Search results for: transmission strategy
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5579

Search results for: transmission strategy

3539 Barrier Properties of Starch-Ethylene Vinyl Alcohol Nanocomposites

Authors: Farid Amidi Fazli

Abstract:

Replacement of plastics used in the food industry seems to be a serious issue to overcome mainly the environmental problems in recent years. This study investigates the hydrophilicity and permeability properties of starch biopolymer which ethylene vinyl alcohol (EVOH) (0-10%) and nanocrystalline cellulose (NCC) (1 -15%) were used to enhance its properties. Starch -EVOH nanocomposites were prepared by casting method in different formulations. NCC production by acid hydrolysis was confirmed by scanning electron microscopy. Solubility, water vapor permeability, water vapor transmission rate and moisture absorbance were measured on each of the nanocomposites. The results were analyzed by SAS software. The lowest moisture absorbance was measured in pure starch nanocomposite containing 8% NCC. The lowest permeability to water vapor belongs to starch nanocomposite containing 8% NCC and the sample containing 7.8% EVOH and 13% NCC. Also, the lowest solubility was observed in the composite contains the highest amount of EVOH. Applied Process resulted in production of bio films which have good resistance to water vapor permeability and solubility in water. The use of NCC and EVOH leads to reduced moisture absorbance property of the biofilms.

Keywords: starch, EVOH, nanocrystalline cellulose, hydrophilicity

Procedia PDF Downloads 408
3538 Examples of Techniques and Algorithms Used in Wlan Security

Authors: Vahid Bairami Rad

Abstract:

Wireless communications offer organizations and users many benefits such as portability and flexibility, increased productivity, and lower installation costs. Wireless networks serve as the transport mechanism between devices and among devices and the traditional wired networks (enterprise networks and the internet). Wireless networks are many and diverse but are frequently categorized into three groups based on their coverage range: WWAN, WLAN, and WPAN. WWAN, representing wireless wide area networks, includes wide coverage area technologies such as 2G cellular, Cellular Digital Packet Data (CDPD), Global System for Mobile Communications (GSM), and Mobitex. WLAN, representing wireless local area networks, includes 802.11, Hyper lan, and several others. WPAN, represents wireless personal area network technologies such as Bluetooth and Infrared. The security services are provided largely by the WEP (Wired Equivalent Privacy) protocol to protect link-level data during wireless transmission between clients and access points. That is, WEP does not provide end-to-end security but only for the wireless portion of the connection.

Keywords: wireless lan, wired equivalent privacy, wireless network security, wlan security

Procedia PDF Downloads 562
3537 Investigating the Successes of in vitro Embryogenesis

Authors: Zelikha Labbani

Abstract:

The in vitro isolated microspore culture is the most powerful androgenic pathway to produce doubled haploid plants in the short time. To deviate a microspore toward embryogenesis, a number of factors, different for each species, must concur at the same time and place. Once induced, the microspore undergoes numerous changes at different levels, from overall morphology to gene expression. Induction of microspore embryogenesis not only implies the expression of an embryogenic program, but also a stress-related cellular response and a repression of the gametophytic program to revert the microspore to a totipotent status. As haploid single cells, microspore became a strategy to achieve various objectives particularly in genetic engineering. In this communication we would show the most recent advances in the producing haploid embryos via in vitro isolated microspore culture.

Keywords: in vitro isolated microspore culture, success, haploid cells, bioinformatics, biomedicine

Procedia PDF Downloads 470
3536 Perception, Awareness and Attitude of Muslim Academicians on Islamic Banking Products in Kano State of Nigeria

Authors: Muhammad Abdullahi Mago

Abstract:

Islamic Banking began in Nigeria last three years and the sector has shown the sign of bright future for the sector and the Nigerian economy, within this very short time it is important to know the perception of the customers particularly learned or educated individuals for immediate evaluation and adjustment. This study investigates into the perception, awareness and attitudes of the academicians in the most populous state/place in Nigeria with more than 90% muslims, and the results has shown a relatively low levels results in all the variables of the study.The study recommends aggressive marketing strategy for the Banks operating within the sector.

