Abstract: Bubble generation was observed using a high-speed
camera in subcooled flow boiling at low void fraction. Constant heat
flux was applied on one side of an upward rectangular channel to
make heated test channel. Water as a working fluid from high
subcooling to near saturation temperature was injected step by step to
investigate bubble behavior during void development. Experiments
were performed in two different pressures condition close to 2bar and
4bar. It was observed that in high subcooling when boiling was
commenced, bubble after nucleation departed its origin and slid
beside heated surface. In an observation window mean release
frequency of bubble fb,mean, nucleation site Ns and mean bubble
volume Vb,mean in each step of experiments were measured to
investigate wall vaporization rate. It was found that in proximity of
PNVG vaporization rate was increased significantly in compare with
condensation rate which remained in low value.
Abstract: Low-carbon economy means the energy conservation and emission reduction. How to measure and evaluate the regional low-carbon economy is an important problem which should be solved immediately. This paper proposed the eco-efficiency ratio based on the ecological efficiency to evaluate the current situation of the low-carbon economy in Jiangsu province and to analyze the efficiency of the low-carbon economy in Jiangsu and other provinces, compared both advantages and disadvantages. And then this paper put forward some advices for the government to formulate the correct development policy of low-carbon economy, to improve the technology innovation capacity and the efficiency of resource allocation.
Abstract: In this paper, we propose an approach for the classification of fingerprint databases. It is based on the fact that a fingerprint image is composed of regular texture regions that can be successfully represented by co-occurrence matrices. So, we first extract the features based on certain characteristics of the cooccurrence matrix and then we use these features to train a neural network for classifying fingerprints into four common classes. The obtained results compared with the existing approaches demonstrate the superior performance of our proposed approach.
Abstract: Hazard rate estimation is one of the important topics
in forecasting earthquake occurrence. Forecasting earthquake
occurrence is a part of the statistical seismology where the main
subject is the point process. Generally, earthquake hazard rate is
estimated based on the point process likelihood equation called the
Hazard Rate Likelihood of Point Process (HRLPP). In this research,
we have developed estimation method, that is hazard rate single
decrement HRSD. This method was adapted from estimation method
in actuarial studies. Here, one individual associated with an
earthquake with inter event time is exponentially distributed. The
information of epicenter and time of earthquake occurrence are used
to estimate hazard rate. At the end, a case study of earthquake hazard
rate will be given. Furthermore, we compare the hazard rate between
HRLPP and HRSD method.
Abstract: This paper deals with the project selection problem. Project selection problem is one of the problems arose firstly in the field of operations research following some production concepts from primary product mix problem. Afterward, introduction of managerial considerations into the project selection problem have emerged qualitative factors and criteria to be regarded as well as quantitative ones. To overcome both kinds of criteria, an analytic network process is developed in this paper enhanced with fuzzy sets theory to tackle the vagueness of experts- comments to evaluate the alternatives. Additionally, a modified version of Least-Square method through a non-linear programming model is augmented to the developed group decision making structure in order to elicit the final weights from comparison matrices. Finally, a case study is considered by which developed structure in this paper is validated. Moreover, a sensitivity analysis is performed to validate the response of the model with respect to the condition alteration.
Abstract: This paper discusses the development of wireless
structure control of an induction motor scalar drives. This was
realised up on the wireless WiFi networks. This strategy of control is
ensured by the use of Wireless ad hoc networks and a virtual network
interface based on VNC which is used to make possible to take the
remote control of a PC connected on a wireless Ethernet network.
Verification of the proposed strategy of control is provided by
experimental realistic tests on scalar controlled induction motor
drives. The experimental results of the implementations with their
analysis are detailed.
