Search results for: elliptic scalar multiplication
136 Solution for Thick Plate Resting on Winkler Foundation by Symplectic Geometry Method
Authors: Mei-Jie Xu, Yang Zhong
Abstract:
Based on the symplectic geometry method, the theory of Hamilton system can be applied in the analysis of problem solved using the theory of elasticity and in the solution of elliptic partial differential equations. With this technique, this paper derives the theoretical solution for a thick rectangular plate with four free edges supported on a Winkler foundation by variable separation method. In this method, the governing equation of thick plate was first transformed into state equations in the Hamilton space. The theoretical solution of this problem was next obtained by applying the method of variable separation based on the Hamilton system. Compared with traditional theoretical solutions for rectangular plates, this method has the advantage of not having to assume the form of deflection functions in the solution process. Numerical examples are presented to verify the validity of the proposed solution method.Keywords: symplectic geometry method, Winkler foundation, thick rectangular plate, variable separation method, Hamilton system
Procedia PDF Downloads 305135 Potyviruses Genomic Analysis and Complete Evaluation
Authors: Narin Salehiyan, Ramin Ghasemi Shayan
Abstract:
The largest genus of plant viruses, the potyvirus, is responsible for significant crop losses. Potyviruses are aphid sent in a nonpersistent way, and some of them are likewise seed communicated. As significant microorganisms, potyviruses are substantially more examined than other plant infections having a place with different genera, and their review covers numerous parts of plant virology, like utilitarian portrayal of viral proteins, sub-atomic communication with hosts and vectors, structure, scientific classification, development, the study of disease transmission, and determination. Biotechnological utilizations of potyviruses are likewise being investigated. During this last ten years, significant advances have been made in the comprehension of the sub-atomic science of these infections and the elements of their different proteins. Potyvirus multiplication, movement, and transmission, as well as potyvirus/plant compatible interactions, including pathogenicity and symptom determinants, are updated following a general overview of the family Potyviridae and the potyviral proteins. it end the survey giving data on biotechnological uses of potyviruses.Keywords: virology, poty, virus, genome, genetic
Procedia PDF Downloads 73134 Monte Carlo Neutronic Calculations on Laser Inertial Fusion Energy (LIFE)
Authors: Adem Acır
Abstract:
In this study, time dependent neutronic analysis of incineration of minor actinides of a Laser Fusion Inertial Confinement Fusion Fission Energy (LIFE) engine was performed. The calculations were carried out by using MCNP codes with ENDF/B.VI neutron data library. In the neutronic calculations, TRISO particles fueled with minor actinides with natural lithium coolant were performed. The natural lithium cooled LIFE engine used 10 % TRISO fuel minor actinides composition. Tritium breeding ratios (TBR) and energy multiplication factor (M) burnup values were computed as 1.46 and 3.75, respectively. The reactor operation time was calculated as ~ 21 years. The burnup values were obtained as ~1060 GWD/MT, respectively. As a result, the very higher burnup were achieved of LIFE engine.Keywords: Monte Carlo, minor actinides, nuclear waste, LIFE engine
Procedia PDF Downloads 293133 Analysis of the Temperature Dependence of Local Avalanche Compact Model for Bipolar Transistors
Authors: Robert Setekera, Ramses van der Toorn
Abstract:
We present an extensive analysis of the temperature dependence of the local avalanche model used in most of the modern compact models for bipolar transistors. This local avalanche model uses the Chynoweth's empirical law for ionization coefficient to define the generation of the avalanche current in terms of the local electric field. We carry out the model analysis using DC-measurements taken on both Si and advanced SiGe bipolar transistors. For the advanced industrial SiGe-HBTs, we consider both high-speed and high-power devices (both NPN and PNP transistors). The limitations of the local avalanche model in modeling the temperature dependence of the avalanche current mostly in the weak avalanche region are demonstrated. In addition, the model avalanche parameters are analyzed to see if they are in agreement with semiconductor device physics.Keywords: avalanche multiplication, avalanche current, bipolar transistors, compact modeling, electric field, impact ionization, local avalanche
Procedia PDF Downloads 622132 Special Case of Trip Distribution Model and Its Use for Estimation of Detailed Transport Demand in the Czech Republic
Authors: Jiri Dufek
Abstract:
The national model of the Czech Republic has been modified in a detailed way to get detailed travel demand in the municipality level (cities, villages over 300 inhabitants). As a technique for this detailed modelling, three-dimensional procedure for calibrating gravity models, was used. Besides of zone production and attraction, which is usual in gravity models, the next additional parameter for trip distribution was introduced. Usually it is called by “third dimension”. In the model, this parameter is a demand between regions. The distribution procedure involved calculation of appropriate skim matrices and its multiplication by three coefficients obtained by iterative balancing of production, attraction and third dimension. This type of trip distribution was processed in R-project and the results were used in the Czech Republic transport model, created in PTV Vision. This process generated more precise results in local level od the model (towns, villages)Keywords: trip distribution, three dimension, transport model, municipalities