Keywords: Islamic Banking Products, Islamic Financial Products, academicians, Islamic finance industry, perception, awareness and attitude

Procedia PDF Downloads 430
3535 Research on Coordination Strategies for Coordinating Supply Chain Based on Auction Mechanisms

Authors: Changtong Wang, Lingyun Wei

Abstract:

The combination of auctions and supply chains is of great significance in improving the supply chain management system and enhancing the efficiency of economic and social operations. To address the gap in research on supply chain strategies under the auction mechanism, a model is developed for the 1-N auction model in a complete information environment, and it is concluded that the two-part contract auction model for retailers in this model can achieve supply chain coordination. The model is validated by substituting the model into the scenario of a fresh-cut flower industry flower auction in exchange for arithmetic examples to further prove the validity of the conclusions.

Keywords: auction mechanism, supply chain coordination strategy, fresh cut flowers industry, supply chain management

Procedia PDF Downloads 118
3534 Neo-Liberal Challenge - Apple in China

Authors: Mark McKeown

Abstract:

Press articles opining on how China has become the West’s biggest threat have become so common as to feel like old news. Since the United States shifted diplomatic recognition from Taiwan to the People’s Republic of China in 1979 the relationship between the world’s two largest economies has been at best a brittle one. This coiled tension has grown as trade between the two countries snaked ever upwards. As a byproduct of globalization Apple have focused much of their production and assembly in China. This has left the U.S. Big Tech company with several challenges. This paper focusses on the tightrope Apple now has to traverse. The majority of the data and analysis within this paper is sourced from my current ongoing PhD research on the influence of Big Tech lobbying on U.S. foreign policy. One of the main conclusions from this analysis is Apple has to adopt a carefully nuanced strategy of appeasement to avoid friction, with both the governments of China and the United States.

Keywords: apple, China, Taiwan, war

Procedia PDF Downloads 58
3533 On Dynamic Chaotic S-BOX Based Advanced Encryption Standard Algorithm for Image Encryption

Authors: Ajish Sreedharan

Abstract:

Security in transmission and storage of digital images has its importance in today’s image communications and confidential video conferencing. Due to the increasing use of images in industrial process, it is essential to protect the confidential image data from unauthorized access. Advanced Encryption Standard (AES) is a well known block cipher that has several advantages in data encryption. However, it is not suitable for real-time applications. This paper presents modifications to the Advanced Encryption Standard to reflect a high level security and better image encryption. The modifications are done by adjusting the ShiftRow Transformation and using On Dynamic chaotic S-BOX. In AES the Substitute bytes, Shift row and Mix columns by themselves would provide no security because they do not use the key. In Dynamic chaotic S-BOX Based AES the Substitute bytes provide security because the S-Box is constructed from the key. Experimental results verify and prove that the proposed modification to image cryptosystem is highly secure from the cryptographic viewpoint. The results also prove that with a comparison to original AES encryption algorithm the modified algorithm gives better encryption results in terms of security against statistical attacks.

Keywords: advanced encryption standard (AES), on dynamic chaotic S-BOX, image encryption, security analysis, ShiftRow transformation

Procedia PDF Downloads 429
3532 The Dao of Political Economy - A Holistic Perspective

Authors: Tao Peng

Abstract:

This paper presents a holistic model of political economy based on Daoism – the foundational philosophy of classical Chinese epistemology. Daoism is both comprehensive and subtle in its manifestations and applications in all aspects of nature and society. Based on Daoist creation theory of the universe, life theory and five element functioning theory, a holistic model in economics with minimal assumptions and independent of ideology are constructed. Under this framework, different schools of economics, such as neo-liberal, Marxism, and Austrian school, are explored and shed new light on. Economic and financial predictions can be realized in applications to Qi Men Dun Jia. This framework can provide guidelines and inspirations to economic modelling, economic policies formulation and strategy development and guide society towards a more sustainable future.

