Vapor Bubble Dynamics in Upward Subcooled Flow Boiling During Void Evolution

Bubble generation was observed using a high-speed camera in subcooled flow boiling at low void fraction. Constant heat flux was applied on one side of an upward rectangular channel to make heated test channel. Water as a working fluid from high subcooling to near saturation temperature was injected step by step to investigate bubble behavior during void development. Experiments were performed in two different pressures condition close to 2bar and 4bar. It was observed that in high subcooling when boiling was commenced, bubble after nucleation departed its origin and slid beside heated surface. In an observation window mean release frequency of bubble fb,mean, nucleation site Ns and mean bubble volume Vb,mean in each step of experiments were measured to investigate wall vaporization rate. It was found that in proximity of PNVG vaporization rate was increased significantly in compare with condensation rate which remained in low value.

The Evaluation of Low-Carbon Economy Jiangsu, China

Low-carbon economy means the energy conservation and emission reduction. How to measure and evaluate the regional low-carbon economy is an important problem which should be solved immediately. This paper proposed the eco-efficiency ratio based on the ecological efficiency to evaluate the current situation of the low-carbon economy in Jiangsu province and to analyze the efficiency of the low-carbon economy in Jiangsu and other provinces, compared both advantages and disadvantages. And then this paper put forward some advices for the government to formulate the correct development policy of low-carbon economy, to improve the technology innovation capacity and the efficiency of resource allocation.

A New Approach for the Fingerprint Classification Based On Gray-Level Co- Occurrence Matrix

In this paper, we propose an approach for the classification of fingerprint databases. It is based on the fact that a fingerprint image is composed of regular texture regions that can be successfully represented by co-occurrence matrices. So, we first extract the features based on certain characteristics of the cooccurrence matrix and then we use these features to train a neural network for classifying fingerprints into four common classes. The obtained results compared with the existing approaches demonstrate the superior performance of our proposed approach.

Hazard Rate Estimation of Temporal Point Process, Case Study: Earthquake Hazard Rate in Nusatenggara Region

Hazard rate estimation is one of the important topics in forecasting earthquake occurrence. Forecasting earthquake occurrence is a part of the statistical seismology where the main subject is the point process. Generally, earthquake hazard rate is estimated based on the point process likelihood equation called the Hazard Rate Likelihood of Point Process (HRLPP). In this research, we have developed estimation method, that is hazard rate single decrement HRSD. This method was adapted from estimation method in actuarial studies. Here, one individual associated with an earthquake with inter event time is exponentially distributed. The information of epicenter and time of earthquake occurrence are used to estimate hazard rate. At the end, a case study of earthquake hazard rate will be given. Furthermore, we compare the hazard rate between HRLPP and HRSD method.

Project Selection Using Fuzzy Group Analytic Network Process

This paper deals with the project selection problem. Project selection problem is one of the problems arose firstly in the field of operations research following some production concepts from primary product mix problem. Afterward, introduction of managerial considerations into the project selection problem have emerged qualitative factors and criteria to be regarded as well as quantitative ones. To overcome both kinds of criteria, an analytic network process is developed in this paper enhanced with fuzzy sets theory to tackle the vagueness of experts- comments to evaluate the alternatives. Additionally, a modified version of Least-Square method through a non-linear programming model is augmented to the developed group decision making structure in order to elicit the final weights from comparison matrices. Finally, a case study is considered by which developed structure in this paper is validated. Moreover, a sensitivity analysis is performed to validate the response of the model with respect to the condition alteration.

Wireless Control for an Induction Motor

This paper discusses the development of wireless structure control of an induction motor scalar drives. This was realised up on the wireless WiFi networks. This strategy of control is ensured by the use of Wireless ad hoc networks and a virtual network interface based on VNC which is used to make possible to take the remote control of a PC connected on a wireless Ethernet network. Verification of the proposed strategy of control is provided by experimental realistic tests on scalar controlled induction motor drives. The experimental results of the implementations with their analysis are detailed.

The use of ICT for Learning Guidance for Junior High School in Indonesia

In this paper, we will be present Guidance and Councelling (GC) class action research. The research was done because a fact that some students are still learning ways such as in elementary school. The research objective is to enhance the value of “academic performance report" grade by using ICT as GC Learning Guidance services. The research method was carried out with two cycles. First cycle is applying Learning Guidance services indirectly and not programmed. Second cycle into two implementing Learning Guidance services indirectly, programmed and using ICTs primarily mobile phones and computer media applications i.e. “m-NingBK©: Learning Guidance" and “screen saver: Learning Guidance". A research subject is a class VII student who has the lowest value of “academic performance report". The result is by using an indirect GC services with ICT there were significant changes.

