Abstract: Horizontal wells are proven to be better producers
because they can be extended for a long distance in the pay zone.
Engineers have the technical means to forecast the well productivity
for a given horizontal length. However, experiences have shown that
the actual production rate is often significantly less than that of
forecasted. It is a difficult task, if not impossible to identify the real
reason why a horizontal well is not producing what was forecasted.
Often the source of problem lies in the drilling of horizontal section
such as permeability reduction in the pay zone due to mud invasion
or snaky well patterns created during drilling. Although drillers aim
to drill a constant inclination hole in the pay zone, the more frequent
outcome is a sinusoidal wellbore trajectory. The two factors, which
play an important role in wellbore tortuosity, are the inclination and
side force at bit. A constant inclination horizontal well can only be
drilled if the bit face is maintained perpendicular to longitudinal axis
of bottom hole assembly (BHA) while keeping the side force nil at
the bit. This approach assumes that there exists no formation force at
bit. Hence, an appropriate BHA can be designed if bit side force and
bit tilt are determined accurately. The Artificial Neural Network
(ANN) is superior to existing analytical techniques. In this study, the
neural networks have been employed as a general approximation tool
for estimation of the bit side forces. A number of samples are
analyzed with ANN for parameters of bit side force and the results
are compared with exact analysis. Back Propagation Neural network
(BPN) is used to approximation of bit side forces. Resultant low
relative error value of the test indicates the usability of the BPN in
this area.
Abstract: The paper deals with results of a project “Interoperability Workplaces to Support Teaching of Security Management in a Computer Network". This project is focused on the perspectives and possibilities of "new approaches" to education, training and crisis communication of rescue teams in the Czech Republic. It means that common technologies considering new perspectives are used to educate selected members of crisis management. The main part concentrates on possibilities of application of new technology and computer-aided tools to education and training of Integrated Rescue System teams.This project uses the COST principle for the creation of specialized centers and for all communication between these workplaces.
Abstract: Low-carbon economy means the energy conservation and emission reduction. How to measure and evaluate the regional low-carbon economy is an important problem which should be solved immediately. This paper proposed the eco-efficiency ratio based on the ecological efficiency to evaluate the current situation of the low-carbon economy in Jiangsu province and to analyze the efficiency of the low-carbon economy in Jiangsu and other provinces, compared both advantages and disadvantages. And then this paper put forward some advices for the government to formulate the correct development policy of low-carbon economy, to improve the technology innovation capacity and the efficiency of resource allocation.
Abstract: Many studies have applied the Theory of Planned
Behavior (TPB) in predicting health behaviors among unique
populations. However, a new paradigm is emerging where focus is
now directed to modification and expansion of the TPB model rather
than utilization of the traditional theory. This review proposes new
models modified from the Theory of Planned Behavior and suggest
an appropriate study design that can be used to test the models within
physical activity and dietary practice domains among Type 2
diabetics in Kenya. The review was conducted by means of literature
search in the field of nutrition behavior, health psychology and
mixed methods using predetermined key words. The results identify
pre-intention and post intention gaps within the TPB model that need
to be filled. Additional psychosocial factors are proposed to be
included in the TPB model to generate new models and the efficacy
of these models tested using mixed methods design.
Abstract: Naive Bayes Nearest Neighbor (NBNN) and its variants, i,e., local NBNN and the NBNN kernels, are local feature-based classifiers that have achieved impressive performance in image classification. By exploiting instance-to-class (I2C) distances (instance means image/video in image/video classification), they avoid quantization errors of local image descriptors in the bag of words (BoW) model. However, the performances of NBNN, local NBNN and the NBNN kernels have not been validated on video analysis. In this paper, we introduce these three classifiers into human action recognition and conduct comprehensive experiments on the benchmark KTH and the realistic HMDB datasets. The results shows that those I2C based classifiers consistently outperform the SVM classifier with the BoW model.