Keywords: daoism, economics, holistic, philosophy

Procedia PDF Downloads 80
3531 A Novel Design in the Use of Planar Transformers for LDMOS Based Amplifiers in Bands II, III, DRM+, DVB-T and DAB+

Authors: Antonis Constantinides, Christos Yiallouras, Christakis Damianou

Abstract:

The coaxial transformer-coupled push-pull circuitry has been used widely in HF and VHF amplifiers for many decades without significant changes in the topology of the transformers. Basic changes over the years concerned the construction and turns ratio of the transformers as has been imposed upon the newer technologies active devices demands. The balun transmission line transformers applied in push-pull amplifiers enable input/output impedance transformation, but are mainly used to convert the balanced output into unbalanced and the input unbalanced into balanced. A simple and affordable alternative solution over the traditional coaxial transformer is the coreless planar balun. A key advantage over the traditional approach lies in the high specifications repeatability; simplifying the amplifier construction requirements as the planar balun constitutes an integrated part of the PCB copper layout. This paper presents the performance analysis of a planar LDMOS MRFE6VP5600 Push-Pull amplifier that enables robust operation in Band III, DVB-T, DVB-T2 standards but functions equally well in Band II, for DRM+ new generation transmitters.

Keywords: amplifier, balun, complex impedance, LDMOS, planar-transformers

Procedia PDF Downloads 436
3530 Design of Lead-Lag Based Internal Model Controller for Binary Distillation Column

Authors: Rakesh Kumar Mishra, Tarun Kumar Dan

Abstract:

Lead-Lag based Internal Model Control method is proposed based on Internal Model Control (IMC) strategy. In this paper, we have designed the Lead-Lag based Internal Model Control for binary distillation column for SISO process (considering only bottom product). The transfer function has been taken from Wood and Berry model. We have find the composition control and disturbance rejection using Lead-Lag based IMC and comparing with the response of simple Internal Model Controller.

Keywords: SISO, lead-lag, internal model control, wood and berry, distillation column

Procedia PDF Downloads 637
3529 A Method for Compression of Short Unicode Strings

Authors: Masoud Abedi, Abbas Malekpour, Peter Luksch, Mohammad Reza Mojtabaei

Abstract:

The use of short texts in communication has been greatly increasing in recent years. Applying different languages in short texts has led to compulsory use of Unicode strings. These strings need twice the space of common strings, hence, applying algorithms of compression for the purpose of accelerating transmission and reducing cost is worthwhile. Nevertheless, other compression methods like gzip, bzip2 or PAQ due to high overhead data size are not appropriate. The Huffman algorithm is one of the rare algorithms effective in reducing the size of short Unicode strings. In this paper, an algorithm is proposed for compression of very short Unicode strings. At first, every new character to be sent to a destination is inserted in the proposed mapping table. At the beginning, every character is new. In case the character is repeated for the same destination, it is not considered as a new character. Next, the new characters together with the mapping value of repeated characters are arranged through a specific technique and specially formatted to be transmitted. The results obtained from an assessment made on a set of short Persian and Arabic strings indicate that this proposed algorithm outperforms the Huffman algorithm in size reduction.

Keywords: Algorithms, Data Compression, Decoding, Encoding, Huffman Codes, Text Communication

Procedia PDF Downloads 342
3528 Implementation of Total Quality Management in Public Sector: Case of Tunisia

Authors: Rafla Hchaichi

Abstract:

The public administration is currently experiencing in the field of quality unprecedented effervescence. However, in a globalized world more and more competitive, public services are confronted with the need to improve their performances which push public companies to implement quality approaches. Quality approaches have taken diverse forms such as service commitment, labels, certifications and the Common Assessment Framework. This paper provides an overview on the strategy for administrative development in Tunisia since the Carthaginian civilization until today. It outlines the evolution of quality management in the Tunisian public context while focusing on the National Referential of Quality of Administrative Services.

