Abstract: In this paper two mathematical models for definition of gas accidental escape localization in the gas pipelines are suggested. The first model was created for leak localization in the horizontal branched pipeline and second one for leak detection in inclined section of the main gas pipeline. The algorithm of leak localization in the branched pipeline did not demand on knowledge of corresponding initial hydraulic parameters at entrance and ending points of each sections of pipeline. For detection of the damaged section and then leak localization in this section special functions and equations have been constructed. Some results of calculations for compound pipelines having two, four and five sections are presented. Also a method and formula for the leak localization in the simple inclined section of the main gas pipeline are suggested. Some results of numerical calculations defining localization of gas escape for the inclined pipeline are presented.
Abstract: Implicit equations play a crucial role in Engineering.
Based on this importance, several techniques have been applied to
solve this particular class of equations. When it comes to practical
applications, in general, iterative procedures are taken into account.
On the other hand, with the improvement of computers, other
numerical methods have been developed to provide a more
straightforward methodology of solution. Analytical exact approaches
seem to have been continuously neglected due to the difficulty
inherent in their application; notwithstanding, they are indispensable
to validate numerical routines. Lagrange-s Inversion Theorem is a
simple mathematical tool which has proved to be widely applicable to
engineering problems. In short, it provides the solution to implicit
equations by means of an infinite series. To show the validity of this
method, the tree-parameter infiltration equation is, for the first time,
analytically and exactly solved. After manipulating these series,
closed-form solutions are presented as H-functions.
Abstract: The similarity comparison of RNA secondary
structures is important in studying the functions of RNAs. In recent
years, most existing tools represent the secondary structures by
tree-based presentation and calculate the similarity by tree alignment
distance. Different to previous approaches, we propose a new method
based on maximum clique detection algorithm to extract the maximum
common structural elements in compared RNA secondary structures.
A new graph-based similarity measurement and maximum common
subgraph detection procedures for comparing purely RNA secondary
structures is introduced. Given two RNA secondary structures, the
proposed algorithm consists of a process to determine the score of the
structural similarity, followed by comparing vertices labelling, the
labelled edges and the exact degree of each vertex. The proposed
algorithm also consists of a process to extract the common structural
elements between compared secondary structures based on a proposed
maximum clique detection of the problem. This graph-based model
also can work with NC-IUB code to perform the pattern-based
searching. Therefore, it can be used to identify functional RNA motifs
from database or to extract common substructures between complex
RNA secondary structures. We have proved the performance of this
proposed algorithm by experimental results. It provides a new idea of
comparing RNA secondary structures. This tool is helpful to those
who are interested in structural bioinformatics.
Abstract: The aim of the present paper is to investigate the
interdependency among ego-identity status, autobiographical memory
and cultural life story schema. The study shows considerable
differences between autobiographical memory characteristics and
“family script", which is typical for participants (adolescents, M age
years = 17.84, SD = 1.18, N = 58), with different ego-identity
statuses. Participants with diffused ego-identity status recalled fewer
autobiographical memories. Additionally, this group of participants
recalled fewer events from their parents- life. Participants with
moratorium ego-identity status dated their first recollections to a later
age than others, and recalled fewer memories relating to their
childhood. Participants with achieved identity status recalled more
self-defining memories and events from their parents- life. They used
more functions from the autobiographical memory. There weren-t
any significant differences between the foreclosed identity status
group and the others. These findings support the idea of a
bidirectional relation between culture, memory and self.
Abstract: Fractional Fourier Transform is a generalization of the
classical Fourier Transform. The Fractional Fourier span in general
depends on the amplitude and phase functions of the signal and varies
with the transform order. However, with the development of the
Fractional Fourier filter banks, it is advantageous in some cases to
have different transform orders for different filter banks to achieve
better decorrelation of the windowed and overlapped time signal. We
present an expression that is useful for finding the perturbation in the
Fractional Fourier span due to the erroneous transform order and the
possible variation in the window shape and length. The expression is
based on the dependency of the time-Fractional Fourier span
Uncertainty on the amplitude and phase function of the signal. We
also show with the help of the developed expression that the
perturbation of span has a varying degree of sensitivity for varying
degree of transform order and the window coefficients.
