Abstract: Drying characteristics of rough rice (variety of lenjan) with an initial moisture content of 25% dry basis (db) was studied in a hot air dryer assisted by infrared heating. Three arrival air temperatures (30, 40 and 500C) and four infrared radiation intensities (0, 0.2 , 0.4 and 0.6 W/cm2) and three arrival air speeds (0.1, 0.15 and 0.2 m.s-1) were studied. Bending strength of brown rice kernel, percentage of cracked kernels and time of drying were measured and evaluated. The results showed that increasing the drying arrival air temperature and radiation intensity of infrared resulted decrease in drying time. High bending strength and low percentage of cracked kernel was obtained when paddy was dried by hot air assisted infrared dryer. Between this factors and their interactive effect were a significant difference (p
Abstract: A Watson-Crick automaton is recently introduced as a
computational model of DNA computing framework. It works on
tapes consisting of double stranded sequences of symbols. Symbols
placed on the corresponding cells of the double-stranded sequences are
related by a complimentary relation. In this paper, we investigate a
variation of Watson-Crick automata in which both heads read the tape
in reverse directions. They are called reverse Watson-Crick finite
automata (RWKFA). We show that all of following four classes, i.e.,
simple, 1-limited, all-final, all-final and simple, are equal to
non-restricted version of RWKFA.
Abstract: Hydrogen that used as fuel in fuel cell vehicles can be
produced from renewable sources such as wind, solar, and hydro
technologies. PV-electrolyzer is one of the promising methods to
produce hydrogen with zero pollution emission. Hydrogen
production from a PV-electrolyzer system depends on the efficiency
of the electrolyzer and photovoltaic array, and sun irradiance at that
site. In this study, the amount of hydrogen is obtained using
mathematical equations for difference driving distance and sun peak
hours. The results show that the minimum of 99 PV modules are used
to generate 1.75 kgH2 per day for two vehicles.
Abstract: In an interval graph G = (V,E) the distance between two vertices u, v is de£ned as the smallest number of edges in a path joining u and v. The eccentricity of a vertex v is the maximum among distances from all other vertices of V . The diameter (δ) and radius (ρ) of the graph G is respectively the maximum and minimum among all the eccentricities of G. The center of the graph G is the set C(G) of vertices with eccentricity ρ. In this context our aim is to establish the relation ρ = δ 2 for an interval graph and to determine the center of it.
Abstract: In this paper spatial variability of some chemical and
physical soil properties were investigated in mountain rangelands of
Nesho, Mazandaran province, Iran. 110 soil samples from 0-30 cm
depth were taken with systematic method on grid 30×30 m2 in
regions with different vegetation cover and transported to laboratory.
Then soil chemical and physical parameters including Acidity (pH),
Electrical conductivity, Caco3, Bulk density, Particle density, total
phosphorus, total Nitrogen, available potassium, Organic matter,
Saturation moisture, Soil texture (percentage of sand, silt and clay),
Sodium, Calcium, magnesium were measured in laboratory. Data
normalization was performed then was done statistical analysis for
description of soil properties and geostatistical analysis for indication
spatial correlation between these properties and were perpetrated
maps of spatial distribution of soil properties using Kriging method.
Results indicated that in the study area Saturation moisture and
percentage of Sand had highest and lowest spatial correlation
respectively.
Abstract: In this article, we introduce a new approach for
analyzing UML designs to detect the inconsistencies between
multiple state diagrams and sequence diagrams. The Super State
Analysis (SSA) identifies the inconsistencies in super states, single
step transitions, and sequences. Because SSA considers multiple
UML state diagrams, it discovers inconsistencies that cannot be
discovered when considering only a single UML state diagram. We
have introduced a transition set that captures relationship information
that is not specifiable in UML diagrams. The SSA model uses the
transition set to link transitions of multiple state diagrams together.
The analysis generates three different sets automatically. These sets
are compared to the provided sets to detect the inconsistencies. SSA
identifies five types of inconsistencies: impossible super states,
unreachable super states, illegal transitions, missing transitions, and
illegal sequences.
