
However, it is not easy to measure the innovation performance
correctly. Patent is one of measuring index nowadays. This paper
wants to purpose an approach for valuing patents based on market
reaction to patent infringement litigations. The interesting
phenomenon is found from collection of patent infringement litigation
events. That is if any patent litigation event occurs the stock value will
follow changing. The plaintiffs- stock value raises some percentage.
According to this interesting phenomenon, the relationship between
patent litigation and stock value is tested and verified. And then, the
stock value variation is used to deduce the infringed patents- value.
The purpose of this study is providing another concept model to
evaluate the infringed patents. This study can provide a decision assist
system to help drafting patent litigation strategy and determine the
technology value
Abstract: A topologically oriented neural network is very
efficient for real-time path planning for a mobile robot in changing
environments. When using a recurrent neural network for this
purpose and with the combination of the partial differential equation
of heat transfer and the distributed potential concept of the network,
the problem of obstacle avoidance of trajectory planning for a
moving robot can be efficiently solved. The related dimensional
network represents the state variables and the topology of the robot's
working space. In this paper two approaches to problem solution are
proposed. The first approach relies on the potential distribution of
attraction distributed around the moving target, acting as a unique
local extreme in the net, with the gradient of the state variables
directing the current flow toward the source of the potential heat. The
second approach considers two attractive and repulsive potential
sources to decrease the time of potential distribution. Computer
simulations have been carried out to interrogate the performance of
the proposed approaches.
Abstract: QoS Routing aims to find paths between senders and
receivers satisfying the QoS requirements of the application which
efficiently using the network resources and underlying routing
algorithm to be able to find low-cost paths that satisfy given QoS
constraints. The problem of finding least-cost routing is known to be
NP-hard or complete and some algorithms have been proposed to
find a near optimal solution. But these heuristics or algorithms either
impose relationships among the link metrics to reduce the complexity
of the problem which may limit the general applicability of the
heuristic, or are too costly in terms of execution time to be applicable
to large networks. In this paper, we concentrate an algorithm that
finds a near-optimal solution fast and we named this algorithm as
optimized Delay Constrained Routing (ODCR), which uses an
adaptive path weight function together with an additional constraint
imposed on the path cost, to restrict search space and hence ODCR
finds near optimal solution in much quicker time.
Abstract: Over the past few years, a number of efforts have
been exerted to build parallel processing systems that utilize the idle
power of LAN-s and PC-s available in many homes and corporations.
The main advantage of these approaches is that they provide cheap
parallel processing environments for those who cannot afford the
expenses of supercomputers and parallel processing hardware.
However, most of the solutions provided are not very flexible in the
use of available resources and very difficult to install and setup.
In this paper, a multi-level web-based parallel processing system
(MWPS) is designed (appendix). MWPS is based on the idea of
volunteer computing, very flexible, easy to setup and easy to use.
MWPS allows three types of subscribers: simple volunteers (single
computers), super volunteers (full networks) and end users. All of
these entities are coordinated transparently through a secure web site.
Volunteer nodes provide the required processing power needed by
the system end users. There is no limit on the number of volunteer
nodes, and accordingly the system can grow indefinitely. Both
volunteer and system users must register and subscribe. Once, they
subscribe, each entity is provided with the appropriate MWPS
components. These components are very easy to install.
Super volunteer nodes are provided with special components that
make it possible to delegate some of the load to their inner nodes.
These inner nodes may also delegate some of the load to some other
lower level inner nodes .... and so on. It is the responsibility of the
parent super nodes to coordinate the delegation process and deliver
the results back to the user.
MWPS uses a simple behavior-based scheduler that takes into
consideration the current load and previous behavior of processing
nodes. Nodes that fulfill their contracts within the expected time get a
high degree of trust. Nodes that fail to satisfy their contract get a
lower degree of trust.
MWPS is based on the .NET framework and provides the minimal
level of security expected in distributed processing environments.
Users and processing nodes are fully authenticated. Communications
and messages between nodes are very secure. The system has been
implemented using C#.
MWPS may be used by any group of people or companies to
establish a parallel processing or grid environment.