Abstract: The network of delivering commodities has been an important design problem in our daily lives and many transportation applications. The delivery performance is evaluated based on the system reliability of delivering commodities from a source node to a sink node in the network. The system reliability is thus maximized to find the optimal routing. However, the design problem is not simple because (1) each path segment has randomly distributed attributes; (2) there are multiple commodities that consume various path capacities; (3) the optimal routing must successfully complete the delivery process within the allowable time constraints. In this paper, we want to focus on the design optimization of the Multi-State Flow Network (MSFN) for multiple commodities. We propose an efficient approach to evaluate the system reliability in the MSFN with respect to randomly distributed path attributes and find the optimal routing subject to the allowable time constraints. The delivery rates, also known as delivery currents, of the path segments are evaluated and the minimal-current arcs are eliminated to reduce the complexity of the MSFN. Accordingly, the correct optimal routing is found and the worst-case reliability is evaluated. It has been shown that the reliability of the optimal routing is at least higher than worst-case measure. Two benchmark examples are utilized to demonstrate the proposed method. The comparisons between the original and the reduced networks show that the proposed method is very efficient.
Abstract: A bird strike can cause damage to stationary and
rotating aircraft engine parts, especially the engine fan. This paper
presents a bird strike simulated by blocking four stator blade
passages. It includes the numerical results of the unsteady lowfrequency
aerodynamic forces and the aeroelastic behaviour caused
by a non-symmetric upstream flow affecting the first two rotor blade
stages in the axial-compressor of a jet engine. The obtained results
show that disturbances in the engine inlet strongly influence the level
of unsteady forces acting on the rotor blades. With a partially
blocked inlet the whole spectrum of low-frequency harmonics is
observed. Such harmonics can lead to rotor blade damage. The lowfrequency
amplitudes are higher in the first stage rotor blades than in
the second stage. In both rotor blades stages flutter appeared as a
result of bird strike.
Abstract: This paper studies the pth moment exponential synchronization of a class of stochastic neural networks with mixed delays. Based on Lyapunov stability theory, by establishing a new integrodifferential inequality with mixed delays, several sufficient conditions have been derived to ensure the pth moment exponential stability for the error system. The criteria extend and improve some earlier results. One numerical example is presented to illustrate the validity of the main results.
Abstract: This paper presents the adaptation of the knowledge management model and intellectual capital measurement NOVA to the needs of work or research project must be developed when conducting a program of graduate-level master. Brackets are added in each of the blocks which is represented in the original model NOVA and which allows to represent those involved in each of these.
Abstract: Many studies have applied the Theory of Planned
Behavior (TPB) in predicting health behaviors among unique
populations. However, a new paradigm is emerging where focus is
now directed to modification and expansion of the TPB model rather
than utilization of the traditional theory. This review proposes new
models modified from the Theory of Planned Behavior and suggest
an appropriate study design that can be used to test the models within
physical activity and dietary practice domains among Type 2
diabetics in Kenya. The review was conducted by means of literature
search in the field of nutrition behavior, health psychology and
mixed methods using predetermined key words. The results identify
pre-intention and post intention gaps within the TPB model that need
to be filled. Additional psychosocial factors are proposed to be
included in the TPB model to generate new models and the efficacy
of these models tested using mixed methods design.
Abstract: Locality Sensitive Hashing (LSH) is one of the most
promising techniques for solving nearest neighbour search problem in
high dimensional space. Euclidean LSH is the most popular variation
of LSH that has been successfully applied in many multimedia
applications. However, the Euclidean LSH presents limitations that
affect structure and query performances. The main limitation of the
Euclidean LSH is the large memory consumption. In order to achieve
a good accuracy, a large number of hash tables is required. In this
paper, we propose a new hashing algorithm to overcome the storage
space problem and improve query time, while keeping a good
accuracy as similar to that achieved by the original Euclidean LSH.
The Experimental results on a real large-scale dataset show that the
proposed approach achieves good performances and consumes less
memory than the Euclidean LSH.
Abstract: Combining classifiers is a useful method for solving
complex problems in machine learning. The ECOC (Error Correcting
Output Codes) method has been widely used for designing combining
classifiers with an emphasis on the diversity of classifiers. In this
paper, in contrast to the standard ECOC approach in which individual
classifiers are chosen homogeneously, classifiers are selected
according to the complexity of the corresponding binary problem. We
use SATIMAGE database (containing 6 classes) for our experiments.
The recognition error rate in our proposed method is %10.37 which
indicates a considerable improvement in comparison with the
conventional ECOC and stack generalization methods.
