Abstract: A methodology based on wavelets is proposed for the automatic location and delimitation of defects in limestone plates. Natural defects include dark colored spots, crystal zones trapped in the stone, areas of abnormal contrast colors, cracks or fracture lines, and fossil patterns. Although some of these may or may not be considered as defects according to the intended use of the plate, the goal is to pair each stone with a map of defects that can be overlaid on a computer display. These layers of defects constitute a database that will allow the preliminary selection of matching tiles of a particular variety, with specific dimensions, for a requirement of N square meters, to be done on a desktop computer rather than by a two-hour search in the storage park, with human operators manipulating stone plates as large as 3 m x 2 m, weighing about one ton. Accident risks and work times are reduced, with a consequent increase in productivity. The base for the algorithm is wavelet decomposition executed in two instances of the original image, to detect both hypotheses – dark and clear defects. The existence and/or size of these defects are the gauge to classify the quality grade of the stone products. The tuning of parameters that are possible in the framework of the wavelets corresponds to different levels of accuracy in the drawing of the contours and selection of the defects size, which allows for the use of the map of defects to cut a selected stone into tiles with minimum waste, according the dimension of defects allowed.
Abstract: TRACE is developed by U.S. NRC for the nuclear
power plants (NPPs) safety analysis. We focus on the establishment
and application of TRACE/FRAPTRAN/SNAP models for Chinshan
NPP (BWR/4) spent fuel pool in this research. The geometry is 12.17
m × 7.87 m × 11.61 m for the spent fuel pool. In this study, there are
three TRACE/SNAP models: one-channel, two-channel, and
multi-channel TRACE/SNAP model. Additionally, the cooling system
failure of the spent fuel pool was simulated and analyzed by using the
above models. According to the analysis results, the peak cladding
temperature response was more accurate in the multi-channel
TRACE/SNAP model. The results depicted that the uncovered of the
fuels occurred at 2.7 day after the cooling system failed. In order to
estimate the detailed fuel rods performance, FRAPTRAN code was
used in this research. According to the results of FRAPTRAN, the
highest cladding temperature located on the node 21 of the fuel rod
(the highest node at node 23) and the cladding burst roughly after 3.7
day.
Abstract: Similar to economies in many countries; family-owned enterprises have a significant role in the development of Turkish economy. Although they have a large share in economic terms, their lifetime is limited to working life of their founders. Failure in achieving their sustainability deeply affects not only these businesses but also the economy. Therefore, two basic elements of family owned enterprises, family and organizational culture and especially entrepreneurship culture, should be examined closely. The degree of effectiveness of parents in instilling their children with entrepreneurship culture and their effects on children's profession choices are examined through face-to-face surveys with the managers owning family businesses randomly chosen among family-owned enterprises registered in Konya Chamber of Industry, which are active in specific sectors and which had different generations in their management.
Abstract: This research investigates the impact of Brand Loyalty on the product performance and the factors those are considered more important in brand reputation. Variables selected for this research are Brand quality, Brand Equity, Brand Reputation to explore the impact of these variables on Product performance. For this purpose, primary research has been conducted. The questionnaire survey for this research study was administered among the population mainly at the shopping malls. For this research study, a sample size of 250 respondents has been taken into consideration. Customers from the shopping malls and university students constitute the sample for this research study using random sampling (non-probabilistic) used as a sampling technique for conducting the research survey. According to the results obtained from the collected data, it is interpreted that product performance shares a direct relationship with brand quality, brand quality, and brand reputation. Result also showed that brand quality and brand equity has a significant effect on product performance, whereas brand reputation has an insignificant effect on product performance.
Abstract: The purpose of this article is to find a method
of comparing designs for ordinal regression models using
quantile dispersion graphs in the presence of linear predictor
misspecification. The true relationship between response variable
and the corresponding control variables are usually unknown.
Experimenter assumes certain form of the linear predictor of the
ordinal regression models. The assumed form of the linear predictor
may not be correct always. Thus, the maximum likelihood estimates
(MLE) of the unknown parameters of the model may be biased due to
misspecification of the linear predictor. In this article, the uncertainty
in the linear predictor is represented by an unknown function. An
algorithm is provided to estimate the unknown function at the
design points where observations are available. The unknown function
is estimated at all points in the design region using multivariate
parametric kriging. The comparison of the designs are based on
a scalar valued function of the mean squared error of prediction
(MSEP) matrix, which incorporates both variance and bias of the
prediction caused by the misspecification in the linear predictor. The
designs are compared using quantile dispersion graphs approach.