Abstract: Cellular automata have been used for design of cryptosystems. Recently some secret sharing schemes based on linear memory cellular automata have been introduced which are used for both text and image. In this paper, we illustrate that these secret sharing schemes are vulnerable to dishonest participants- collusion. We propose a cheating model for the secret sharing schemes based on linear memory cellular automata. For this purpose we present a novel uniform model for representation of all secret sharing schemes based on cellular automata. Participants can cheat by means of sending bogus shares or bogus transition rules. Cheaters can cooperate to corrupt a shared secret and compute a cheating value added to it. Honest participants are not aware of cheating and suppose the incorrect secret as the valid one. We prove that cheaters can recover valid secret by removing the cheating value form the corrupted secret. We provide methods of calculating the cheating value.
Abstract: The intention of this lessons is to assess the probability
of optical coherence tomography (OCT) for biometric recognition.
The OCT is the foundation on an optical signal acquisition and
processing method and has the micrometer-resolution. In this study,
we used the porcine skin for verifying the abovementioned means. The
porcine tissue was sound acknowledged for structural and
immunohistochemical similarity with human skin, so it could be
suitable for pre-clinical trial as investigational specimen. For this
reason, it was tattooed by the tattoo machine with the tattoo-pigment.
We detected the pattern of the tattooed skin by the OCT according to
needle speed. The result was consistent with the histology images.
This result showed that the OCT was effective to examine the tattooed
skin section noninvasively. It might be available to identify
morphological changes inside the skin.
Abstract: A procedural-animation-based approach which rapidly
synthesize the adaptive locomotion for quadruped characters that they
can walk or run in any directions on an uneven terrain within a
dynamic environment was proposed. We devise practical motion
models of the quadruped animals for adapting to a varied terrain in a
real-time manner. While synthesizing locomotion, we choose the
corresponding motion models by means of the footstep prediction of
the current state in the dynamic environment, adjust the key-frames of
the motion models relying on the terrain-s attributes, calculate the
collision-free legs- trajectories, and interpolate the key-frames
according to the legs- trajectories. Finally, we apply dynamic time
warping to each part of motion for seamlessly concatenating all desired
transition motions to complete the whole locomotion. We reduce the
time cost of producing the locomotion and takes virtual characters to
fit in with dynamic environments no matter when the environments are
changed by users.
Abstract: This survey highlights a number of important issues
which relate to the needs to counseling for distance learners studying
at the School of Distance Education in University science Malaysia
(DEUSM) according to their gender. Data were obtained by selfreport
questionnaire that had been developed by the researchers in
counseling and educational psychology and interviews were take
place. 116 voluntary respondents complete the Questionnaire and
returned it back during new student-s registration week.64% of the
respondents were female and 52% were males that means
55%ofthem were females and 45% were males. The data was
analyzed to find out the frequencies of respondents agreements of the
items. The average of the female was 18 and the average of the male
was 19.6 by using t- test there is no significant values between the
genders. The findings show that respondents have needs for
counseling. (22) Significant needs for mails (DEUSM) the highest
was their families complain about the amount of time they spend at
work. (11) Significant needs for females the highest was they
convinced themselves that they only need 4 to 5 hours of sleep per
night.
Abstract: This paper describes a paradigmatic approach to develop architecture of secure systems by describing the requirements from four different points of view: that of the owner, the administrator, the user, and the network. Deriving requirements and developing architecture implies the joint elicitation and describing the problem and the structure of the solution. The view points proposed in this paper are those we consider as requirements towards their contributions as major parties in the design, implementation, usage and maintenance of secure systems. The dramatic growth of the technology of Internet and the applications deployed in World Wide Web have lead to the situation where the security has become a very important concern in the development of secure systems. Many security approaches are currently being used in organizations. In spite of the widespread use of many different security solutions, the security remains a problem. It is argued that the approach that is described in this paper for the development of secure architecture is practical by all means. The models representing these multiple points of view are termed the requirements model (views of owner and administrator) and the operations model (views of user and network). In this paper, this multiple view paradigm is explained by first describing the specific requirements and or characteristics of secure systems (particularly in the domain of networks) and the secure architecture / system development methodology.