Procedia PDF Downloads 131131 Induced-Gravity Inflation in View of the Bicep2 Results
Authors: C. Pallis
Abstract:
Induced-Gravity inflation is a model of chaotic inflation where the inflaton is identified with a Higgs-like modulus whose the vacuum expectation value controls the gravitational strength. Thanks to a strong enough coupling between the inflaton and the Ricci scalar curvature, inflation is attained even for subplanckian values of the inflaton with the corresponding effective theory being valid up to the Planck scale. In its simplest realization, induced-gravity inflation is based on a quatric potential and a quadratic non-minimal coupling and the inflationary observables turn out to be in agreement with the Planck data. Its supersymmetrization can be formulated within no-scale Supergravity employing two gauge singlet chiral superfields and applying a continuous $R$ and a discrete Zn symmetry to the proposed superpotential and Kahler potential. Modifying slightly the non-minimal coupling to Gravity, the model can account for the recent results of BICEP2. These modifications can be also accommodated beyond the no-scale SUGRA considering the fourth order term of the Kahler potential which mixes the inflaton with the accompanying non-inflaton field and small deviations from the prefactor $-3$ encountered in the adopted Kahler potential.Keywords: cosmology, supersymmetric models, supergravity, modified gravity
Procedia PDF Downloads 715130 SA-SPKC: Secure and Efficient Aggregation Scheme for Wireless Sensor Networks Using Stateful Public Key Cryptography
Authors: Merad Boudia Omar Rafik, Feham Mohammed
Abstract:
Data aggregation in wireless sensor networks (WSNs) provides a great reduction of energy consumption. The limited resources of sensor nodes make the choice of an encryption algorithm very important for providing security for data aggregation. Asymmetric cryptography involves large ciphertexts and heavy computations but solves, on the other hand, the problem of key distribution of symmetric one. The latter provides smaller ciphertexts and speed computations. Also, the recent researches have shown that achieving the end-to-end confidentiality and the end-to-end integrity at the same is a challenging task. In this paper, we propose (SA-SPKC), a novel security protocol which addresses both security services for WSNs, and where only the base station can verify the individual data and identify the malicious node. Our scheme is based on stateful public key encryption (StPKE). The latter combines the best features of both kinds of encryption along with state in order to reduce the computation overhead. Our analysisKeywords: secure data aggregation, wireless sensor networks, elliptic curve cryptography, homomorphic encryption
Procedia PDF Downloads 297129 Low-Cost Reversible Logic Serial Multipliers with Error Detection Capability
Authors: Mojtaba Valinataj
Abstract:
Nowadays reversible logic has received many attentions as one of the new fields for reducing the power consumption. On the other hand, the processing systems have weaknesses against different external effects. In this paper, some error detecting reversible logic serial multipliers are proposed by incorporating the parity-preserving gates. This way, the new designs are presented for signed parity-preserving serial multipliers based on the Booth's algorithm by exploiting the new arrangements of existing gates. The experimental results show that the proposed 4×4 multipliers in this paper reach up to 20%, 35%, and 41% enhancements in the number of constant inputs, quantum cost, and gate count, respectively, as the reversible logic criteria, compared to previous designs. Furthermore, all the proposed designs have been generalized for n×n multipliers with general formulations to estimate the main reversible logic criteria as the functions of the multiplier size.Keywords: Booth’s algorithm, error detection, multiplication, parity-preserving gates, quantum computers, reversible logic
Procedia PDF Downloads 228128 Visualization of Energy Waves via Airy Functions in Time-Domain
Authors: E. Sener, O. Isik, E. Eroglu, U. Sahin
Abstract:
The main idea is to solve the system of Maxwell’s equations in accordance with the causality principle to get the energy quantities via Airy functions in a hollow rectangular waveguide. We used the evolutionary approach to electromagnetics that is an analytical time-domain method. The boundary-value problem for the system of Maxwell’s equations is reformulated in transverse and longitudinal coordinates. A self-adjoint operator is obtained and the complete set of Eigen vectors of the operator initiates an orthonormal basis of the solution space. Hence, the sought electromagnetic field can be presented in terms of this basis. Within the presentation, the scalar coefficients are governed by Klein-Gordon equation. Ultimately, in this study, time-domain waveguide problem is solved analytically in accordance with the causality principle. Moreover, the graphical results are visualized for the case when the energy and surplus of the energy for the time-domain waveguide modes are represented via airy functions.Keywords: airy functions, Klein-Gordon Equation, Maxwell’s equations, Surplus of energy, wave boundary operators
Procedia PDF Downloads 371127 Easily Memorable Strong Password Generation and Retrieval
Authors: Shatadru Das, Natarajan Vijayarangan
Abstract:
In this paper, a system and method for generating and recovering an authorization code has been designed and analyzed. The system creates an authorization code by accepting a base-sentence from a user. Based on the characters present in this base-sentence, the system computes a base-sentence matrix. The system also generates a plurality of patterns. The user can either select the pattern from the multiple patterns suggested by the system or can create his/her own pattern. The system then performs multiplications between the base-sentence matrix and the selected pattern matrix at different stages in the path forward, for obtaining a strong authorization code. In case the user forgets the base sentence, the system has a provision to manage and retrieve 'forgotten authorization code'. This is done by fragmenting the base sentence into different matrices and storing the fragmented matrices into a repository after computing matrix multiplication with a security question-answer approach and with a secret key provided by the user.Keywords: easy authentication, key retrieval, memorable passwords, strong password generation
Procedia PDF Downloads 400126 Validation of the Career Motivation Scale among Chinese University and Vocational College Teachers
Authors: Wei Zhang, Lifen Zhao
Abstract:
The present study aims to translate and validate the Career Motivation Scale among Chinese university and vocational college teachers. Exploratory factor analysis supported a three-factor structure that was consistent with the original structure of career motivation: career insight, career identity, and career resilience. Confirmatory factor analysis showed that a second-order three-factor model with correlated measurement errors best fit the data. Configural, metric, and scalar invariance models were tested, demonstrating that the Chinese version of the Career Motivation Scale did not differ across groups of school type, educational level, and working years in current institutions. The concurrent validity of the Chinese Career Motivation Scale was confirmed by its significant correlations with work engagement, career adaptability, career satisfaction, job crafting, and intention to quit. The results of the study indicated that the Chinese Career Motivation Scale was a valid and reliable measure of career motivation among university and vocational college teachers in China.Keywords: career motivation scale, Chinese University, vocational college teachers, measurement invariance, validation
Procedia PDF Downloads 132125 Studies on Propagation of Celastrus paniculatus Willd: An Endangered Medicinal Plant
Authors: G. Raviraja Shetty, K. G. Poojitha
Abstract:
An experiment was conducted to study the effect of different growth regulators on seed germination and vegetative propagation by cuttings of an endangered medicinal plant species, Celastrus paniculatus Willd. at College of Horticulture, Mudigere during June- Sept 2014. Various growth parameters were recorded for seed germination and significantly higher results for Rate of germination (0.78), Plant vigour (2082.74), Plant height (22.10cm), number of leaves (7.83) fresh weight (136.58mg) and dry weight of plant (59.16mg) noticed in seeds treated with GA3 400 ppm when compared to control. In vegetative propagation the cuttings treated with IBA 2000 ppm recorded significantly highest sprouting percentage (98.00) when compared to control (71.00). The results of present investigation will be helpful for large scale multiplication of the species. It will also help for cultivation and conservation of this endangered species.Keywords: Celastrus paniculatus Willd, seeds, germination, cuttings
Procedia PDF Downloads 415124 An Efficient and Provably Secure Three-Factor Authentication Scheme with Key Agreement
Authors: Mohan Ramasundaram, Amutha Prabakar Muniyandi
Abstract:
Remote user authentication is one of the important tasks for any kind of remote server applications. Several remote authentication schemes are proposed by the researcher for Telecare Medicine Information System (TMIS). Most of the existing techniques have limitations, vulnerable to various kind attacks, lack of functionalities, information leakage, no perfect forward security and ineffectiveness. Authentication is a process of user verification mechanism for allows him to access the resources of a server. Nowadays, most of the remote authentication protocols are using two-factor authentications. We have made a survey of several remote authentication schemes using three factors and this survey shows that the most of the schemes are inefficient and subject to several attacks. We observed from the experimental evaluation; the proposed scheme is very secure against various known attacks that include replay attack, man-in-the-middle attack. Furthermore, the analysis based on the communication cost and computational cost estimation of the proposed scheme with related schemes shows that our proposed scheme is efficient.Keywords: Telecare Medicine Information System, elliptic curve cryptography, three-factor, biometric, random oracle
Procedia PDF Downloads 219123 Rogue Waves Arising on the Standing Periodic Wave in the High-Order Ablowitz-Ladik Equation
Authors: Yanpei Zhen
Abstract:
The nonlinear Schrödinger (NLS) equation models wave dynamics in many physical problems related to fluids, plasmas, and optics. The standing periodic waves are known to be modulationally unstable, and rogue waves (localized perturbations in space and time) have been observed on their backgrounds in numerical experiments. The exact solutions for rogue waves arising on the periodic standing waves have been obtained analytically. It is natural to ask if the rogue waves persist on the standing periodic waves in the integrable discretizations of the integrable NLS equation. We study the standing periodic waves in the semidiscrete integrable system modeled by the high-order Ablowitz-Ladik (AL) equation. The standing periodic wave of the high-order AL equation is expressed by the Jacobi cnoidal elliptic function. The exact solutions are obtained by using the separation of variables and one-fold Darboux transformation. Since the cnoidal wave is modulationally unstable, the rogue waves are generated on the periodic background.Keywords: Darboux transformation, periodic wave, Rogue wave, separating the variables