Keywords: quality approach, the common assessment framework, service commitment, label, certification, quality of public service, performance of public service, Tunisian Public Service

Procedia PDF Downloads 548
3527 Network Coding with Buffer Scheme in Multicast for Broadband Wireless Network

Authors: Gunasekaran Raja, Ramkumar Jayaraman, Rajakumar Arul, Kottilingam Kottursamy

Abstract:

Broadband Wireless Network (BWN) is the promising technology nowadays due to the increased number of smartphones. Buffering scheme using network coding considers the reliability and proper degree distribution in Worldwide interoperability for Microwave Access (WiMAX) multi-hop network. Using network coding, a secure way of transmission is performed which helps in improving throughput and reduces the packet loss in the multicast network. At the outset, improved network coding is proposed in multicast wireless mesh network. Considering the problem of performance overhead, degree distribution makes a decision while performing buffer in the encoding / decoding process. Consequently, BuS (Buffer Scheme) based on network coding is proposed in the multi-hop network. Here the encoding process introduces buffer for temporary storage to transmit packets with proper degree distribution. The simulation results depend on the number of packets received in the encoding/decoding with proper degree distribution using buffering scheme.

Keywords: encoding and decoding, buffer, network coding, degree distribution, broadband wireless networks, multicast

Procedia PDF Downloads 397
3526 Antibacterial Activity of Noble Metal Functionalized Magnetic Core-Zeolitic Shell Nanostructures

Authors: Mohsen Padervand

Abstract:

Functionalized magnetic core-zeolitic shell nanostructures were prepared by the hydrothermal and coprecipitation methods. The products were characterized by Vibrating Sample Magnetometer (VSM), X-ray powder diffraction (XRD), Fourier Transform Infrared spectra (FTIR), nitrogen adsorption-desorption isotherms (BET) and Transmission Electron Microscopy (TEM). The growth of mordenite nanoparticles on the surface of silica coated nickel ferrite nanoparticles at the presence of organic templates was well approved. The antibacterial activity of prepared samples was investigated by the inactivation of E.coli as a gram negative bacterium. A new mechanism was proposed to inactivate the bacterium over the prepared samples. Minimum Inhibitory Concentration (MIC) and reuse ability were studied too. TEM images of the destroyed microorganism after the treatment time were applied to illustrate the inactivation mechanism. The interaction of the noble metals with organic components on the surface of nanostructures studied theoretically and the results were used to interpret the experimental results.

Keywords: nickel ferrite nanoparticles, magnetic core-zeolitic shell, antibacterial activity, E. coli

Procedia PDF Downloads 326
3525 Green Synthesis of Silver Nanoparticles from Citrus aurantium Aqueous Pollen Extract and Their Antibacterial Activity

Authors: Mohammad Ali Karimi, Hossein Tavallali, Abdolhamid Hatefi-Mehrjardi

Abstract:

Pollen extract of in vitro plants raised of Citrus aurantium as reducer and stabilizer was assessed for the green synthesis of silver nanoparticles (AgNPs). The synthesis of AgNPs was performed at room temperature assisting in solutions by reduction takes place rapidly for 10 min. Surface plasmon resonance (SPR) peaks in UV–Vis spectra indicated the formation of polydispersive AgNPs. Silver ions concentration, pH, temperature and reaction time were optimized in the synthesis of AgNPs. The nanoparticles obtained were characterized by UV-Vis spectrophotometer, transmission electron microscopy (TEM). X-ray diffraction (XRD) and Fourier transform infrared (FTIR) spectroscopy techniques. The synthesized AgNPs were mostly spherical in shape with an average size of 15 nm. XRD study shows that the AgNPs are crystalline in nature with face-centered cubic (fcc) geometry. It shows the significant antibacterial efficacy against Gram-positive (Staphylococcus aureus) and Gram-negative bacteria (Escherichia coli) by disk diffusion method using Mueller-Hinton Agar.