Abstract: This research proposes an Interactive 3D Experience to
enhance customer value in the fantasy era. As products reach maturity,
they become more similar in the range of functions that they provide.
This leads to competition via reduced retail price and ultimately
reduced profitability. A competitive design method is therefore
needed that can produce higher value products. An Enhanced Value
Experience has been identified that can assist designers to provide
quality products and to give them a unique positioning. On the basis of
this value opportunity, the method of Interactive 3D Experience has
been formulated and applied to the domain of retail furniture. Through
this, customers can create their own personalized styling via the
interactive 3D platform.
Abstract: This project relates to a two-wheeled self balancing
robot for transferring loads on different locations along a path. This
robot specifically functions as a dual mode navigation to navigate
efficiently along a desired path. First, as a plurality of distance
sensors mounted at both sides of the body for collecting information
on tilt angle of the body and second, as a plurality of speed sensors
mounted at the bottom of the body for collecting information of the
velocity of the body in relative to the ground. A microcontroller for
processing information collected from the sensors and configured to
set the path and to balance the body automatically while a processor
operatively coupled to the microcontroller and configured to compute
change of the tilt and velocity of the body. A direct current motor
operatively coupled to the microcontroller for controlling the wheels
and characterized in that a remote control is operatively coupled to
the microcontroller to operate the robot in dual navigation modes.
Abstract: This evaluation of land supply system performance in
China shall examine the combination of government functions and
national goals in order to perform a cost-benefit analysis of system
results. From the author's point of view, it is most productive to
evaluate land supply system performance at moments of system
transformation for the following reasons. The behavior and
input-output change of beneficial results at different times can be
observed when the system or policy changes and system performance
can be evaluated through a cost-benefit analysis during the process of
system transformation. Moreover, this evaluation method can avoid
the influence of land resource endowment. Different land resource
endowment methods and different economy development periods
result in different systems. This essay studies the contents, principles
and methods of land supply system performance evaluation. Taking
Beijing as an example, this essay optimizes and classifies the land
supply index, makes a quantitative evaluation of land supply system
performance through principal component analysis (PCA), and finally
analyzes the factors that influence land supply system performance at
times of system transformation.
Abstract: This study focuses on bureau management
technologies and information systems in developing countries.
Developing countries use such systems which facilitate executive and
organizational functions through the utilization of bureau
management technologies and provide the executive staff with
necessary information.
The concepts of data and information differ from each other in
developing countries, and thus the concepts of data processing and
information processing are different. Symbols represent ideas,
objects, figures, letters and numbers. Data processing system is an
integrated system which deals with the processing of the data related
to the internal and external environment of the organization in order
to make decisions, create plans and develop strategies; it goes
without saying that this system is composed of both human beings
and machines. Information is obtained through the acquisition and
the processing of data. On the other hand, data are raw
communicative messages. Within this framework, data processing
equals to producing plausible information out of raw data.
Organizations in developing countries need to obtain information
relevant to them because rapid changes in the organizational arena
require rapid access to accurate information. The most significant
role of the directors and managers who work in the organizational
arena is to make decisions. Making a correct decision is possible only
when the directors and managers are equipped with sound ideas and
appropriate information. Therefore, acquisition, organization and
distribution of information gain significance. Today-s organizations
make use of computer-assisted “Management Information Systems"
in order to obtain and distribute information.
Decision Support System which is closely related to practice is an
information system that facilitates the director-s task of making
decisions. Decision Support System integrates human intelligence,
information technology and software in order to solve the complex
problems. With the support of the computer technology and software
systems, Decision Support System produces information relevant to
the decision to be made by the director and provides the executive
staff with supportive ideas about the decision.
Artificial Intelligence programs which transfer the studies and
experiences of the people to the computer are called expert systems.
An expert system stores expert information in a limited area and can
solve problems by deriving rational consequences.
Bureau management technologies and information systems in
developing countries create a kind of information society and
information economy which make those countries have their places
in the global socio-economic structure and which enable them to play
a reasonable and fruitful role; therefore it is of crucial importance to
make use of information and management technologies in order to
work together with innovative and enterprising individuals and it is
also significant to create “scientific policies" based on information
and technology in the fields of economy, politics, law and culture.