Abstract: Skyline extraction in mountainous images can be used
for navigation of vehicles or UAV(unmanned air vehicles), but it is
very hard to extract skyline shape because of clutters like clouds, sea
lines and field borders in images. We developed the edge-based
skyline extraction algorithm using a proposed multistage edge filtering
(MEF) technique. In this method, characteristics of clutters in the
image are first defined and then the lines classified as clutters are
eliminated by stages using the proposed MEF technique. After this
processing, we select the last line using skyline measures among the
remained lines. This proposed algorithm is robust under severe
environments with clutters and has even good performance for
infrared sensor images with a low resolution. We tested this proposed
algorithm for images obtained in the field by an infrared camera and
confirmed that the proposed algorithm produced a better performance
and faster processing time than conventional algorithms.
Abstract: Although a picture can be automatically a graphic
work, but especially in the field of graphics and images based on the
idea of advertising and graphic design will be prepared and
photographers to realize the design using his own knowledge and
skills to help does. It is evident that knowledge of photography,
photographer and designer of the facilities, fields of reaching a
higher level of quality offers. At the same time do not have a graphic
designer is also skilled photographer, but can execute your idea may
delegate to an expert photographer. Using technology and methods in
all fields of photography, graphic art may be applicable. But most of
its application in Iran, in works such as packaging, posters, Bill
Board, advertising, brochures and catalogs are. In this study, we
review how the images and techniques in the chart should be used in
Iranian graphic photo what impact has left. Using photography
techniques and procedures can be designed and helped advance the
goals graphic. Technique could not determine the idea. But what is
important to think about design and photography and his creativity
can flourish as a tool to be effective graphic designer in mind.
Computer software to help it's very promotes creativity techniques
shall graphic designer but also it is as a tool. Using images in various
fields, especially graphic arts and only because it is not being
documented, but applications are beautiful. As to his photographic
style from today is graphics. Graphic works try to affect impacts on
their audience. Hence the photo as an important factor is attention.
The other hand saw the man with the extent of forgiving and
understanding people's image, instead of using the word to your files,
allows large messages and concepts should be sent in the shortest
time. Posters, advertisements, brochures, catalog and packaging
products very diverse agricultural, industrial and food could not be
self-image. Today, the use of graphic images for a big score and the
photos to richen the role graphic design plays a major.
Abstract: This paper sets forth the possibility and importance about applying Data Mining in Web logs mining and shows some problems in the conventional searching engines. Then it offers an improved algorithm based on the original AprioriAll algorithm which has been used in Web logs mining widely. The new algorithm adds the property of the User ID during the every step of producing the candidate set and every step of scanning the database by which to decide whether an item in the candidate set should be put into the large set which will be used to produce next candidate set. At the meantime, in order to reduce the number of the database scanning, the new algorithm, by using the property of the Apriori algorithm, limits the size of the candidate set in time whenever it is produced. Test results show the improved algorithm has a more lower complexity of time and space, better restrain noise and fit the capacity of memory.
Abstract: Electroencephalogram (EEG) recordings are often
contaminated with ocular and muscle artifacts. In this paper, the
canonical correlation analysis (CCA) is used as blind source
separation (BSS) technique (BSS-CCA) to decompose the artifact
contaminated EEG into component signals. We combine the BSSCCA
technique with wavelet filtering approach for minimizing both
ocular and muscle artifacts simultaneously, and refer the proposed
method as wavelet enhanced BSS-CCA. In this approach, after
careful visual inspection, the muscle artifact components are
discarded and ocular artifact components are subjected to wavelet
filtering to retain high frequency cerebral information, and then clean
EEG is reconstructed. The performance of the proposed wavelet
enhanced BSS-CCA method is tested on real EEG recordings
contaminated with ocular and muscle artifacts, for which power
spectral density is used as a quantitative measure. Our results suggest
that the proposed hybrid approach minimizes ocular and muscle
artifacts effectively, minimally affecting underlying cerebral activity
in EEG recordings.