Keywords: green synthesis, Citrus aurantium, silver nanoparticles, antibacterial activity

Procedia PDF Downloads 282
3524 Convex Restrictions for Outage Constrained MU-MISO Downlink under Imperfect Channel State Information

Authors: A. Preetha Priyadharshini, S. B. M. Priya

Abstract:

In this paper, we consider the MU-MISO downlink scenario, under imperfect channel state information (CSI). The main issue in imperfect CSI is to keep the probability of each user achievable outage rate below the given threshold level. Such a rate outage constraints present significant and analytical challenges. There are many probabilistic methods are used to minimize the transmit optimization problem under imperfect CSI. Here, decomposition based large deviation inequality and Bernstein type inequality convex restriction methods are used to perform the optimization problem under imperfect CSI. These methods are used for achieving improved output quality and lower complexity. They provide a safe tractable approximation of the original rate outage constraints. Based on these method implementations, performance has been evaluated in the terms of feasible rate and average transmission power. The simulation results are shown that all the two methods offer significantly improved outage quality and lower computational complexity.

Keywords: imperfect channel state information, outage probability, multiuser- multi input single output, channel state information

Procedia PDF Downloads 810
3523 Intelligent Computing with Bayesian Regularization Artificial Neural Networks for a Nonlinear System of COVID-19 Epidemic Model for Future Generation Disease Control

Authors: Tahir Nawaz Cheema, Dumitru Baleanu, Ali Raza

Abstract:

In this research work, we design intelligent computing through Bayesian Regularization artificial neural networks (BRANNs) introduced to solve the mathematical modeling of infectious diseases (Covid-19). The dynamical transmission is due to the interaction of people and its mathematical representation based on the system's nonlinear differential equations. The generation of the dataset of the Covid-19 model is exploited by the power of the explicit Runge Kutta method for different countries of the world like India, Pakistan, Italy, and many more. The generated dataset is approximately used for training, testing, and validation processes for every frequent update in Bayesian Regularization backpropagation for numerical behavior of the dynamics of the Covid-19 model. The performance and effectiveness of designed methodology BRANNs are checked through mean squared error, error histograms, numerical solutions, absolute error, and regression analysis.

Keywords: mathematical models, beysian regularization, bayesian-regularization backpropagation networks, regression analysis, numerical computing

Procedia PDF Downloads 136
3522 Investigation of Diseases and Enemies of Bees of Breeding Apis mellifera intermissa (Buttel-Reepen, 1906)

Authors: S. Zenia, L. Bitta, O. Bouhamam, H. Brines, M. Boudriaa, F. Haddadj, F. Marniche, A. Milla, H. Saadi, A. Smai

Abstract:

The bee Apis mellifera intermissa is a major social insect, in addition to its honey production, it is a pillar of our biodiversity. Several living organisms can come into contact with it: bacteria, viruses, protozoa, fungi, mites, and insects. In Algeria, many beekeepers have reported unusual mortality of local bees, loss of foragers and significant losses of their livestock. Despite the presence of a varied honey-bearing flora and a favourable Mediterranean climate, honey production remains low. This phenomenon can be attributed to the excess winter mortality, but also to the increasing difficulties that beekeepers face in maintaining healthy bee colonies, particularly bee diseases and their transmission facilitated by trade and beekeeping practices. Our survey is based on a questionnaire composed of several parts. The results obtained show that the disease that most affects bees according to beekeepers is varroa mite with 93% followed by fungi with 26%. The most replied enemy of bees is the false ringworm with 73%, followed by the bee-eater with 63%. Our goal is to determine the causes of this low production in two areas: Bejaia and Tizi-Ouzou.

Keywords: diseases, Apis mellifera L., varroa, European foulbrood

Procedia PDF Downloads 158
3521 Stress Analysis of Vertebra Using Photoelastic and Finite Element Methods

Authors: Jamal A. Hassan, Ali Q. Abdulrazzaq, Sadiq J. Abass

Abstract:

In this study, both the photoelastic, as well as the finite element methods, are used to study the stress distribution within human vertebra (L4) under forces similar to those that occur during normal life. Two & three dimensional models of vertebra were created by the software AutoCAD. The coordinates obtained were fed into a computer numerical control (CNC) tensile machine to fabricate the models from photoelastic sheets. Completed models were placed in a transmission polariscope and loaded with static force (up to 1500N). Stresses can be quantified and localized by counting the number of fringes. In both methods the Principle stresses were calculated at different regions. The results noticed that the maximum von-mises stress on the area of the extreme superior vertebral body surface and the facet surface with high normal stress (σ) and shear stress (τ). The facets and other posterior elements have a load-bearing function to help support the weight of the upper body and anything that it carries, and are also acted upon by spinal muscle forces. The numerical FE results have been compared with the experimental method using photoelasticity which shows good agreement between experimental and simulation results.

