Abstract: The MFCAV Riemann solver is practically used in many Lagrangian or ALE methods due to its merit of sharp shock profiles and rarefaction corners, though very often with numerical oscillations. By viewing it as a modification of the WWAM Riemann solver, we apply the MFCAV Riemann solver to the Lagrangian method recently developed by Maire. P. H et. al.. The numerical experiments show that the application is successful in that the shock profiles and rarefaction corners are sharpened compared with results obtained using other Riemann solvers. Though there are still numerical oscillations, they are within the range of the MFCAV applied in onther Lagrangian methods.
Abstract: Given a simple connected unweighted undirected graph G = (V (G), E(G)) with |V (G)| = n and |E(G)| = m, we present a new algorithm for the all-pairs shortest-path (APSP) problem. The running time of our algorithm is in O(n2 log n). This bound is an improvement over previous best known O(n2.376) time bound of Raimund Seidel (1995) for general graphs. The algorithm presented does not rely on fast matrix multiplication. Our algorithm with slight modifications, enables us to compute the APSP problem for unweighted directed graph in time O(n2 log n), improving a previous best known O(n2.575) time bound of Uri Zwick (2002).
Abstract: This study investigates the use of genetic algorithms
in information retrieval. The method is shown to be applicable to
three well-known documents collections, where more relevant
documents are presented to users in the genetic modification. In this
paper we present a new fitness function for approximate information
retrieval which is very fast and very flexible, than cosine similarity
fitness function.
Abstract: The overlay approach has been widely used by many service providers for Traffic Engineering (TE) in large Internet backbones. In the overlay approach, logical connections are set up between edge nodes to form a full mesh virtual network on top of the physical topology. IP routing is then run over the virtual network. Traffic engineering objectives are achieved through carefully routing logical connections over the physical links. Although the overlay approach has been implemented in many operational networks, it has a number of well-known scaling issues. This paper proposes a new approach to achieve traffic engineering without full-mesh overlaying with the help of integrated approach and equal subset split method. Traffic engineering needs to determine the optimal routing of traffic over the existing network infrastructure by efficiently allocating resource in order to optimize traffic performance on an IP network. Even though constraint-based routing [1] of Multi-Protocol Label Switching (MPLS) is developed to address this need, since it is not widely tested or debugged, Internet Service Providers (ISPs) resort to TE methods under Open Shortest Path First (OSPF), which is the most commonly used intra-domain routing protocol. Determining OSPF link weights for optimal network performance is an NP-hard problem. As it is not possible to solve this problem, we present a subset split method to improve the efficiency and performance by minimizing the maximum link utilization in the network via a small number of link weight modifications. The results of this method are compared against results of MPLS architecture [9] and other heuristic methods.
Abstract: The purpose of this work is to establish the theoretical
foundations for calculating and designing the sublimationcondensation
processes in chemical apparatuses which are intended
for production of ultrafine powders of crystalline and amorphous
materials with controlled fractional composition. Theoretic analysis
of the primary processes of nucleation and growth kinetics of the
clusters according to the degree of super-saturation and the
homogeneous or heterogeneous nature of nucleation has been carried
out. The engineering design procedures of desublimation processes
have been offered and tested for modification of the Claus process.
Abstract: Ranked set sampling (RSS) was first suggested to increase the efficiency of the population mean. It has been shown that this method is highly beneficial to the estimation based on simple random sampling (SRS). There has been considerable development and many modifications were done on this method. When a concomitant variable is available, ratio estimation based on ranked set sampling was proposed. This ratio estimator is more efficient than that based on SRS. In this paper some ratio type estimators of the population mean based on RSS are suggested. These estimators are found to be more efficient than the estimators of similar form using simple random sample.
Abstract: In rail vehicles, air springs are very important isolating component, which guarantee good ride comfort for passengers during their trip. In the most new rail–vehicle models, developed by researchers, the thermo–dynamical effects of air springs are ignored and secondary suspension is modeled by simple springs and dampers. As the performance of suspension components have significant effects on rail–vehicle dynamics and ride comfort of passengers, a complete nonlinear thermo–dynamical air spring model, which is a combination of two different models, is introduced. Result from field test shows remarkable agreement between proposed model and experimental data. Effects of air suspension parameters on the system performances are investigated here and then these parameters are tuned to minimize Sperling ride comfort index during the trip. Results showed that by modification of air suspension parameters, passengers comfort is improved and ride comfort index is reduced about 10%.