The graphs also visually depict the robustness of the designs on the
changes in the parameter values. Numerical examples are presented
to illustrate the proposed methodology.
Abstract: Optical Intersatellite Links (OISLs) are wireless communications using optical signals to interconnect satellites. It is expected to be the next generation wireless communication technology according to its inherent characteristics like: an increased bandwidth, a high data rate, a data transmission security, an immunity to interference, and an unregulated spectrum etc. Optical space links are the best choice for the classical communication schemes due to its distinctive properties; high frequency, small antenna diameter and lowest transmitted power, which are critical factors to define a space communication. This paper discusses the development of free space technology and analyses the parameters and factors to establish a reliable intersatellite links using an optical signal to exchange data between satellites.
Abstract: Patient satisfaction represents a crucial aspect in the evaluation of health care services. Preoperative teaching provides the patient with pertinent information concerning the surgical process and the intended surgical procedure as well as anticipated patient behavior (anxiety, fear), expected sensation, and the probable outcomes. Although patient education is part of Accreditation protocols, it is not uniform at most places. The aim of this study was to try to assess the benefit of preoperative patient education on selected post-operative outcome parameters; mainly, post-operative pain scores, requirement of additional analgesia, return to activity of daily living and overall patient satisfaction, and try to standardize few education protocols. Dependent variables were measured before and after the treatment on a study population of 302 volunteers. Educational intervention was provided by the Investigator in the preoperative period to the study group through personal counseling. An information booklet contained detailed information was also provided. Statistical Analysis was done using Chi square test, Mann Whitney u test and Fischer Exact Test on a total of 302 subjects. P value
Abstract: Study of the effects of climate change on Norway
Spruce (Picea abies) forests has mainly focused on the diversity of
tree species diversity of tree species as a result of the ability of
species to tolerate temperature and moisture changes as well as some
effects of disturbance regime changes. The tree species’ diversity
changes in spruce forests due to climate change have been analyzed
via gap model. Forest gap model is a dynamic model for calculation
basic characteristics of individual forest trees. Input ecological data
for model calculations have been taken from the permanent research
plots located in primeval forests in mountainous regions in Slovakia.
The results of regional scenarios of the climatic change for the
territory of Slovakia have been used, from which the values are
according to the CGCM3.1 (global) model, KNMI and MPI
(regional) models. Model results for conditions of the climate change
scenarios suggest a shift of the upper forest limit to the region of the
present subalpine zone, in supramontane zone. N. spruce
representation will decrease at the expense of beech and precious
broadleaved species (Acer sp., Sorbus sp., Fraxinus sp.). The most
significant tree species diversity changes have been identified for the
upper tree line and current belt of dwarf pine (Pinus mugo)
occurrence. The results have been also discussed in relation to most
important disturbances (wind storms, snow and ice storms) and
phenological changes which consequences are little known. Special
discussion is focused on biomass production changes in relation to
carbon storage diversity in different carbon pools.
Abstract: This paper takes a philosophical view as axiom, and
reveals the relationship between information theory and Natural
Intelligence and Artificial Intelligence under real world conditions.
This paper also derives the relationship between natural intelligence
and nature. According to communication principle of information
theory, Natural Intelligence can be divided into real part and virtual
part. Based on information theory principle that Information does not
increase, the restriction mechanism of Natural Intelligence creativity is
conducted. The restriction mechanism of creativity reveals the limit of
natural intelligence and artificial intelligence. The paper provides a
new angle to observe natural intelligence and artificial intelligence.
Abstract: This paper presents the trajectory tracking control of a
spatial redundant hybrid manipulator. This manipulator consists of
two parallel manipulators which are a variable geometry truss (VGT)
module. In fact, each VGT module with 3-degress of freedom (DOF)
is a planar parallel manipulator and their operational planes of these
VGT modules are arranged to be orthogonal to each other. Also, the
manipulator contains a twist motion part attached to the top of the
second VGT module to supply the missing orientation of the endeffector.