Keywords: photoelasticity, stress, load, finite element

Procedia PDF Downloads 284
3520 Identification of Arglecins B and C and Actinofuranosin A from a Termite Gut-Associated Streptomyces Species

Authors: Christian A. Romero, Tanja Grkovic, John. R. J. French, D. İpek Kurtböke, Ronald J. Quinn

Abstract:

A high-throughput and automated 1H NMR metabolic fingerprinting dereplication approach was used to accelerate the discovery of unknown bioactive secondary metabolites. The applied dereplication strategy accelerated the discovery of natural products, provided rapid and competent identification and quantification of the known secondary metabolites and avoided time-consuming isolation procedures. The effectiveness of the technique was demonstrated by the isolation and elucidation of arglecins B (1), C (2) and actinofuranosin A (3) from a termite-gut associated Streptomyces sp. (USC 597) grown under solid state fermentation. The structures of these compounds were elucidated by extensive interpretation of 1H, 13C and 2D NMR spectroscopic data. These represent the first report of arglecin analogs isolated from a termite gut-associated Streptomyces species.

Keywords: actinomycetes, actinofuranosin, antibiotics, arglecins, NMR spectroscopy

Procedia PDF Downloads 54
3519 Age-Stage, Two-Sex Life Table Characteristics of Aedes albopictus (Skuse) and Aedes aegypti (Linnaeus)) (Diptera: Culicidae) in Penang Island, Malaysia

Authors: A. H. Maimusa, A. Abu Hassan, Nur Faeza A. Kassim

Abstract:

In this study, we report on the main life table developmental attributes of laboratory colonies of wild strains Ae. albopictus and Ae. aegypti. The raw life history data of the two species were analyzed and compared based on the age-stage and two-sex life table. The total pre-adult development times were 9.47 days (Ae. albopictus) and 8.76 days (Ae. aegypti). The adult pre-oviposition periods (APOP) was 1.61 day for Ae. albopictus and 2.02 for Ae. aegypti. The total pre-oviposition period (TPOP) of Ae. albopictus is significantly longer (11.66 days) than (10.75 days) for Ae. aegypti. The mean intrinsic rate of increase (r) was 0.124 days (Ae. albopictus) and 1.151 days (Ae. aegypti) while the mean finite rate of increase (λ) was 1.13 day (Ae. albopictus) and (1.16 d) (Ae. aegypti). The net reproductive rates (Ro) were 8.10 and 10.75 for Ae. albopictus and Ae. aegypti, respectively. The mean generation time (T) for Ae. albopictus and Ae. aegypti, were 16.81 days and 15.77 days respectively. The mean development time for each stage insignificantly correlated with temperature (r = -0.208, p > 0.05) and (r = -0.312, p > 0.05) for Ae. albopictus and Ae. aegypti respectively. The life expectancy was 19.01 and 19.94 days for Ae. albopictus and Ae. aegypti respectively. Mortality occurred mostly during the adult stage and ranged between 0.01 and 0.07%. The population parameters suggest that Ae. albopictus and Ae. aegypti populations are r-strategist characterized by a high r, a large Ro, and short T. This kind of information is crucial in understanding mosquito population dynamics in disease transmission and control.