Abstract: In this study, a network quality of service (QoS)
evaluation system was proposed. The system used a combination of
fuzzy C-means (FCM) and regression model to analyse and assess the
QoS in a simulated network. Network QoS parameters of multimedia
applications were intelligently analysed by FCM clustering
algorithm. The QoS parameters for each FCM cluster centre were
then inputted to a regression model in order to quantify the overall
QoS. The proposed QoS evaluation system provided valuable
information about the network-s QoS patterns and based on this
information, the overall network-s QoS was effectively quantified.
Abstract: Fuzzy Cognitive Maps (FCMs) have successfully
been applied in numerous domains to show relations between
essential components. In some FCM, there are more nodes, which
related to each other and more nodes means more complex in system
behaviors and analysis. In this paper, a novel learning method used to
construct FCMs based on historical data and by using data mining
and DEMATEL method, a new method defined to reduce nodes
number. This method cluster nodes in FCM based on their cause and
effect behaviors.
Abstract: The gel-supported precipitation (GSP) process can be
used to make spherical particles (spherules) of nuclear fuel,
particularly for very high temperature reactors (VHTR) and even for
implementing the process called SPHEREPAC. In these different
cases, the main characteristics are the sphericity of the particles to be
manufactured and the control over their grain size. Nonetheless,
depending on the specifications defined for these spherical particles,
the GSP process has intrinsic limits, particularly when fabricating
very small particles. This paper describes the use of secondary
fragmentation (water, water/PVA and uranyl nitrate) on solid
surfaces under varying temperature and vibration conditions to assess
the relevance of using this new technique to manufacture very small
spherical particles by means of a modified GSP process. The
fragmentation mechanisms are monitored and analysed, before the
trends for its subsequent optimised application are described.
Abstract: Bentonitic material from South Aswan, Egypt was evaluated in terms of mineral-ogy and chemical composition as bleaching clay in refining of transformer oil before and after acid activation and thermal treatment followed by acid leaching using HCl and H2SO4 for different contact times. Structural modification and refining power of bento-nite were investigated during modification by means of X-ray diffraction and infrared spectroscopy. The results revealed that the activated bentonite could be used for refining of transformer oil. The oil parameters such as; dielectric strength, viscosity and flash point had been improved. The dielectric breakdown strength of used oil increased from 29 kV for used oil treated with unactivated bentonite to 74 kV after treatment with activated bentonite. Kinematic Viscosity changed from 19 to 11 mm2 /s after treatment with activated bentonite. However, flash point achieved 149 ºC.
Abstract: Currently is characterized production engineering
together with the integration of industrial automation and robotics
such very quick view of to manufacture the products. The production
range is continuously changing, expanding and producers have to be
flexible in this regard. It means that need to offer production
possibilities, which can respond to the quick change. Engineering
product development is focused on supporting CAD software, such
systems are mainly used for product design. That manufacturers are
competitive, it should be kept procured machines made available
capable of responding to output flexibility. In response to that
problem is the development of flexible manufacturing systems,
consisting of various automated systems. The integration of flexible
manufacturing systems and subunits together with product design and
of engineering is a possible solution for this issue. Integration is
possible through the implementation of CIM systems. Such a solution
and finding a hyphen between CAD and procurement system ICIM
3000 from Festo Co. is engaged in the research project and this
contribution. This can be designed the products in CAD systems and
watch the manufacturing process from order to shipping by the
development of methods and processes of integration, This can be
modeled in CAD systems products and watch the manufacturing
process from order to shipping to develop methods and processes of
integration, which will improve support for product design
parameters by monitoring of the production process, by creating of
programs for production using the CAD and therefore accelerates the
a total of process from design to implementation.