Abstract: An attempt in this paper proposes a re-modification to
the minimum moment approach of resource leveling which is a modified minimum moment approach to the traditional method by
Harris. The method is based on critical path method. The new approach suggests the difference between the methods in the
selection criteria of activity which needs to be shifted for leveling resource histogram. In traditional method, the improvement factor
found first to select the activity for each possible day of shifting. In
modified method maximum value of the product of Resources Rate
and Free Float was found first and improvement factor is then
calculated for that activity which needs to be shifted. In the proposed
method the activity to be selected first for shifting is based on the largest value of resource rate. The process is repeated for all the
remaining activities for possible shifting to get updated histogram.
The proposed method significantly reduces the number of iterations
and is easier for manual computations.
Abstract: A novel direction-of-arrival (DOA) estimation technique, which uses a conventional multiple signal classification (MUSIC) algorithm with periodic signals, is applied to a single RF-port parasitic array antenna for direction finding. Simulation results show that the proposed method gives high resolution (1 degree) DOA estimation in an uncorrelated signal environment. The novelty lies in that the MUSIC algorithm is applied to a simplified antenna configuration. Only one RF port and one analogue-to-digital converter (ADC) are used in this antenna, which features low DC power consumption, low cost, and ease of fabrication. Modifications to the conventional MUSIC algorithm do not bring much additional complexity. The proposed technique is also free from the negative influence by the mutual coupling between elements. Therefore, the technique has great potential to be implemented into the existing wireless mobile communications systems, especially at the power consumption limited mobile terminals, to provide additional position location (PL) services.
Abstract: Five crystal modifications of water insoluble
artesunate were generated by recrystallizing it from various solvents
with improved physicochemical properties. These generated crystal
forms were characterized to select the most potent and soluble form.
SEM of all the forms showed changes in external shape leading them
to be different morphologically. DSC thermograms of Form III and
Form V showed broad endotherm peaks at 83.04oC and 76.96oC prior
to melting fusion of drug respectively. Calculated weight loss in TGA
revealed that Form III and Form V are methanol and acetone solvates
respectively. However, few additional peaks were appeared in XRPD
pattern in these two solvate forms. All forms exhibit exothermic
behavior in buffer and two solvates display maximum ease of
molecular release from the lattice. Methanol and acetone solvates
were found to be most soluble forms and exhibited higher
antimalarial efficacy showing higher survival rate (83.3%) after 30
days.
Abstract: It is observed that the Weighted least-square (WLS)
technique, including the modifications, results in equiripple error
curve. The resultant error as a percent of the ideal value is highly
non-uniformly distributed over the range of frequencies for which the
differentiator is designed. The present paper proposes a modification
to the technique so that the optimization procedure results in lower
maximum relative error compared to the ideal values. Simulation
results for first order as well as higher order differentiators are given
to illustrate the excellent performance of the proposed method.
Abstract: Dispersions of casein micelles (CM) were studied at a
constant protein concentration of 5 wt % in high NaCl environment
ranging from 0% to 12% by Dynamic light scattering (DLS) and
Fourier Transform Infrared (FTIR). The rehydration profiles obtained
were interpreted in term of wetting, swelling and dispersion stages by
using a turbidity method. Two behaviours were observed depending
on the salt concentration. The first behaviour (low salt concentration)
presents a typical rehydration profile with a significant change
between 3 and 6% NaCl indicating quick wetting, swelling and long
dispersion stage. On the opposite, the dispersion stage of the second
behaviour (high salt concentration) was significantly shortened
indicating a strong modification of the protein backbone. A salt
increase result to a destabilization of the micelle and the formation of
mini-micelles more or less aggregated indicating an average micelles
size ranging from 100 to 200 nm. For the first time, the estimations
of secondary structural elements (irregular, ß-sheet, α-helix and turn)
by the Amide III assignments were correlated with results from
Amide I.
Abstract: The importance for manipulating an incorporated
scaffold and directing cell behaviors is well appreciated for tissue
engineering. Here, we developed newly nano-topographic oxidized
silicon nanosponges capable of being various chemical modifications
to provide much insight into the fundamental biology of how cells
interact with their surrounding environment in vitro. A wet etching
technique is exerted to allow us fabricated the silicon nanosponges in a
high-throughput manner. Furthermore, various organo-silane
chemicals enabled self-assembled on the surfaces by vapor deposition.