Keywords: Ae. aegypti, Ae. albopictus, age-stage, life table, two-sex

Procedia PDF Downloads 312
3518 Investigation of Steel-Concrete Composite Bridges under Blasting Loads Based on Slope Reflection

Authors: Yuan Li, Yitao Han, Zhao Zhu

Abstract:

In this paper, the effect of blasting loads on steel-concrete composite bridges has been investigated considering the slope reflection effect. Reasonable values of girder size, plate thickness, stiffening rib, and other design parameters were selected according to design specifications. Modified RHT (Riedel-Hiermaier-Thoma) was used as constitutive relation in analyses. In order to simulate the slope reflection effect, the slope of the bridge was precisely built in the model. Different blasting conditions, including top, middle, and bottom explosions, were simulated. The multi-Euler domain method based on fully coupled Lagrange and Euler models was adopted for the structural analysis of the explosion process using commercial software AUTODYN. The obtained results showed that explosion overpressure was increased by 3006, 879, and 449kPa, corresponding to explosions occurring at the top, middle, and bottom of the slope, respectively. At the same time, due to energy accumulation and transmission dissipation caused by slope reflection, the corresponding yield lengths of steel beams were increased by 8, 0, and 5m, respectively.

Keywords: steel-concrete composite bridge, explosion damage, slope reflection, blasting loads, RHT

Procedia PDF Downloads 89
3517 Global Mittag-Leffler Stability of Fractional-Order Bidirectional Associative Memory Neural Network with Discrete and Distributed Transmission Delays

Authors: Swati Tyagi, Syed Abbas

Abstract:

Fractional-order Hopfield neural networks are generally used to model the information processing among the interacting neurons. To show the constancy of the processed information, it is required to analyze the stability of these systems. In this work, we perform Mittag-Leffler stability for the corresponding Caputo fractional-order bidirectional associative memory (BAM) neural networks with various time-delays. We derive sufficient conditions to ensure the existence and uniqueness of the equilibrium point by using the theory of topological degree theory. By applying the fractional Lyapunov method and Mittag-Leffler functions, we derive sufficient conditions for the global Mittag-Leffler stability, which further imply the global asymptotic stability of the network equilibrium. Finally, we present two suitable examples to show the effectiveness of the obtained results.

Keywords: bidirectional associative memory neural network, existence and uniqueness, fractional-order, Lyapunov function, Mittag-Leffler stability

Procedia PDF Downloads 352
3516 Urban Development from the Perspective of Lou Gang Polder System: Taihu Lake, Huzhou as an Example

Authors: Wei Bin Shen

Abstract:

Lou Gang world irrigation project heritage in Taihu Lake is a systematic irrigation project integrating water conservancy, ecology and culture. Through the methods of historical documents and field investigation, this paper deeply analyzes the formation history, connotation and value of Lou Gang polder system: Lou Gang heritage, describes in detail the relationship between Lou Gang polder system in Taihu Lake and the development and evolution of Huzhou City, and initially explores the protection and Utilization Strategies of Lou Gang water conservancy cultural heritage resources in Taihu Lake from the current situation.

Keywords: Lou Gang, protection strategy, urban evolution, waterconservancyculturalheritage

Procedia PDF Downloads 163
3515 Study of Cavitation Phenomena Based on Flow Visualization Test in 3-Way Reversing Valve

Authors: Hyo Lim Kang, Tae An Kim, Seung Ho Han

Abstract:

A 3-way reversing valve has been used in automotive washing machines to remove remaining oil and dirt on machined engine and transmission blocks. It provides rapid and accurate changes of water flow direction without any precise control device. However, due to its complicated bottom-plug shape, a cavitation occurs in a wide range of the bottom-plug in a downstream. In this study, the cavitation index and POC (percent of cavitation) were used to evaluate quantitatively the cavitation phenomena occurring at the bottom-plug. An optimal shape design was carried out via parametric study for geometries of the bottom-plug, in which a simple CAE-model was used in order to avoid time-consuming CFD analysis and hard to achieve convergence. To verify the results of numerical analysis, a flow visualization test was carried out using a test specimen with a transparent acryl pipe according to ISA-RP75.23. The flow characteristics such as the cavitation occurring in the downstream were investigated by using a flow test equipment with valve and pump including a flow control system and high-speed camera.