Abstract: The interaction of tunneling or mining with
groundwater has become a very relevant problem not only due to the
need to guarantee the safety of workers and to assure the efficiency of
the tunnel drainage systems, but also to safeguard water resources
from impoverishment and pollution risk. Therefore it is very
important to forecast the drainage processes (i.e., the evaluation of
drained discharge and drawdown caused by the excavation). The aim
of this study was to know better the system and to quantify the flow
drained from the Fontane mines, located in Val Germanasca (Turin,
Italy). This allowed to understand the hydrogeological local changes
in time. The work has therefore been structured as follows: the
reconstruction of the conceptual model with the geological,
hydrogeological and geological-structural study; the calculation of
the tunnel inflows (through the use of structural methods) and the
comparison with the measured flow rates; the water balance at the
basin scale. In this way it was possible to understand what are the
relationships between rainfall, groundwater level variations and the
effect of the presence of tunnels as a means of draining water.
Subsequently, it the effects produced by the excavation of the mining
tunnels was quantified, through numerical modeling. In particular,
the modeling made it possible to observe the drawdown variation as a
function of number, excavation depth and different mines linings.
Abstract: Color image segmentation can be considered as a
cluster procedure in feature space. k-means and its adaptive
version, i.e. competitive learning approach are powerful tools
for data clustering. But k-means and competitive learning suffer
from several drawbacks such as dead-unit problem and need to
pre-specify number of cluster. In this paper, we will explore to
use competitive and cooperative learning approach to perform
color image segmentation. In competitive and cooperative
learning approach, seed points not only compete each other, but
also the winner will dynamically select several nearest
competitors to form a cooperative team to adapt to the input
together, finally it can automatically select the correct number
of cluster and avoid the dead-units problem. Experimental
results show that CCL can obtain better segmentation result.
Abstract: The Neuro-Fuzzy hybridization scheme has become
of research interest in pattern classification over the past decade. The
present paper proposes a novel Modified Adaptive Fuzzy Inference
Engine (MAFIE) for pattern classification. A modified Apriori
algorithm technique is utilized to reduce a minimal set of decision
rules based on input output data sets. A TSK type fuzzy inference
system is constructed by the automatic generation of membership
functions and rules by the fuzzy c-means clustering and Apriori
algorithm technique, respectively. The generated adaptive fuzzy
inference engine is adjusted by the least-squares fit and a conjugate
gradient descent algorithm towards better performance with a
minimal set of rules. The proposed MAFIE is able to reduce the
number of rules which increases exponentially when more input
variables are involved. The performance of the proposed MAFIE is
compared with other existing applications of pattern classification
schemes using Fisher-s Iris and Wisconsin breast cancer data sets and
shown to be very competitive.
Abstract: In this study, the adhesion of ice to solid substrates
with different surface properties is compared. Clear ice, similar to
atmospheric in-flight icing encounters, is accreted on the different
substrates under controlled conditions. The ice adhesion behavior is
investigated by means of a dynamic vibration testing technique with
an electromagnetic shaker initiating ice de-bonding in the interface
between the substrate and the ice. The results of the experiments
reveal that the affinity for ice accretion is significantly influenced by
the water contact angle of the respective sample.
Abstract: GSM has undoubtedly become the most widespread
cellular technology and has established itself as one of the most
promising technology in wireless communication. The next
generation of mobile telephones had also become more powerful and
innovative in a way that new services related to the user-s location
will arise. Other than the 911 requirements for emergency location
initiated by the Federal Communication Commission (FCC) of the
United States, GSM positioning can be highly integrated in cellular
communication technology for commercial use. However, GSM
positioning is facing many challenges. Issues like accuracy,
availability, reliability and suitable cost render the development and
implementation of GSM positioning a challenging task. In this paper,
we investigate the optimal mobile position tracking means. We
employ an innovative scheme by integrating the Kalman filter in the
localization process especially that it has great tracking
characteristics. When tracking in two dimensions, Kalman filter is
very powerful due to its reliable performance as it supports
estimation of past, present, and future states, even when performing
in unknown environments. We show that enhanced position tracking
results is achieved when implementing the Kalman filter for GSM
tracking.