Abstract: This paper presents the study of a variable speed wind
energy conversion system based on a Doubly Fed Induction Generator
(DFIG) based on a sliding mode control applied to achieve control of
active and reactive powers exchanged between the stator of the DFIG
and the grid to ensure a Maximum Power Point Tracking (MPPT) of
a wind energy conversion system. The proposed control algorithm is
applied to a DFIG whose stator is directly connected to the grid and
the rotor is connected to the PWM converter. To extract a maximum
of power, the rotor side converter is controlled by using a stator
flux-oriented strategy. The created decoupling control between active
and reactive stator power allows keeping the power factor close to
unity. Simulation results show that the wind turbine can operate at
its optimum energy for a wide range of wind speed.
Abstract: In this paper, we first introduce the model of games on augmenting systems with a coalition structure, which can be seen as an extension of games on augmenting systems. The core of games on augmenting systems with a coalition structure is defined, and an equivalent form is discussed. Meantime, the Shapley function for this type of games is given, and two axiomatic systems of the given Shapley function are researched. When the given games are quasi convex, the relationship between the core and the Shapley function is discussed, which does coincide as in classical case. Finally, a numerical example is given.
Abstract: When consistently innovative business-models can
give companies a competitive advantage, longitudinal empirical
research, which can reflect dynamic business-model changes, has yet
to prove a definitive connection. This study consequently employs a
dynamic perspective in conjunction with innovation theory to examine
the relationship between the types of business-model innovation and
firm value. This study tries to examine various types of
business-model innovation in high-end and low-end technology
industries such as HTC and the 7-Eleven chain stores with research
periods of 14 years and 32 years, respectively. The empirical results
suggest that adopting radical business-model innovation in addition to
expanding new target markets can successfully lead to a competitive
advantage. Sustained advanced technological competences and
service/product innovation are the key successful factors in high-end
and low-end technology industry business-models respectively. In
sum up, the business-model innovation can yield a higher market value
and financial value in high-end technology industries than low-end
ones.
Abstract: Social media has led to paradigm shifts in ways
people work and do business, interact and socialize, learn and obtain
knowledge. So much so that social media has established itself as an
important spatial extension of this nation-s historicity and challenges.
Regardless of the enabling reputation and recommendation features
through social networks embedded in the social media system, the
overflow of broadcasted and publicized media contents turns the
table around from engendering trust to doubting the trust system.
When the trust is at doubt, the effects include deactivation of
accounts and creation of multiple profiles, which lead to the overflow
of 'ghost' contents (i.e. “the abundance of abandoned ships"). In
most literature, the study of trust can be related to culture; hence the
difference between Western-s “openness" and Eastern-s “blue-chip"
concepts in networking and relationships. From a survey on issues
and challenges among Malaysian social media users, 'authenticity'
emerges as one of the main factors that causes and is caused by other
factors. The other issue that has surfaced is credibility either in terms
of message/content and source. Another is the quality of the
knowledge that is shared. This paper explores the terrains of this
critical space which in recent years has been dominated increasingly
by, arguably, social networks embedded in the social media system,
the overflow of broadcasted and publicized media content.
Abstract: In this paper the combination of thermal oxidation and
electrochemical anodizing processes is used to produce titanium
oxide layers. The response of titanium alloy Ti6Al4V to oxidation
processes at various temperatures and electrochemical anodizing in
various voltages are investigated. Scanning electron microscopy
(SEM); X-Ray Diffraction (XRD) and porosity determination have
been used to characterize the oxide layer thickness, surface
morphology, oxide layer-substrate adhesion and porosity. In the first
experiment, samples modified by thermal oxidation process then
followed by electrochemical anodizing. Second experiment consists
of surfaces modified by electrochemical anodizing process and then
followed by thermal oxidation. The first method shows better
properties than other one. In second experiment, Surfaces modified
were achieved by thicker and more adherent thick oxide layers on
titanium surface. The existence of an electrochemical anodized oxide
layer did not improve the adhesion of thermal oxide layer. The high
temperature, thermal formation of an oxide layer leads to a coarse
oxide grain morphology and a complete oxidative particle. In
addition, in high temperature oxidation porosity content is increased.
The oxide layer of thermal oxidation and electrochemical anodizing
processes; on Ti–6Al–4V substrate was covered with different
colored oxide layers.