Abstract: Security has been an important issue and concern in the
smart home systems. Smart home networks consist of a wide range of
wired or wireless devices, there is possibility that illegal access to
some restricted data or devices may happen. Password-based
authentication is widely used to identify authorize users, because this
method is cheap, easy and quite accurate. In this paper, a neural
network is trained to store the passwords instead of using verification
table. This method is useful in solving security problems that
happened in some authentication system. The conventional way to
train the network using Backpropagation (BPN) requires a long
training time. Hence, a faster training algorithm, Resilient
Backpropagation (RPROP) is embedded to the MLPs Neural
Network to accelerate the training process. For the Data Part, 200
sets of UserID and Passwords were created and encoded into binary
as the input. The simulation had been carried out to evaluate the
performance for different number of hidden neurons and combination
of transfer functions. Mean Square Error (MSE), training time and
number of epochs are used to determine the network performance.
From the results obtained, using Tansig and Purelin in hidden and
output layer and 250 hidden neurons gave the better performance. As
a result, a password-based user authentication system for smart home
by using neural network had been developed successfully.
Abstract: This paper focuses on cost and profit analysis of
single-server Markovian queuing system with two priority classes. In
this paper, functions of total expected cost, revenue and profit of the
system are constructed and subjected to optimization with respect to
its service rates of lower and higher priority classes. A computing
algorithm has been developed on the basis of fast converging
numerical method to solve the system of non linear equations formed
out of the mathematical analysis. A novel performance measure of
cost and profit analysis in view of its economic interpretation for the
system with priority classes is attempted to discuss in this paper. On
the basis of computed tables observations are also drawn to enlighten
the variational-effect of the model on the parameters involved
therein.
Abstract: A generalization of the concepts of Feistel Networks (FN), known as Extended Feistel Network (EFN) is examined. EFN splits the input blocks into n > 2 sub-blocks. Like conventional FN, EFN consists of a series of rounds whereby at least one sub-block is subjected to an F function. The function plays a key role in the diffusion process due to its completeness property. It is also important to note that in EFN the F-function is the most computationally expensive operation in a round. The aim of this paper is to determine a suitable type of EFN for a scalable cipher. This is done by analyzing the threshold number of rounds for different types of EFN to achieve the completeness property as well as the number of F-function required in the network. The work focuses on EFN-Type I, Type II and Type III only. In the analysis it is found that EFN-Type II and Type III diffuses at the same rate and both are faster than Type-I EFN. Since EFN-Type-II uses less F functions as compared to EFN-Type III, therefore Type II is the most suitable EFN for use in a scalable cipher.
Abstract: An alternative iterative computational procedure is
proposed for internal normal ball loads calculation in statically
loaded single-row, angular-contact ball bearings, subjected to a
known thrust load, which is applied in the inner ring at the geometric
bearing center line. An accurate method for curvature radii at
contacts with inner and outer raceways in the direction of the motion
is used. Numerical aspects of the iterative procedure are discussed.
Numerical examples results for a 218 angular-contact ball bearing
have been compared with those from the literature. Twenty figures
are presented showing the geometrical features, the behavior of the
convergence variables and the following parameters as functions of
the thrust load: normal ball loads, contact angle, distance between
curvature centers, and normal ball and axial deflections.
Abstract: Understanding the cell's large-scale organization is an interesting task in computational biology. Thus, protein-protein interactions can reveal important organization and function of the cell. Here, we investigated the correspondence between protein interactions and function for the yeast. We obtained the correlations among the set of proteins. Then these correlations are clustered using both the hierarchical and biclustering methods. The detailed analyses of proteins in each cluster were carried out by making use of their functional annotations. As a result, we found that some functional classes appear together in almost all biclusters. On the other hand, in hierarchical clustering, the dominancy of one functional class is observed. In the light of the clustering data, we have verified some interactions which were not identified as core interactions in DIP and also, we have characterized some functionally unknown proteins according to the interaction data and functional correlation. In brief, from interaction data to function, some correlated results are noticed about the relationship between interaction and function which might give clues about the organization of the proteins, also to predict new interactions and to characterize functions of unknown proteins.