These three modules constitute totally 7-DOF hybrid
(parallel-parallel) redundant spatial manipulator. The forward
kinematics equations of this manipulator are obtained, then,
according to these equations, the inverse kinematics is solved based
on an optimization with the joint limit avoidance. The dynamic
equations are formed by using virtual work method. In order to test
the performance of the redundant manipulator and the controllers
presented, two different desired trajectories are followed by using the
computed force control method and a switching control method. The
switching control method is combined with the computed force
control method and genetic algorithm. In the switching control
method, the genetic algorithm is only used for fine tuning in the
compensation of the trajectory tracking errors.
Abstract: Classification is an important data mining technique
and could be used as data filtering in artificial intelligence. The
broad application of classification for all kind of data leads to be
used in nearly every field of our modern life. Classification helps us
to put together different items according to the feature items decided
as interesting and useful. In this paper, we compare two
classification methods Naïve Bayes and ADTree use to detect spam
e-mail. This choice is motivated by the fact that Naive Bayes
algorithm is based on probability calculus while ADTree algorithm is
based on decision tree. The parameter settings of the above
classifiers use the maximization of true positive rate and
minimization of false positive rate. The experiment results present
classification accuracy and cost analysis in view of optimal classifier
choice for Spam Detection. It is point out the number of attributes to
obtain a tradeoff between number of them and the classification
accuracy.
Abstract: Waste polyethylene (PE) is classified as waste low
density polyethylene (LDPE) and waste high density polyethylene
(HDPE) according to their densities. Pyrolysis of plastic waste may
have an important role in dealing with the enormous amounts of
plastic waste produced all over the world, by decreasing their
negative impact on the environment. This waste may be converted
into economically valuable hydrocarbons, which can be used both as
fuels and as feed stock in the petrochemical industry. End product
yields and properties depend on the plastic waste composition.
Pyrolytic biochar is one of the most important products of waste
plastics pyrolysis. In this study, HDPE and LDPE plastic wastes were
co-pyrolyzed together with waste olive pomace. Pyrolysis runs were
performed at temperature 700°C with heating rates of 5°C/min.
Higher pyrolysis oil and gas yields were observed by the using waste
olive pomace. The biochar yields of HDPE- olive pomace and LDPEolive
pomace were 6.37% and 7.26% respectively for 50% olive
pomace doses. The calorific value of HDPE-olive pomace and
LDPE-olive pomace of pyrolysis oil were 8350 and 8495 kCal.
Abstract: In an economic crisis such as the one that shook (and still shake) Europe, one does not question the importance of the measures that encourage the hiring and integration of young people into the labour market. In the mentioned context, enterprises tend to reduce the cost of labour and to seek flexible contracting instruments. The professional internships allow innovation and creativity at low cost, because, as they are not labour contracts, the enterprises do not have to respect the minimum standards related to wages, working time duration and so on. In Portugal, we observe a widespread existence of training contracts in which the trainee worked several hours without salary or was paid below the legally prescribed for the function and the work period. For this reason, under the tripartite agreement for a new system of regulation of labour relations, employment policies and social protection, between the Government and the social partners, in June 2008, foresaw a prohibition of professional internships unpaid and the legal regulation of the mandatory internships for access to an activity. The first Act about private internship contracts, i.e., internships without public funding was embodied in the Decree-Law N. 66/2011, of 1st June. This work is dedicated to the study of the legal regime of the internship contract in Portugal, by analysing the problems brought by the new set of rules and especially those which remains unresolved. In fact, we can conclude that the number of situations covered by the Act is much lower than what was expected, because of the exclusion of the mandatory internship for access to a profession when the activity is developed autonomously. Since the majority of the activities can be developed both autonomously or subordinated, it is quite easy to out of the Act requirements and, so, out of the protection that it confers to the intern. In order to complete this study, we considered not only the mentioned legal Act, but also the few doctrine and jurisprudence about the theme.
Abstract: With the increasing complexity of cyberspace security, the cyber-attack attribution has become an important challenge of the security protection systems. The difficult points of cyber-attack attribution were forced on the problems of huge data handling and key data missing. According to this situation, this paper presented a reasoning method of cyber-attack attribution based on threat intelligence. The method utilizes the intrusion kill chain model and Bayesian network to build attack chain and evidence chain of cyber-attack on threat intelligence platform through data calculation, analysis and reasoning. Then, we used a number of cyber-attack events which we have observed and analyzed to test the reasoning method and demo system, the result of testing indicates that the reasoning method can provide certain help in cyber-attack attribution.