Procedia PDF Downloads 183122 Step Height Calibration Using Hamming Window: Band-Pass Filter
Authors: Dahi Ghareab Abdelsalam Ibrahim
Abstract:
Calibration of step heights with high accuracy is needed for many applications in the industry. In general, step height consists of three bands: pass band, transition band (roll-off), and stop band. Abdelsalam used a convolution of the transfer functions of both Chebyshev type 2 and elliptic filters with WFF of the Fresnel transform in the frequency domain for producing a steeper roll-off with the removal of ripples in the pass band- and stop-bands. In this paper, we used a new method based on the Hamming window: band-pass filter for calibration of step heights in terms of perfect adjustment of pass-band, roll-off, and stop-band. The method is applied to calibrate a nominal step height of 40 cm. The step height is measured first by asynchronous dual-wavelength phase-shift interferometry. The measured step height is then calibrated by the simulation of the Hamming window: band-pass filter. The spectrum of the simulated band-pass filter is simulated at N = 881 and f0 = 0.24. We can conclude that the proposed method can calibrate any step height by adjusting only two factors which are N and f0.Keywords: optical metrology, step heights, hamming window, band-pass filter
Procedia PDF Downloads 83121 Validation of Codes Dragon4 and Donjon4 by Calculating Keff of a Slowpoke-2 Reactor
Authors: Otman Jai, Otman Elhajjaji, Jaouad Tajmouati
Abstract:
Several neutronic calculation codes must be used to solve the equation for different levels of discretization which all necessitate a specific modelisation. This chain of such models, known as a calculation scheme, leads to the knowledge of the neutron flux in a reactor from its own geometry, its isotopic compositions and a cross-section library. Being small in size, the 'Slowpoke-2' reactor is difficult to model due to the importance of the leaking neutrons. In the paper, the simulation model is presented (geometry, cross section library, assumption, etc.), and the results obtained by DRAGON4/DONJON4 codes were compared to the calculations performed with Monte Carlo code MCNP using detailed geometrical model of the reactor and the experimental data. Criticality calculations have been performed to verify and validate the model. Since created model properly describes the reactor core, it can be used for calculations of reactor core parameters and for optimization of research reactor application.Keywords: transport equation, Dragon4, Donjon4, neutron flux, effective multiplication factor
Procedia PDF Downloads 470120 Neutronic Calculations for Central Test Loop in Heavy Water Research Reactor
Authors: Hadi Shamoradifar, Behzad Teimuri, Parviz Parvaresh, Saeed Mohammadi
Abstract:
One of the experimental facilities of the heavy water research reactor is the central test loop (C.T.L). It is located along the central axial line of the vessel, and therefore will highly affect the neutronic parameters of the reactor, so from the neutronics point of view, C.T.L is the most important facility. It is mainly designed for fuel testing, thought other applications such as radioisotope production and neutron activation, can be imagine for it. All of the simulations were performed by MCNPX2.6. As a first step towards C.T.L analysis, the effect of D2O-filled, H2O-filled, and He-filled C.T.L on the effective multiplication factor (Keff.), have been evaluated. According to results, H2O-filled C.T.L has a higher thermal neutron, while He-filled C.T.L includes more resonance neutrons. In the next step thermal and total axial neutron fluxes, were calculated and used as the comparison parameters. The core without C.T.L (C.T.L replaced by heavy water) is selected as the reference case, and the effect of all other cases is calculated according to that.Keywords: heavy water reactor, neutronic calculations, central test loop, neutron activation
Procedia PDF Downloads 363119 Numerical Investigation of a Slightly Oblique Round Jet Flowing into a Uniform Counterflow Stream
Authors: Amani Amamou, Sabra Habli, Nejla Mahjoub Saïd, Philippe Bournot, Georges Le Palec
Abstract:
A counterflowing jet is a particular configuration of turbulent jets issuing into a moving ambient which has not carried much attention in literature compared with jet in a coflow or in a crossflow. This is due to the marked instability of the jet in a counterflow coupled with experimental and theoretical difficulties related to the flow inversion phenomenon. Nevertheless, jets in a counterflow are encountered in many engineering applications which required enhanced mixing as combustion, process and environmental engineering. In this work, we propose to investigate a round turbulent jet flowing into a uniform counterflow stream through a numerical approach. A hydrodynamic and thermal study of a slightly oblique round jets issuing into a uniform counterflow stream is carried out for different jet-to-counterflow velocity ratios ranging between 3.1 and 15. It is found that even a slight inclination of the jet in the vertical direction of the flow affects the structure and the velocity field of the counterflowing jet. In addition, the evolution of passive scalar temperature and pertinent length scales are presented at various velocity ratios, confirming that the flow is sensitive to directional perturbations.Keywords: jet, counterflow, velocity, temperature, jet inclination