Abstract: Due to the fast development of technology, the
competition of technological products is turbulent; therefore, it is
important to understand the market trend, consumers- demand and
preferences. As the smartphones are prevalent, the main purpose of
this paper is to utilize Analytic Hierarchy Process (AHP) to analyze
consumer-s purchase evaluation factors of smartphones. Through the
AHP expert questionnaire, the smartphones- main functions are
classified as “user interface", “mobile commerce functions",
“hardware and software specifications", “entertainment functions" and
“appearance and design", five aspects to analyze the weights. Then
four evaluation criteria are evaluated under each aspect to rank the
weights. Based on an analysis of data shows that consumers consider
when purchase factors are “hardware and software specifications",
“user interface", “appearance and design", “mobile commerce
functions" and “entertainment functions" in sequence. The “hardware
and software specifications" aspect obtains the weight of 33.18%; it is
the most important factor that consumers are taken into account. In
addition, the most important evaluation criteria are central processing
unit, operating system, touch screen, and battery function in sequence.
The results of the study can be adopted as reference data for mobile
phone manufacturers in the future on the design and marketing
strategy to satisfy the voice of customer.
Abstract: A Variable Structure Model Reference Adaptive Controller using state variables is proposed for a class of multi input-multi output systems. Adaptation law is of variable structure type and switching functions is designed based on stability requirements. Global exponential stability is proved based on Lyapunov criterion. Transient behavior is analyzed using sliding mode control and shows perfect model following at a finite time.
Abstract: In this paper we introduce a new class of mg-continuous mapping and studied some of its basic properties.We obtain some characterizations of such functions. Moreover we define sub minimal structure and further study certain properties of mg-closed sets.
Abstract: In the current Grid environment, efficient workload
management presents a significant challenge, for which there are
exorbitant de facto standards encompassing resource discovery,
brokerage, and data transfer, among others. In addition, the real-time
resource status, essential for an optimal resource allocation strategy,
is often not readily accessible. To address these issues and provide a
cleaner abstraction of the Grid with the potential of generalizing into
arbitrary resource-sharing environment, this paper proposes a new
Condor-based pilot mechanism applied in the PanDA architecture,
PanDA-PF WMS, with the goal of providing a more generic yet
efficient resource allocating strategy. In this architecture, the PanDA
server primarily acts as a repository of user jobs, responding to pilot
requests from distributed, remote resources. Scheduling decisions are
subsequently made according to the real-time resource information
reported by pilots. Pilot Factory is a Condor-inspired solution for a
scalable pilot dissemination and effectively functions as a resource
provisioning mechanism through which the user-job server, PanDA,
reaches out to the candidate resources only on demand.
Abstract: This article presents a current-mode universal biquadratic filter. The proposed circuit can apparently provide standard functions of the biquad filter: low-pass, high-pass, bandpass, band-reject and all-pass functions. The circuit uses 4 current controlled transconductance amplifiers (CCTAs) and 2 grounded capacitors. In addition, the pole frequency and quality factor can be adjusted by electronic method by adjusting the bias currents of the CCTA. The proposed circuit uses only grounded capacitors without additional external resistors, the proposed circuit is considerably appropriate to further developing into an integrated circuit. The results of PSPICE simulation program are corresponding to the theoretical analysis.
Abstract: Fuzzy random variables have been introduced as an imprecise concept of numeric values for characterizing the imprecise knowledge. The descriptive parameters can be used to describe the primary features of a set of fuzzy random observations. In fuzzy environments, the expected values are usually represented as fuzzy-valued, interval-valued or numeric-valued descriptive parameters using various metrics. Instead of the concept of area metric that is usually adopted in the relevant studies, the numeric expected value is proposed by the concept of distance metric in this study based on two characters (fuzziness and randomness) of FRVs. Comparing with the existing measures, although the results show that the proposed numeric expected value is same with those using the different metric, if only triangular membership functions are used. However, the proposed approach has the advantages of intuitiveness and computational efficiency, when the membership functions are not triangular types. An example with three datasets is provided for verifying the proposed approach.