Abstract: This paper covers various aspects of film piracy over the Internet. In order to successfully deal with this matter, it is needed to recognize motivational factors related to film piracy. Thus, this study discusses group factors that could motivate individuals to engage in pirate activities. Furthermore, the paper discusses the theoretical effect on box office revenues and explains it on a proposed scheme of solutions for decreasing revenues. The article also maps the scheme of incentive motivational anti-piracy campaigns. Moreover, the paper proposes the preliminary scheme for system dynamic modeling of the Internet film piracy. Scheme is developed as a model of behaviors, influences and relations among the elements pertaining to the Internet film piracy.
Abstract: Naive Bayes Nearest Neighbor (NBNN) and its variants, i,e., local NBNN and the NBNN kernels, are local feature-based classifiers that have achieved impressive performance in image classification. By exploiting instance-to-class (I2C) distances (instance means image/video in image/video classification), they avoid quantization errors of local image descriptors in the bag of words (BoW) model. However, the performances of NBNN, local NBNN and the NBNN kernels have not been validated on video analysis. In this paper, we introduce these three classifiers into human action recognition and conduct comprehensive experiments on the benchmark KTH and the realistic HMDB datasets. The results shows that those I2C based classifiers consistently outperform the SVM classifier with the BoW model.
Abstract: This paper proposes an efficient finite precision block floating point (BFP) treatment to the fixed coefficient finite impulse response (FIR) digital filter. The treatment includes effective implementation of all the three forms of the conventional FIR filters, namely, direct form, cascaded and par- allel, and a roundoff error analysis of them in the BFP format. An effective block formatting algorithm together with an adaptive scaling factor is pro- posed to make the realizations more simple from hardware view point. To this end, a generic relation between the tap weight vector length and the input block length is deduced. The implementation scheme also emphasises on a simple block exponent update technique to prevent overflow even during the block to block transition phase. The roundoff noise is also investigated along the analogous lines, taking into consideration these implementational issues. The simulation results show that the BFP roundoff errors depend on the sig- nal level almost in the same way as floating point roundoff noise, resulting in approximately constant signal to noise ratio over a relatively large dynamic range.
Abstract: Cellular automata have been used for design of cryptosystems. Recently some secret sharing schemes based on linear memory cellular automata have been introduced which are used for both text and image. In this paper, we illustrate that these secret sharing schemes are vulnerable to dishonest participants- collusion. We propose a cheating model for the secret sharing schemes based on linear memory cellular automata. For this purpose we present a novel uniform model for representation of all secret sharing schemes based on cellular automata. Participants can cheat by means of sending bogus shares or bogus transition rules. Cheaters can cooperate to corrupt a shared secret and compute a cheating value added to it. Honest participants are not aware of cheating and suppose the incorrect secret as the valid one. We prove that cheaters can recover valid secret by removing the cheating value form the corrupted secret. We provide methods of calculating the cheating value.
Abstract: Heavy metals have bad effects on environment and
soils and it can uptake by natural HAP .natural Hap is an inexpensive
material that uptake large amounts of various heavy metals like Zn
(II) .Natural HAP (N-HAP), extracted from bovine cortical bone ash,
is a good choice for substitution of commercial HAP. Several
experiments were done to investigate the sorption capacity of Zn (II)
to N-HAP in various particles sizes, temperatures, initial
concentrations, pH and reaction times. In this study, the sorption of
Zinc ions from a Zn solution onto HAP particles with sizes of 1537.6
nm and 47.6 nm at three initial pH values of 4.50, 6.00 and 7.50 was
studied. The results showed that better performance was obtained
through a 47.6 nm particle size and higher pH values. The
experimental data were analyzed using Langmuir, Freundlich, and
Arrhenius equations for equilibrium, kinetic and thermodynamic
studies. The analysis showed a maximum adsorption capacity of NHAP
as being 1.562 mmol/g at a pH of 7.5 and small particle size.
Kinetically, the prepared N-HAP is a feasible sorbent that retains Zn
(II) ions through a favorable and spontaneous sorption process.
Abstract: This paper discusses an artificial mind model and its
applications. The mind model is based on some theories which assert
that emotion is an important function in human decision making. An
artificial mind model with emotion is built, and the model is applied to
action selection of autonomous agents. In three examples, the agents
interact with humans and their environments. The examples show the
proposed model effectively work in both virtual agents and real robots.