Procedia PDF Downloads 269118 Measuring Entrepreneurship Intentions among Nigerian University Graduates: A Structural Equation Modeling Technique
Authors: Eunice Oluwakemi Chukwuma-Nwuba
Abstract:
Nigeria is a developing country with an increasing rate of graduate unemployment. This has triggered successive government administrations to promote the variety of programmes to address the situation. However, none of these efforts yielded the desired outcome. Accordingly, in 2006 the government included entrepreneurship module in the curriculum of universities as a compulsory general programme for all undergraduate courses. This is in the hope that the programme will help to promote entrepreneurial mind-set and new venture creation among graduates and as a result reduce the rate of graduate unemployment. The study explores the effectiveness of entrepreneurship education in promoting entrepreneurship. This study is significant in view of the endemic graduate unemployment in Nigeria and the social consequences such as youth restiveness and militancy. It is guided by the theory of planned behaviour. It employed the two-stage structural equation modelling (AMOS) to model entrepreneurial intentions as a function of innovative teaching methods, traditional teaching methods and culture Personal attitude and subjective norm are proposed to mediate the relationships between the exogenous and the endogenous variables. The first stage was tested using multi-group confirmatory factor analysis (MGCFA) framework to confirm that the two groups assign the same meaning to the scale items and to obtain goodness-of-fit indices. The multi-group confirmatory factor analysis included the tests of configural, metric and scalar invariance. With the attainment of full configural invariance and partial metric and scalar invariance, the second stage – the structural model was applied hypothesising that, the entrepreneurial intentions of graduates (respondents who have participated in the compulsory entrepreneurship programme) will be higher than those of undergraduates (respondents who are yet to participate in the programme). The study uses the quasi-experimental design. The samples comprised 409 graduates (experimental group) and 402 undergraduates (control group) from six federal universities in Nigeria. Our findings suggest that personal attitude is positively related with entrepreneurial intentions, largely confirming prior literature. However, unlike previous studies, our results indicate that subjective norm has significant direct and indirect impact on entrepreneurial intentions indicating that reference people of the participants have important roles to play in their decision to be entrepreneurial. Furthermore, unlike the assertions in prior studies, the result suggests that traditional teaching methods have indirect effect on entrepreneurial intentions supporting that since personal characteristics can change in an educational situation, an education purposively directed at entrepreneurship might achieve similar results if not better. This study has implication for practice and theory. The research extends to the theoretical understanding of the formation of entrepreneurial intentions and explains the role of the reference others in relation to how graduates perceive entrepreneurship. Further, the study adds to the body of knowledge on entrepreneurship education in Nigeria universities and provides a developing country perspective. It proposes further research in the exploration of entrepreneurship education and entrepreneurial intentions of graduates from across the country’s universities as necessary and imperative.Keywords: entrepreneurship education, entrepreneurial intention, structural equation modeling, theory of planned behaviour
Procedia PDF Downloads 259117 Analyzing Boson Star as a Candidate for Dark Galaxy Using ADM Formulation of General Relativity
Authors: Aria Ratmandanu
Abstract:
Boson stars can be viewed as zero temperature ground state, Bose-Einstein condensates, characterized by enormous occupation numbers. Time-dependent spherically symmetric spacetime can be a model of Boson Star. We use (3+1) split of Einstein equation (ADM formulation of general relativity) to solve Einstein field equation coupled to a complex scalar field (Einstein-Klein-Gordon Equation) on time-dependent spherically symmetric spacetime, We get the result that Boson stars are pulsating stars with the frequency of oscillation equal to its density. We search for interior solution of Boson stars and get the T.O.V. (Tollman-Oppenheimer-Volkoff) equation for Boson stars. Using T.O.V. equation, we get the equation of state and the relation between pressure and density, its total mass and along with its gravitational Mass. We found that the hypothetical particle Axion could form a Boson star with the size of a milky way galaxy and make it a candidate for a dark galaxy, (a galaxy that consists almost entirely of dark matter).Keywords: axion, boson star, dark galaxy, time-dependent spherically symmetric spacetime
Procedia PDF Downloads 244116 A Less Complexity Deep Learning Method for Drones Detection
Authors: Mohamad Kassab, Amal El Fallah Seghrouchni, Frederic Barbaresco, Raed Abu Zitar
Abstract:
Detecting objects such as drones is a challenging task as their relative size and maneuvering capabilities deceive machine learning models and cause them to misclassify drones as birds or other objects. In this work, we investigate applying several deep learning techniques to benchmark real data sets of flying drones. A deep learning paradigm is proposed for the purpose of mitigating the complexity of those systems. The proposed paradigm consists of a hybrid between the AdderNet deep learning paradigm and the Single Shot Detector (SSD) paradigm. The goal was to minimize multiplication operations numbers in the filtering layers within the proposed system and, hence, reduce complexity. Some standard machine learning technique, such as SVM, is also tested and compared to other deep learning systems. The data sets used for training and testing were either complete or filtered in order to remove the images with mall objects. The types of data were RGB or IR data. Comparisons were made between all these types, and conclusions were presented.Keywords: drones detection, deep learning, birds versus drones, precision of detection, AdderNet
Procedia PDF Downloads 182115 Exploring the Compatibility of The Rhizome and Complex Adaptive System (CAS) Theory as a Hybrid Urban Strategy Via Aggregation, Nonlinearity, and Flow
Authors: Sudaff Mohammed, Wahda Shuker Al-Hinkawi, Nada Abdulmueen Hasan
Abstract:
The compatibility of the Rhizome and Complex Adaptive system theory as a strategy within the urban context is the essential interest of this paper since there are only a few attempts to establish a hybrid, multi-scalar, and developable strategy based on the concept of the Rhizome and the CAS theory. This paper aims to establish a Rhizomic CAS strategy for different urban contexts by investigating the principles, characteristics, properties, and mechanisms of Rhizome and Complex Adaptive Systems. The research focused mainly on analyzing three properties: aggregation, non-linearity, and flow through the lens of Rhizome, Rhizomatization of CAS properties. The most intriguing result is that the principal and well-investigated characteristics of Complex Adaptive systems can be ‘Rhizomatized’ in two ways; highlighting commonalities between Rhizome and Complex Adaptive systems in addition to using Rhizome-related concepts. This paper attempts to emphasize the potency of the Rhizome as an apparently stochastic and barely anticipatable structure that can be developed to analyze cities of distinctive contexts for formulating better customized urban strategies.Keywords: rhizome, complex adaptive system (CAS), system Theory, urban system, rhizomatic CAS, assemblage, human occupation impulses (HOI)
Procedia PDF Downloads 43114 Callus Induction of Segmented Corm Explant of Gladiolus cv. White Prosperity and Regeneration in vitro Condition
Authors: M. Sepahvand, M. Khorushy
Abstract:
Gladiolus, being a cormous plant, it is principally propagated by the natural multiplication of new corms and cormels. In order to obtain callus from segmented corm which was obtained from in vitro culture, callus formation media were MS media supplemented with 4 levels of hormones such as 1.0 mg l-1 NAA + 0.5 mg l-1 BAP, 0.5 mg l-1 NAA + 0.25 mg l-1 BAP, 1.0 mg l-1 2, 4-D + 0.5 mg l-1 BAP, and 0.5 mg l-1 2, 4-D + 0.25 mg l-1 BAP. The results showed that the most weight of callus (2.28 g) was produced in MS callus formation media which were supplemented with 1.0 mg l-1 NAA + 0.5 mg l-1 BAP. This experiment was carried out in randomized completely design with 3 replications and each treatment with six jars. In second experiment for regeneration of callus, a factorial experiment in the form of randomized complete design with 12 treatments and 3 replications and each replication with six jars was carried out. The treatments consisted of callus culture media in 4 levels and regeneration culture media in 3 levels [control (no PGRs), MS with 0.2 mg l-1 BAP + 0.1 mg l-1 Kin + 0.01 mg l-1 NAA, and MS with 0.2 mg l-1 BAP + 0.05 mg l-1 Kin + 0.01 mg l-1 NAA]. The results showed that the best regeneration media were MS media which were supplemented with 0.2 mg l-1 BAP + 0.1 mg l-1 Kin. + 0.01 mg l-1 NAA that had the highest number of shoots (7/83 N), and shoot length (7/3 cm).Keywords: regeneration, Segmented corm explant, callus, in vitro, gladiolus cv. white prosperity
Procedia PDF Downloads 450113 „Real and Symbolic in Poetics of Multiplied Screens and Images“
Authors: Kristina Horvat Blazinovic
Abstract:
In the context of a work of art, one can talk about the idea-concept-term-intention expressed by the artist by using various forms of repetition (external, material, visible repetition). Such repetitions of elements (images in space or moving visual and sound images in time) suggest a "covert", "latent" ("dressed") repetition – i.e., "hidden", "latent" term-intention-idea. Repeating in this way reveals a "deeper truth" that the viewer needs to decode and which is hidden "under" the technical manifestation of the multiplied images. It is not only images, sounds, and screens that are repeated - something else is repeated through them as well, even if, in some cases, the very idea of repetition is repeated. This paper examines serial images and single-channel or multi-channel artwork in the field of video/film art and video installations, which in a way implies the concept of repetition and multiplication. Moving or static images and screens (as multi-screens) are repeated in time and space. The categories of the real and the symbolic partly refer to the Lacan registers of reality, i.e., the Imaginary - Symbolic – Real trinity that represents the orders within which human subjectivity is established. Authors such as Bruce Nauman, VALIE EXPORT, Ragnar Kjartansson, Wolf Vostell, Shirin Neshat, Paul Sharits, Harun Farocki, Dalibor Martinis, Andy Warhol, Douglas Gordon, Bill Viola, Frank Gillette, and Ira Schneider, and Marina