Efficient Design Optimization of Multi-State Flow Network for Multiple Commodities

The network of delivering commodities has been an important design problem in our daily lives and many transportation applications. The delivery performance is evaluated based on the system reliability of delivering commodities from a source node to a sink node in the network. The system reliability is thus maximized to find the optimal routing. However, the design problem is not simple because (1) each path segment has randomly distributed attributes; (2) there are multiple commodities that consume various path capacities; (3) the optimal routing must successfully complete the delivery process within the allowable time constraints. In this paper, we want to focus on the design optimization of the Multi-State Flow Network (MSFN) for multiple commodities. We propose an efficient approach to evaluate the system reliability in the MSFN with respect to randomly distributed path attributes and find the optimal routing subject to the allowable time constraints. The delivery rates, also known as delivery currents, of the path segments are evaluated and the minimal-current arcs are eliminated to reduce the complexity of the MSFN. Accordingly, the correct optimal routing is found and the worst-case reliability is evaluated. It has been shown that the reliability of the optimal routing is at least higher than worst-case measure. Two benchmark examples are utilized to demonstrate the proposed method. The comparisons between the original and the reduced networks show that the proposed method is very efficient.

Aeroelasticity Analysis of Rotor Blades in the First Two Stages of Axial Compressor in the Case of a Bird Strike

A bird strike can cause damage to stationary and rotating aircraft engine parts, especially the engine fan. This paper presents a bird strike simulated by blocking four stator blade passages. It includes the numerical results of the unsteady lowfrequency aerodynamic forces and the aeroelastic behaviour caused by a non-symmetric upstream flow affecting the first two rotor blade stages in the axial-compressor of a jet engine. The obtained results show that disturbances in the engine inlet strongly influence the level of unsteady forces acting on the rotor blades. With a partially blocked inlet the whole spectrum of low-frequency harmonics is observed. Such harmonics can lead to rotor blade damage. The lowfrequency amplitudes are higher in the first stage rotor blades than in the second stage. In both rotor blades stages flutter appeared as a result of bird strike.

pth Moment Exponential Synchronization of a Class of Chaotic Neural Networks with Mixed Delays

This paper studies the pth moment exponential synchronization of a class of stochastic neural networks with mixed delays. Based on Lyapunov stability theory, by establishing a new integrodifferential inequality with mixed delays, several sufficient conditions have been derived to ensure the pth moment exponential stability for the error system. The criteria extend and improve some earlier results. One numerical example is presented to illustrate the validity of the main results.

Knowledge Management Model for Research Projects Masters Program

This paper presents the adaptation of the knowledge management model and intellectual capital measurement NOVA to the needs of work or research project must be developed when conducting a program of graduate-level master. Brackets are added in each of the blocks which is represented in the original model NOVA and which allows to represent those involved in each of these.

Advancing the Theory of Planned Behavior within Dietary and Physical Domains among Type 2 Diabetics: A Mixed Methods Approach

Many studies have applied the Theory of Planned Behavior (TPB) in predicting health behaviors among unique populations. However, a new paradigm is emerging where focus is now directed to modification and expansion of the TPB model rather than utilization of the traditional theory. This review proposes new models modified from the Theory of Planned Behavior and suggest an appropriate study design that can be used to test the models within physical activity and dietary practice domains among Type 2 diabetics in Kenya. The review was conducted by means of literature search in the field of nutrition behavior, health psychology and mixed methods using predetermined key words. The results identify pre-intention and post intention gaps within the TPB model that need to be filled. Additional psychosocial factors are proposed to be included in the TPB model to generate new models and the efficacy of these models tested using mixed methods design.

SC-LSH: An Efficient Indexing Method for Approximate Similarity Search in High Dimensional Space

Locality Sensitive Hashing (LSH) is one of the most promising techniques for solving nearest neighbour search problem in high dimensional space. Euclidean LSH is the most popular variation of LSH that has been successfully applied in many multimedia applications. However, the Euclidean LSH presents limitations that affect structure and query performances. The main limitation of the Euclidean LSH is the large memory consumption. In order to achieve a good accuracy, a large number of hash tables is required. In this paper, we propose a new hashing algorithm to overcome the storage space problem and improve query time, while keeping a good accuracy as similar to that achieved by the original Euclidean LSH. The Experimental results on a real large-scale dataset show that the proposed approach achieves good performances and consumes less memory than the Euclidean LSH.

Combining Diverse Neural Classifiers for Complex Problem Solving: An ECOC Approach

Combining classifiers is a useful method for solving complex problems in machine learning. The ECOC (Error Correcting Output Codes) method has been widely used for designing combining classifiers with an emphasis on the diversity of classifiers. In this paper, in contrast to the standard ECOC approach in which individual classifiers are chosen homogeneously, classifiers are selected according to the complexity of the corresponding binary problem. We use SATIMAGE database (containing 6 classes) for our experiments. The recognition error rate in our proposed method is %10.37 which indicates a considerable improvement in comparison with the conventional ECOC and stack generalization methods.