Abstract: Text categorization is the problem of classifying text documents into a set of predefined classes. After a preprocessing step the documents are typically represented as large sparse vectors. When training classifiers on large collections of documents, both the time and memory restrictions can be quite prohibitive. This justifies the application of features selection methods to reduce the dimensionality of the document-representation vector. Four feature selection methods are evaluated: Random Selection, Information Gain (IG), Support Vector Machine (called SVM_FS) and Genetic Algorithm with SVM (GA_FS). We showed that the best results were obtained with SVM_FS and GA_FS methods for a relatively small dimension of the features vector comparative with the IG method that involves longer vectors, for quite similar classification accuracies. Also we present a novel method to better correlate SVM kernel-s parameters (Polynomial or Gaussian kernel).
Abstract: This study was conducted to determine the
objectivity, reliability and validity of the 90º push-ups test protocol
among male and female students of Sports Science Program, Faculty
of Sports Science and Coaching Sultan Idris University of Education.
Samples (n = 300), consisted of males (n = 168) and females (n =
132) students were randomly selected for this study. Researchers
tested the 90º push-ups on the sample twice in a single trial, test and
re-test protocol in the bench press test. Pearson-Product Moment
Correlation method's was used to determine the value of objectivity,
reliability and validity testing. The findings showed that the 900 pushups
test protocol showed high consistency between the two testers
with a value of r = .99. Likewise, The reliability value between test
and re-test for the 90º push-ups test for the male (r=.93) and female
(r=.93) students was also high. The results showed a correlation
between 90º push-ups test and bench press test for boys was r = .64
and girls was r = .28. This finding indicates that the use of the 90º
push-ups to test muscular strength and endurance in the upper body
of males has a higher validity values than female students.
Abstract: In present days the area of data migration is very topical. Current tools for data migration in the area of relational database have several disadvantages that are presented in this paper. We propose a methodology for data migration of the database tables and their data between various types of relational database systems (RDBMS). The proposed methodology contains an expert system. The expert system contains a knowledge base that is composed of IFTHEN rules and based on the input data suggests appropriate data types of columns of database tables. The proposed tool, which contains an expert system, also includes the possibility of optimizing the data types in the target RDBMS database tables based on processed data of the source RDBMS database tables. The proposed expert system is shown on data migration of selected database of the source RDBMS to the target RDBMS.
Abstract: In this paper, we propose an approach of unsupervised
segmentation with fuzzy connectedness. Valid seeds are first specified
by an unsupervised method based on scale space theory. A region is
then extracted for each seed with a relative object extraction method of
fuzzy connectedness. Afterwards, regions are merged according to the
values between them of an introduced measure. Some theorems and
propositions are also provided to show the reasonableness of the
measure for doing mergence. Experiment results on a synthetic image,
a color image and a large amount of MR images of our method are
reported.
Abstract: As the majority of faults are found in a few of its modules so there is a need to investigate the modules that are affected severely as compared to other modules and proper maintenance need to be done on time especially for the critical applications. In this paper, we have explored the different predictor models to NASA-s public domain defect dataset coded in Perl programming language. Different machine learning algorithms belonging to the different learner categories of the WEKA project including Mamdani Based Fuzzy Inference System and Neuro-fuzzy based system have been evaluated for the modeling of maintenance severity or impact of fault severity. The results are recorded in terms of Accuracy, Mean Absolute Error (MAE) and Root Mean Squared Error (RMSE). The results show that Neuro-fuzzy based model provides relatively better prediction accuracy as compared to other models and hence, can be used for the maintenance severity prediction of the software.