We have found that Chinese hamster ovary (CHO) cells displayed
certain distinguishable morphogenesis, adherent responses, and
biochemical properties while cultured on these chemical modified
nano-topographic structures in compared with the planar oxidized
silicon counterparts, indicating that cell behaviors can be influenced
by certain physical characteristic derived from nano-topography in
addition to the hydrophobicity of contact surfaces crucial for cell
adhesion and spreading. Of particular, there were predominant
nano-actin punches and slender protrusions formed while cells were
cultured on the nano-topographic structures. This study shed potential
applications of these nano-topographic biomaterials for controlling
cell development in tissue engineering or basic cell biology research.
Abstract: Computer technology and the Internet have made a
breakthrough in the existence of data communication. This has
opened a whole new way of implementing steganography to ensure
secure data transfer. Steganography is the fine art of hiding the
information. Hiding the message in the carrier file enables the
deniability of the existence of any message at all. This paper designs
a stego machine to develop a steganographic application to hide data
containing text in a computer video file and to retrieve the hidden
information. This can be designed by embedding text file in a video
file in such away that the video does not loose its functionality using
Least Significant Bit (LSB) modification method. This method
applies imperceptible modifications. This proposed method strives
for high security to an eavesdropper-s inability to detect hidden
information.
Abstract: The paper which is dedicated to describing the effect
made by the “significant other", presents the new model of
interrelation between self-reflection, the “significant other"
phenomenon and aggression. Tendencies of direction and type
frustration response developments in detail are discussed. New
results have been received through designing of the original
experiment. It is based on modifications of the “Picture – Frustration
Study" test by S. Rosenzweig.
Abstract: In this paper an approaches for increasing the
effectiveness of error detection in computer network channels with
Pulse-Amplitude Modulation (PAM) has been proposed. Proposed
approaches are based on consideration of special feature of errors,
which are appearances in line with PAM. The first approach consists
of CRC modification specifically for line with PAM. The second
approach is base of weighted checksums using. The way for
checksum components coding has been developed. It has been shown
that proposed checksum modification ensure superior digital data
control transformation reliability for channels with PAM in compare
to CRC.
Abstract: This paper proposes a set of quasi-static mathematical
model of magnetic fields caused by high voltage conductors of
distribution transformer by using a set of second-order partial
differential equation. The modification for complex magnetic field
analysis and time-harmonic simulation are also utilized. In this
research, transformers were study in both balanced and unbalanced
loading conditions. Computer-based simulation utilizing the threedimensional
finite element method (3-D FEM) is exploited as a tool
for visualizing magnetic fields distribution volume a distribution
transformer. Finite Element Method (FEM) is one among popular
numerical methods that is able to handle problem complexity in
various forms. At present, the FEM has been widely applied in most
engineering fields. Even for problems of magnetic field distribution,
the FEM is able to estimate solutions of Maxwell-s equations
governing the power transmission systems. The computer simulation
based on the use of the FEM has been developed in MATLAB
programming environment.
Abstract: Higher productivity and less cost in the ship
manufacturing process are required to maintain the international
competitiveness of morden manufacturing industries. In shipbuilding,
however, the Engineering To Order (ETO) production method and
production process is very difficult. Thus, designs change frequently.
In accordance with production, planning should be set up according
to scene changes. Therefore, fixed production planning is very
difficult. Thus, a scheduler must first make sketchy plans, then
change the plans based on the work progress and modifications.
Thus, data sharing in a shipbuilding block assembly shop is very
important. In this paper, we proposed to scheduling method
applicable to the shipbuilding industry and decision making support
system through web based visualization system.
Abstract: Partitions can play a significant role in minimising cochannel
interference of Wireless LANs by attenuating signals across
room boundaries. This could pave the way towards higher density
deployments in home and office environments through spatial
channel reuse. Yet, due to protocol limitations, the latest incantation
of IEEE 802.11 standard is still unable to take advantage of this fact:
Despite having clearly adequate Signal to Interference Ratio (SIR)
over co-channel neighbouring networks in other rooms, its goodput
falls significantly lower than its maximum in the absence of cochannel
interferers. In this paper, we describe how this situation can
be remedied via modest modifications to the standard.
Abstract: This paper is about hiding RFID tag identifier (ID)
using handheld device like a cellular phone. By modifying the tag ID
of objects periodically or manually using cellular phone built-in a
RFID reader chip or with a external RFID reader device, we can
prevent other people from gathering the information related with
objects querying information server (like an EPC IS) with a tag ID or
deriving the information from tag ID-s code structure or tracking the
location of the objects and the owner of the objects. In this paper, we
use a cryptographic algorithm for modification and restoring of RFID
tag ID, and for one original tag ID, there are several different
temporary tag ID, periodically.