Modeling of the Internet Film Piracy - Preliminary Report

This paper covers various aspects of film piracy over the Internet. In order to successfully deal with this matter, it is needed to recognize motivational factors related to film piracy. Thus, this study discusses group factors that could motivate individuals to engage in pirate activities. Furthermore, the paper discusses the theoretical effect on box office revenues and explains it on a proposed scheme of solutions for decreasing revenues. The article also maps the scheme of incentive motivational anti-piracy campaigns. Moreover, the paper proposes the preliminary scheme for system dynamic modeling of the Internet film piracy. Scheme is developed as a model of behaviors, influences and relations among the elements pertaining to the Internet film piracy.

Evaluation of Classifiers Based On I2C Distance for Action Recognition

Naive Bayes Nearest Neighbor (NBNN) and its variants, i,e., local NBNN and the NBNN kernels, are local feature-based classifiers that have achieved impressive performance in image classification. By exploiting instance-to-class (I2C) distances (instance means image/video in image/video classification), they avoid quantization errors of local image descriptors in the bag of words (BoW) model. However, the performances of NBNN, local NBNN and the NBNN kernels have not been validated on video analysis. In this paper, we introduce these three classifiers into human action recognition and conduct comprehensive experiments on the benchmark KTH and the realistic HMDB datasets. The results shows that those I2C based classifiers consistently outperform the SVM classifier with the BoW model.

A Finite Precision Block Floating Point Treatment to Direct Form, Cascaded and Parallel FIR Digital Filters

This paper proposes an efficient finite precision block floating point (BFP) treatment to the fixed coefficient finite impulse response (FIR) digital filter. The treatment includes effective implementation of all the three forms of the conventional FIR filters, namely, direct form, cascaded and par- allel, and a roundoff error analysis of them in the BFP format. An effective block formatting algorithm together with an adaptive scaling factor is pro- posed to make the realizations more simple from hardware view point. To this end, a generic relation between the tap weight vector length and the input block length is deduced. The implementation scheme also emphasises on a simple block exponent update technique to prevent overflow even during the block to block transition phase. The roundoff noise is also investigated along the analogous lines, taking into consideration these implementational issues. The simulation results show that the BFP roundoff errors depend on the sig- nal level almost in the same way as floating point roundoff noise, resulting in approximately constant signal to noise ratio over a relatively large dynamic range.

A Cheating Model for Cellular Automata-Based Secret Sharing Schemes

Cellular automata have been used for design of cryptosystems. Recently some secret sharing schemes based on linear memory cellular automata have been introduced which are used for both text and image. In this paper, we illustrate that these secret sharing schemes are vulnerable to dishonest participants- collusion. We propose a cheating model for the secret sharing schemes based on linear memory cellular automata. For this purpose we present a novel uniform model for representation of all secret sharing schemes based on cellular automata. Participants can cheat by means of sending bogus shares or bogus transition rules. Cheaters can cooperate to corrupt a shared secret and compute a cheating value added to it. Honest participants are not aware of cheating and suppose the incorrect secret as the valid one. We prove that cheaters can recover valid secret by removing the cheating value form the corrupted secret. We provide methods of calculating the cheating value.

Dependence of Equilibrium, Kinetics and Thermodynamics of Zn (II) Ions Sorption from Water on Particle Size of Natural Hydroxyapatite Extracted from Bone Ash

Heavy metals have bad effects on environment and soils and it can uptake by natural HAP .natural Hap is an inexpensive material that uptake large amounts of various heavy metals like Zn (II) .Natural HAP (N-HAP), extracted from bovine cortical bone ash, is a good choice for substitution of commercial HAP. Several experiments were done to investigate the sorption capacity of Zn (II) to N-HAP in various particles sizes, temperatures, initial concentrations, pH and reaction times. In this study, the sorption of Zinc ions from a Zn solution onto HAP particles with sizes of 1537.6 nm and 47.6 nm at three initial pH values of 4.50, 6.00 and 7.50 was studied. The results showed that better performance was obtained through a 47.6 nm particle size and higher pH values. The experimental data were analyzed using Langmuir, Freundlich, and Arrhenius equations for equilibrium, kinetic and thermodynamic studies. The analysis showed a maximum adsorption capacity of NHAP as being 1.562 mmol/g at a pH of 7.5 and small particle size. Kinetically, the prepared N-HAP is a feasible sorbent that retains Zn (II) ions through a favorable and spontaneous sorption process.

Interactive Agents with Artificial Mind

This paper discusses an artificial mind model and its applications. The mind model is based on some theories which assert that emotion is an important function in human decision making. An artificial mind model with emotion is built, and the model is applied to action selection of autonomous agents. In three examples, the agents interact with humans and their environments. The examples show the proposed model effectively work in both virtual agents and real robots.