Abstract: The remediation of water resources pollution in
developing countries requires the application of alternative
sustainable cheaper and efficient end-of-pipe wastewater treatment
technologies. The feasibility of use of South African cheap and
abundant pine tree (Pinus patula) sawdust for development of lowcost
AC of comparable quality to expensive commercial ACs in the
abatement of water pollution was investigated. AC was developed at
optimized two-stage N2-superheated steam activation conditions in a
fixed bed reactor, and characterized for proximate and ultimate
properties, N2-BET surface area, pore size distribution, SEM, pHPZC
and FTIR. The sawdust pyrolysis activation energy was evaluated by
TGA. Results indicated that the chars prepared at 800oC and 2hrs
were suitable for development of better quality AC at 800oC and 47%
burn-off having BET surface area (1086m2/g), micropore volume
(0.26cm3/g), and mesopore volume (0.43cm3/g) comparable to
expensive commercial ACs, and suitable for water contaminants
removal. The developed AC showed basic surface functionality at
pHPZC at 10.3, and a phenol adsorption capacity that was higher than
that of commercial Norit (RO 0.8) AC. Thus, it is feasible to develop
better quality low-cost AC from (Pinus patula) sawdust using twostage
N2-steam activation in fixed-bed reactor.
Abstract: Problem Statement:Rapid technological developments of the 21st century have advanced our daily lives in various ways. Particularly in education, students frequently utilize technological resources to aid their homework and to access information. listen to radio or watch television (26.9 %) and e-mails (34.2 %) [26]. Not surprisingly, the increase in the use of technologies also resulted in an increase in the use of e-mail, instant messaging, chat rooms, mobile phones, mobile phone cameras and web sites by adolescents to bully peers. As cyber bullying occurs in the cyber space, lesser access to technologies would mean lesser cyber-harm. Therefore, the frequency of technology use is a significant predictor of cyber bullying and cyber victims. Cyber bullies try to harm the victim using various media. These tools include sending derogatory texts via mobile phones, sending threatening e-mails and forwarding confidential emails to everyone on the contacts list. Another way of cyber bullying is to set up a humiliating website and invite others to post comments. In other words, cyber bullies use e-mail, chat rooms, instant messaging, pagers, mobile texts and online voting tools to humiliate and frighten others and to create a sense of helplessness. No matter what type of bullying it is, it negatively affects its victims. Children who bully exhibit more emotional inhibition and attribute themselves more negative self-statements compared to non-bullies. Students whose families are not sympathetic and who receive lower emotional support are more prone to bully their peers. Bullies have authoritarian families and do not get along well with them. The family is the place where the children-s physical, social and psychological needs are satisfied and where their personalities develop. As the use of the internet became prevalent so did parents- restrictions on their children-s internet use. However, parents are unaware of the real harm. Studies that explain the relationship between parental attitudes and cyber bullying are scarce in literature. Thus, this study aims to investigate the relationship between cyber bullying and parental attitudes in the primary school. Purpose of Study: This study aimed to investigate the relationship between cyber bullying and parental attitudes. A second aim was to determine whether parental attitudes could predict cyber bullying and if so which variables could predict it significantly. Methods:The study had a cross-sectional and relational survey model. A demographics information form, questions about cyber bullying and a Parental Attitudes Inventory were conducted with a total of 346 students (189 females and 157 males) registered at various primary schools. Data was analysed by multiple regression analysis using the software package SPSS 16.
Abstract: This study presents an exact general solution for
steady-state conductive heat transfer in cylindrical composite
laminates. Appropriate Fourier transformation has been obtained
using Sturm-Liouville theorem. Series coefficients are achieved by
solving a set of equations that related to thermal boundary conditions
at inner and outer of the cylinder, also related to temperature
continuity and heat flux continuity between each layer. The solution
of this set of equations are obtained using Thomas algorithm. In this
paper, the effect of fibers- angle on temperature distribution of
composite laminate is investigated under general boundary
conditions. Here, we show that the temperature distribution for any
composite laminates is between temperature distribution for
laminates with θ = 0° and θ = 90° .
Abstract: Schema matching plays a key role in many different
applications, such as schema integration, data integration, data
warehousing, data transformation, E-commerce, peer-to-peer data
management, ontology matching and integration, semantic Web,
semantic query processing, etc. Manual matching is expensive and
error-prone, so it is therefore important to develop techniques to
automate the schema matching process. In this paper, we present a
solution for XML schema automated matching problem which
produces semantic mappings between corresponding schema
elements of given source and target schemas. This solution
contributed in solving more comprehensively and efficiently XML
schema automated matching problem. Our solution based on
combining linguistic similarity, data type compatibility and structural
similarity of XML schema elements. After describing our solution,
we present experimental results that demonstrate the effectiveness of
this approach.