Abramovic problematize, in different ways, the concept and procedures of multiplication - repetition, but not in the sense of "copying" and "repetition" of reality or the original, but of repeated repetitions of the simulacrum. Referential works of art are often connected by the theme of the traumatic. Repetitions of images and situations are a response to the traumatic (experience) - repetition itself is a symptom of trauma. On the other hand, repeating and multiplying traumatic images results in a new traumatic effect or cancels it. Reflections on repetition as a temporal and spatial phenomenon are in line with the chapters that link philosophical considerations of space and time and experience temporality with their manifestation in works of art. The observations about time and the relation of perception and memory are according to Henry Bergson and his conception of duration (durée) as "quality of quantity." The video works intended to be displayed as a video loop, express the idea of infinite duration ("pure time," according to Bergson). The Loop wants to be always present - to fixate in time. Wholeness is unrecognizable because the intention is to make the effect infinitely cyclic. Reflections on time and space end with considerations about the occurrence and effects of time and space intervals as places and moments "between" – the points of connection and separation, of continuity and stopping - by reference to the "interval theory" of Soviet filmmaker DzigaVertov. The scale of opportunities that can be explored in interval mode is wide. Intervals represent the perception of time and space in the form of pauses, interruptions, breaks (e.g., emotional, dramatic, or rhythmic) denote emptiness or silence, distance, proximity, interstitial space, or a gap between various states.Keywords: video installation, performance, repetition, multi-screen, real and symbolic, loop, video art, interval, video time
Procedia PDF Downloads 173112 Two-Photon-Exchange Effects in the Electromagnetic Production of Pions
Authors: Hui-Yun Cao, Hai-Qing Zhou
Abstract:
The high precision measurements and experiments play more and more important roles in particle physics and atomic physics. To analyse the precise experimental data sets, the corresponding precise and reliable theoretical calculations are necessary. Until now, the form factors of elemental constituents such as pion and proton are still attractive issues in current Quantum Chromodynamics (QCD). In this work, the two-photon-exchange (TPE) effects in ep→enπ⁺ at small -t are discussed within a hadronic model. Under the pion dominance approximation and the limit mₑ→0, the TPE contribution to the amplitude can be described by a scalar function. We calculate TPE contributions to the amplitude, and the unpolarized differential cross section with the only elastic intermediate state is considered. The results show that the TPE corrections to the unpolarized differential cross section are about from -4% to -20% at Q²=1-1.6 GeV². After considering the TPE corrections to the experimental data sets of unpolarized differential cross section, we analyze the TPE corrections to the separated cross sections σ(L,T,LT,TT). We find that the TPE corrections (at Q²=1-1.6 GeV²) to σL are about from -10% to -30%, to σT are about 20%, and to σ(LT,TT) are much larger. By these analyses, we conclude that the TPE contributions in ep→enπ⁺ at small -t are important to extract the separated cross sections σ(L,T,LT,TT) and the electromagnetic form factor of π⁺ in the experimental analysis.Keywords: differential cross section, form factor, hadronic, two-photon
Procedia PDF Downloads 133111 Robust Numerical Scheme for Pricing American Options under Jump Diffusion Models
Authors: Salah Alrabeei, Mohammad Yousuf
Abstract:
The goal of option pricing theory is to help the investors to manage their money, enhance returns and control their financial future by theoretically valuing their options. However, most of the option pricing models have no analytical solution. Furthermore, not all the numerical methods are efficient to solve these models because they have nonsmoothing payoffs or discontinuous derivatives at the exercise price. In this paper, we solve the American option under jump diffusion models by using efficient time-dependent numerical methods. several techniques are integrated to reduced the overcome the computational complexity. Fast Fourier Transform (FFT) algorithm is used as a matrix-vector multiplication solver, which reduces the complexity from O(M2) into O(M logM). Partial fraction decomposition technique is applied to rational approximation schemes to overcome the complexity of inverting polynomial of matrices. The proposed method is easy to implement on serial or parallel versions. Numerical results are presented to prove the accuracy and efficiency of the proposed method.Keywords: integral differential equations, jump–diffusion model, American options, rational approximation
Procedia PDF Downloads 120110 Analysis of Active Compounds in Thai Herbs by near Infrared Spectroscopy
Authors: Chaluntorn Vichasilp, Sutee Wangtueai
Abstract:
This study aims to develop a new method to detect active compounds in Thai herbs (1-deoxynojirimycin (DNJ) in mulberry leave, anthocyanin in Mao and curcumin in turmeric) using near infrared spectroscopy (NIRs). NIRs is non-destructive technique that rapid, non-chemical involved and low-cost determination. By NIRs and chemometrics technique, it was found that the DNJ prediction equation conducted with partial least square regression with cross-validation had low accuracy R2 (0.42) and SEP (31.87 mg/100g). On the other hand, the anthocyanin prediction equation showed moderate good results (R2 and SEP of 0.78 and 0.51 mg/g) with Multiplication scattering correction at wavelength of 2000-2200 nm. The high absorption could be observed at wavelength of 2047 nm and this model could be used as screening level. For curcumin prediction, the good result was obtained when applied original spectra with smoothing technique. The wavelength of 1400-2500 nm was created regression model with R2 (0.68) and SEP (0.17 mg/g). This model had high NIRs absorption at a wavelength of 1476, 1665, 1986 and 2395 nm, respectively. NIRs showed prospective technique for detection of some active compounds in Thai herbs.Keywords: anthocyanin, curcumin, 1-deoxynojirimycin (DNJ), near infrared spectroscopy (NIRs)
Procedia PDF Downloads 382109 On the Use of Reliability Factors to Reduce Conflict between Information Sources in Dempster-Shafer Theory
Authors: A. Alem, Y. Dahmani, A. Hadjali, A. Boualem
Abstract:
Managing the problem of the conflict, either by using the Dempster-Shafer theory, or by the application of the fusion process to push researchers in recent years to find ways to get to make best decisions especially; for information systems, vision, robotic and wireless sensor networks. In this paper we are interested to take account of the conflict in the combination step that took the conflict into account and tries to manage such a way that it does not influence the decision step, the conflict what from reliable sources. According to [1], the conflict lead to erroneous decisions in cases where was with strong degrees between sources of information, if the conflict is more than the maximum of the functions of belief mass K > max1...n (mi (A)), then the decision becomes impossible. We will demonstrate in this paper that the multiplication of mass functions by coefficients of reliability is a decreasing function; it leads to the reduction of conflict and a good decision. The definition of reliability coefficients accurately and multiply them by the mass functions of each information source to resolve the conflict and allow deciding whether the degree of conflict. The evaluation of this technique is done by a use case; a comparison of the combination of springs with a maximum conflict without, and with reliability coefficients.Keywords: Dempster-Shafer theory, fusion process, conflict managing, reliability factors, decision
Procedia PDF Downloads 426108 A Fuzzy Analytic Hierarchy Process Approach for the Decision of Maintenance Priorities of Building Entities: A Case Study in a Facilities Management Company
Authors: Wai Ho Darrell Kwok
Abstract:
Building entities are valuable assets of a society, however, all of them are suffered from the ravages of weather and time. Facilitating onerous maintenance activities is the only way to either maintain or enhance the value and contemporary standard of the premises. By the way, maintenance budget is always bounded by the corresponding threshold limit. In order to optimize the limited resources allocation in carrying out maintenance, there is a substantial need to prioritize maintenance work. This paper reveals the application of Fuzzy AHP in a Facilities Management Company determining the maintenance priorities on the basis of predetermined criteria, viz., Building Status (BS), Effects on Fabrics (EF), Effects on Sustainability (ES), Effects on Users (EU), Importance of Usage (IU) and Physical Condition (PC) in dealing with categorized 8 predominant building components maintenance aspects for building premises. From the case study, it is found that ‘building exterior repainting or re-tiling’, ‘spalling concrete repair works among exterior area’ and ‘lobby renovation’ are the top three maintenance priorities from facilities manager and maintenance expertise personnel. Through the application of the Fuzzy AHP for maintenance priorities decision algorithm, a more systemic and easier comparing scalar linearity factors being explored even in considering other multiple criteria decision scenarios of building maintenance issue.Keywords: building maintenance, fuzzy AHP, maintenance priority, multi-criteria decision making
Procedia PDF Downloads 243107 Riemannain Geometries Of Visual Space
Authors: Jacek Turski
Abstract:
The visual space geometries are constructed in the Riemannian geometry framework from simulated iso-disparity conics in the horizontalvisual plane of the binocular system with the asymmetric eyes (AEs). For the eyes fixating at the abathic distance, which depends on the AE’s parameters, the iso-disparity conics are frontal straight lines in physical space. For allother fixations, the iso-disparity conics consist of families of the ellipses or hyperbolas depending on both the AE’s parameters and the bifoveal fixation. However, the iso-disparity conic’s arcs are perceived in the gaze direction asthe frontal lines and are referred to as visual geodesics. Thus, geometriesof physical and visual spaces are different. A simple postulate that combines simulated iso-disparity conics with basic anatomy od the human visual system gives the relative depth for the fixation at the abathic distance that establishes the Riemann matric tensor. The resulting geodesics are incomplete in the gaze direction and, therefore, give thefinite distances to the horizon that depend on the AE’s parameters. Moreover, the curvature vanishes in this eyes posture such that visual space is flat. For all other fixations, only the sign of the curvature canbe inferred from the global behavior of the simulated iso-disparity conics: the curvature is positive for the elliptic iso-disparity curves and negative for the hyperbolic iso-disparity curves.Keywords: asymmetric eye model, iso-disparity conics, metric tensor, geodesics, curvature
Procedia PDF Downloads 145