Abstract: It has been shown that pH 7,3 and 37 0C are the optimal condition for the growth of E. coli “ASAP". The cells grow well on Glucose, Lactose, D-Mannitol, D-Sorbitol, (+)-Xylose, L- (+)-Arabinose and Dulcitol. No growth has been observed on Sucrose, Inositol, Phenylalanine, and Tryptophan. The strain is sensitive to a range of antibiotics. The present study has demonstrated that E. coli “ASAP" inhibit the growth of S. enterica ATCC #700931 in vitro. The studies on conjugating activity has revealed no conjugant of E. coli “ASAP" with plasmid strains E. coli G35#59 and S. enterica ATCC #700931. On the other hand, the conjugants with low frequencies were obtained from E. coli “ASAP" with E. coli G35#61, and E. coli “ASAP" with randomly chosen isolate from healthy human gut microflora: E. coli E6. The results of present study have demonstrated improvements in gut microflora condition of patients with different diseases after the administration of “ASAP"
Abstract: The evolutionary design of electronic circuits, or
evolvable hardware, is a discipline that allows the user to
automatically obtain the desired circuit design. The circuit
configuration is under the control of evolutionary algorithms. Several
researchers have used evolvable hardware to design electrical
circuits. Every time that one particular algorithm is selected to carry
out the evolution, it is necessary that all its parameters, such as
mutation rate, population size, selection mechanisms etc. are tuned in
order to achieve the best results during the evolution process. This
paper investigates the abilities of evolution strategy to evolve digital
logic circuits based on programmable logic array structures when
different mutation rates are used. Several mutation rates (fixed and
variable) are analyzed and compared with each other to outline the
most appropriate choice to be used during the evolution of
combinational logic circuits. The experimental results outlined in this
paper are important as they could be used by every researcher who
might need to use the evolutionary algorithm to design digital logic
circuits.
Abstract: In this paper, the relationship between learning
motivation and learning performance is explored by using exchange
theory. The relationship is concluded that external performance can
raise learning motivation and then increase learning performance. The
internal performance should be not completely neglected and the
external performance should be not attached important excessively.
The parents need self-study and must be also reeducated. The existing
education must be improved in raise of internal performance. The
incorrect learning thinking will mislead the students, parents, and
educators of next generation, when the students obtain good learning
performance in the learning environment with excess stimulants. Over
operation of external performance will result abnormal learning
thinking and violating learning goal. Learning is not only to obtain
performance. Learning quality and learning performance will be
limited as without learning motivation. The best learning motivation
is, the best learning performance is. The learning for reward is not
good for learning performance. Strategies of promoting life-long
learning are including the encouraging for learner, establishment of
good interaction learning environment, and the advertisement of the
merit and the importance of life-long learning, which can let the
learner with the correct learning motivation.
Abstract: Presently and in line with the United Nations (EPA),
human thinking system has shifted towards clean fuels so as to
maintain a cleaner environment and to save our planet earth.
One of the most successful studies in order to achieve new
energies includes the use of animal wastes and their organic residues,
and the result of these researches has been represented in the form of
very simple and cheap methods called biogas technology. Biogas
technology has developed a lot in the recent decades; its reason is the
high cost of fossil fuels and the greater attention of countries to the
environmental pollutions due to the consumption of this kind of
fuels.
IRAN is ready for the optimized application of renewable
energies, having much enriched resources of this kind of energies; so
a special place could be considered for it when making programs.
The purpose of biogas technology is the recovery of energy and
finally the protection of the environment, which is much appropriate
for the third world farmers with respect to their technical abilities and
economic potentials. Studies show that the production and
consumption of biogas is appropriate and economic in IRAN,
because of the high amount of waste in the agriculture sector, the
significant amount of animal and human excrement production, the
great volume of garbage produced and the most important the
specific social, climatic and agricultural conditions in IRAN, in order
to proceed towards the reduction of pollution due to the use of fossil
fuels.
Abstract: An important goal of parboiling is a decrease of rice broken percentage and at the beginning Selected paddy of variety of rice Tarom and soaked at three different temperatures 45 Cº, 65 Cº and 80 Cº orderly for 5 hours, 4 hours and 1.5 hours to moisture of 40 % and then in steaming stage to operate these action two steaming methods are selected steaming under pressure condition and steaming in atmosphere pressure and In the first method after exerting air, the steam pressure is increase to 1 Kg/Cm2 which is done in two different duration times of 2.5 and 5 minutes and in second method used of three times of 5,10 and 15 minutes and dry to 8% moisture and decreases of rice broken percentage at best condition in variety of Tarom of 37.2 % to 7.3 % and increases yield percentage at best condition in variety of Tarom of 69.4 % to 75.93 % and bran percentage decreased in variety of Tarom of 9.53 % to 2.2-3.2 % and this issue cause increases yield percentage in rice and use of This method is very significant for our country because broken percentage of rice in our country is 23-33 %.