Keywords: cavitation, flow visualization test, optimal shape design, percent of cavitation, reversing valve

Procedia PDF Downloads 297
3514 Searching for an Effective Marketing in the Food Supplement Industry in Japan

Authors: Michiko Miyamoto

Abstract:

The market for "functional foods" and "foods with functional claims" that are effective in maintaining and improving health, has expanded year by year due to the entry of major food and beverage manufacturers following the introduction of the specified health food system in 1991 in Japan. To bring health claims related products or services to the market, it is necessary to let consumers to learn about these products or services; an effective marketing through advertising are important. This research proposes a framework for an effective advertisement medium for the food supplement industry by using survey data of 2,500 people.

Keywords: functional foods, dietary supplements, marketing strategy, structural equation modeling

Procedia PDF Downloads 140
3513 Nonlinear Relationship between Globalization and Control of Corruption along with Economic Growth

Authors: Elnaz Entezar, Reza Ezzati

Abstract:

In recent decades, trade flows, capital, workforce, technology and information have increased between international borders and the globalization has turned to an undeniable process in international economics. Meanwhile, despite the positive aspects of globalization, the critics of globalization opine that the risks and costs of globalization for developing vulnerable economies and the world's impoverished people are high and significant. In this regard, this study by using the data of KOF Economic Institute and the World Bank for 113 different countries during the period 2002-2012, by taking advantage of panel smooth transition regression, and by taking the gross domestic product as transmission variables discuss the nonlinear relationship between research variables. The results have revealed that globalization in low regime (countries with low GDP) has negative impact whereas in high regime (countries with high GDP) has a positive impact. In spite of the fact that in the early stages of growth, control of corruption has a positive impact on economic growth, after a threshold has a negative impact on economic growth.

Keywords: globalization, corruption, panel smooth transition model, economic growth, threshold, economic convergence

Procedia PDF Downloads 287
3512 On the Derivation of Variable Step BBDF for Solving Second Order Stiff ODEs

Authors: S. A. M. Yatim, Z. B. Ibrahim, K. I. Othman, M. Suleiman

Abstract:

The method of solving second order stiff ordinary differential equation (ODEs) that is based on backward differentiation formula (BDF) is considered in this paper. We derived the method by increasing the order of the existing method using an improved strategy in choosing the step size. Numerical results are presented to compare the efficiency of the proposed method to the MATLAB’s suite of ODEs solvers namely ode15s and ode23s. The method was found to be efficient to solve second order ordinary differential equation.

Keywords: backward differentiation formulae, block backward differentiation formulae, stiff ordinary differential equation, variable step size

Procedia PDF Downloads 489
3511 A Research Analysis on the Source Technology and Convergence Types

Authors: Kwounghee Choi

Abstract:

Technological convergence between the various sectors is expected to have a very large impact on future industrial and economy. This study attempts to do empirical approach between specific technologies’ classification. For technological convergence classification, it is necessary to set the target technology to be analyzed. This study selected target technology from national research and development plan. At first we found a source technology for analysis. Depending on the weight of source technology, NT-based, BT-based, IT-based, ET-based, CS-based convergence types were classified. This study aims to empirically show the concept of convergence technology and convergence types. If we use the source technology to classify convergence type, it will be useful to make practical strategies of convergence technology.

Keywords: technology convergence, source technology, convergence type, R&D strategy, technology classification

Procedia PDF Downloads 480
3510 An Application of a Feedback Control System to Minimize Unforeseen Disruption in a Paper Manufacturing Industry in South Africa

Authors: Martha E. Ndeley

Abstract:

Operation management is the key element within the manufacturing process. However, during this process, there are a number of unforeseen disruptions that causes the process to a standstill which are, machine breakdown, employees absenteeism, improper scheduling. When this happens, it forces the shop flow to a rescheduling process and these strategy reschedules only a limited part of the initial schedule to match up with the pre-schedule at some point with the objective to create a new schedule that is reliable which in the long run gets disrupted. In this work, we have developed feedback control system that minimizes any form of disruption before the impact becomes severe, the model was tested in a paper manufacturing industries and the results revealed that, if the disruption is minimized at the initial state, the impact becomes unnoticeable.

Keywords: disruption, machine, absenteeism, scheduling

Procedia PDF Downloads 301