Abstract: An approach to compute optimum seismic design parameters is presented. It is based on the optimization of the expected present value of the total cost, which includes the initial cost of structures as well as the cost due to earthquakes. Different types of seismicity models are considered, including one for characteristic earthquakes. Uncertainties are included in some variables to observe the influence on optimum values. Optimum seismic design coefficients are computed for three different structural types representing high, medium and low rise buildings, located near and far from the seismic sources. Ordinary and important structures are considered in the analysis. The results of optimum values show an important influence of seismicity models as well as of uncertainties on the variables.
Abstract: In connected vehicle systems where wireless communication is available among the involved vehicles and intersection controllers, it is possible to design an intersection coordination strategy that leads the connected and automated vehicles (CAVs) travel through the road intersections without the conventional traffic light control. In this paper, we present a distributed coordination strategy for the CAVs at multiple interconnected intersections that aims at improving system fuel efficiency and system mobility. We present a distributed control solution where in the higher level, the intersection controllers calculate the road desired average velocity and optimally assign reference velocities of each vehicle. In the lower level, every vehicle is considered to use model predictive control (MPC) to track their reference velocity obtained from the higher level controller. The proposed method has been implemented on a simulation-based case with two-interconnected intersection network. Additionally, the effects of mixed vehicle types on the coordination strategy has been explored. Simulation results indicate the improvement on vehicle fuel efficiency and traffic mobility of the proposed method.
Abstract: As transition to widespread use of IPv6 addresses has gained momentum, it has been shown to be vulnerable to certain security attacks such as those targeting Neighbor Discovery Protocol (NDP) which provides the address resolution functionality in IPv6. To protect this protocol, Secure Neighbor Discovery (SEND) is introduced. This protocol uses Cryptographically Generated Address (CGA) and asymmetric cryptography as a defense against threats on integrity and identity of NDP. Although SEND protects NDP against attacks, it is computationally intensive due to Hash2 condition in CGA. To improve the CGA computation speed, we parallelized CGA generation process and used the available resources in a trusted network. Furthermore, we focused on the influence of the existence of malicious nodes on the overall load of un-malicious ones in the network. According to the evaluation results, malicious nodes have adverse impacts on the average CGA generation time and on the average number of tries. We utilized a Trust Management that is capable of detecting and isolating the malicious node to remove possible incentives for malicious behavior. We have demonstrated the effectiveness of the Trust Management System in detecting the malicious nodes and hence improving the overall system performance.
Abstract: A uniquely restricted matching is defined to be a
matching M whose matched vertices induces a sub-graph which has
only one perfect matching. In this paper, we make progress on the
open question of the status of this problem on interval graphs (graphs
obtained as the intersection graph of intervals on a line). We give
an algorithm to compute maximum cardinality uniquely restricted
matchings on certain sub-classes of interval graphs. We consider two
sub-classes of interval graphs, the former contained in the latter, and
give O(|E|^2) time algorithms for both of them. It is to be noted that
both sub-classes are incomparable to proper interval graphs (graphs
obtained as the intersection graph of intervals in which no interval
completely contains another interval), on which the problem can be
solved in polynomial time.
Abstract: In the study, we present a conceptual framework for developing a scheduling system that can generate self-explanatory and easy-understanding schedules. To this end, a user interface is conceived to help planners record factors that are considered crucial in scheduling, as well as internal and external sources relating to such factors. A hybrid approach combining machine learning and constraint programming is developed to generate schedules and the corresponding factors, and accordingly display them on the user interface. Effects of the proposed system on scheduling are discussed, and it is expected that scheduling efficiency and system understandability will be improved, compared with previous scheduling systems.
Abstract: At Istituto Nazionale di Fisica Nucleare – Laboratorio Nazionale del Sud (INFN-LNS), a broad experience in the design, construction and commissioning of ECR and microwave ion sources is available. The AISHa ion source has been designed by taking into account the typical requirements of hospital-based facilities, where the minimization of the mean time between failures (MTBF) is a key point together with the maintenance operations, which should be fast and easy. It is intended to be a multipurpose device, operating at 18 GHz, in order to achieve higher plasma densities. It should provide enough versatility for future needs of the hadron therapy, including the ability to run at larger microwave power to produce different species and highly charged ion beams. The source is potentially interesting for any hadron therapy facility using heavy ions. In this paper, we analyzed the dimensional test and electrical test about an innovative solution for the containment chamber that allows us to solve our isolation and structural problems.