Search results for: transmission strategy
3539 Barrier Properties of Starch-Ethylene Vinyl Alcohol Nanocomposites
Authors: Farid Amidi Fazli
Abstract:
Replacement of plastics used in the food industry seems to be a serious issue to overcome mainly the environmental problems in recent years. This study investigates the hydrophilicity and permeability properties of starch biopolymer which ethylene vinyl alcohol (EVOH) (0-10%) and nanocrystalline cellulose (NCC) (1 -15%) were used to enhance its properties. Starch -EVOH nanocomposites were prepared by casting method in different formulations. NCC production by acid hydrolysis was confirmed by scanning electron microscopy. Solubility, water vapor permeability, water vapor transmission rate and moisture absorbance were measured on each of the nanocomposites. The results were analyzed by SAS software. The lowest moisture absorbance was measured in pure starch nanocomposite containing 8% NCC. The lowest permeability to water vapor belongs to starch nanocomposite containing 8% NCC and the sample containing 7.8% EVOH and 13% NCC. Also, the lowest solubility was observed in the composite contains the highest amount of EVOH. Applied Process resulted in production of bio films which have good resistance to water vapor permeability and solubility in water. The use of NCC and EVOH leads to reduced moisture absorbance property of the biofilms.Keywords: starch, EVOH, nanocrystalline cellulose, hydrophilicity
Procedia PDF Downloads 4083538 Examples of Techniques and Algorithms Used in Wlan Security
Authors: Vahid Bairami Rad
Abstract:
Wireless communications offer organizations and users many benefits such as portability and flexibility, increased productivity, and lower installation costs. Wireless networks serve as the transport mechanism between devices and among devices and the traditional wired networks (enterprise networks and the internet). Wireless networks are many and diverse but are frequently categorized into three groups based on their coverage range: WWAN, WLAN, and WPAN. WWAN, representing wireless wide area networks, includes wide coverage area technologies such as 2G cellular, Cellular Digital Packet Data (CDPD), Global System for Mobile Communications (GSM), and Mobitex. WLAN, representing wireless local area networks, includes 802.11, Hyper lan, and several others. WPAN, represents wireless personal area network technologies such as Bluetooth and Infrared. The security services are provided largely by the WEP (Wired Equivalent Privacy) protocol to protect link-level data during wireless transmission between clients and access points. That is, WEP does not provide end-to-end security but only for the wireless portion of the connection.Keywords: wireless lan, wired equivalent privacy, wireless network security, wlan security
Procedia PDF Downloads 5623537 Investigating the Successes of in vitro Embryogenesis
Authors: Zelikha Labbani
Abstract:
The in vitro isolated microspore culture is the most powerful androgenic pathway to produce doubled haploid plants in the short time. To deviate a microspore toward embryogenesis, a number of factors, different for each species, must concur at the same time and place. Once induced, the microspore undergoes numerous changes at different levels, from overall morphology to gene expression. Induction of microspore embryogenesis not only implies the expression of an embryogenic program, but also a stress-related cellular response and a repression of the gametophytic program to revert the microspore to a totipotent status. As haploid single cells, microspore became a strategy to achieve various objectives particularly in genetic engineering. In this communication we would show the most recent advances in the producing haploid embryos via in vitro isolated microspore culture.Keywords: in vitro isolated microspore culture, success, haploid cells, bioinformatics, biomedicine
Procedia PDF Downloads 4703536 Perception, Awareness and Attitude of Muslim Academicians on Islamic Banking Products in Kano State of Nigeria
Authors: Muhammad Abdullahi Mago
Abstract:
Islamic Banking began in Nigeria last three years and the sector has shown the sign of bright future for the sector and the Nigerian economy, within this very short time it is important to know the perception of the customers particularly learned or educated individuals for immediate evaluation and adjustment. This study investigates into the perception, awareness and attitudes of the academicians in the most populous state/place in Nigeria with more than 90% muslims, and the results has shown a relatively low levels results in all the variables of the study.The study recommends aggressive marketing strategy for the Banks operating within the sector.Keywords: Islamic Banking Products, Islamic Financial Products, academicians, Islamic finance industry, perception, awareness and attitude
Procedia PDF Downloads 4303535 Research on Coordination Strategies for Coordinating Supply Chain Based on Auction Mechanisms
Authors: Changtong Wang, Lingyun Wei
Abstract:
The combination of auctions and supply chains is of great significance in improving the supply chain management system and enhancing the efficiency of economic and social operations. To address the gap in research on supply chain strategies under the auction mechanism, a model is developed for the 1-N auction model in a complete information environment, and it is concluded that the two-part contract auction model for retailers in this model can achieve supply chain coordination. The model is validated by substituting the model into the scenario of a fresh-cut flower industry flower auction in exchange for arithmetic examples to further prove the validity of the conclusions.Keywords: auction mechanism, supply chain coordination strategy, fresh cut flowers industry, supply chain management
Procedia PDF Downloads 1183534 Neo-Liberal Challenge - Apple in China
Authors: Mark McKeown
Abstract:
Press articles opining on how China has become the West’s biggest threat have become so common as to feel like old news. Since the United States shifted diplomatic recognition from Taiwan to the People’s Republic of China in 1979 the relationship between the world’s two largest economies has been at best a brittle one. This coiled tension has grown as trade between the two countries snaked ever upwards. As a byproduct of globalization Apple have focused much of their production and assembly in China. This has left the U.S. Big Tech company with several challenges. This paper focusses on the tightrope Apple now has to traverse. The majority of the data and analysis within this paper is sourced from my current ongoing PhD research on the influence of Big Tech lobbying on U.S. foreign policy. One of the main conclusions from this analysis is Apple has to adopt a carefully nuanced strategy of appeasement to avoid friction, with both the governments of China and the United States.Keywords: apple, China, Taiwan, war
Procedia PDF Downloads 583533 On Dynamic Chaotic S-BOX Based Advanced Encryption Standard Algorithm for Image Encryption
Authors: Ajish Sreedharan
Abstract:
Security in transmission and storage of digital images has its importance in today’s image communications and confidential video conferencing. Due to the increasing use of images in industrial process, it is essential to protect the confidential image data from unauthorized access. Advanced Encryption Standard (AES) is a well known block cipher that has several advantages in data encryption. However, it is not suitable for real-time applications. This paper presents modifications to the Advanced Encryption Standard to reflect a high level security and better image encryption. The modifications are done by adjusting the ShiftRow Transformation and using On Dynamic chaotic S-BOX. In AES the Substitute bytes, Shift row and Mix columns by themselves would provide no security because they do not use the key. In Dynamic chaotic S-BOX Based AES the Substitute bytes provide security because the S-Box is constructed from the key. Experimental results verify and prove that the proposed modification to image cryptosystem is highly secure from the cryptographic viewpoint. The results also prove that with a comparison to original AES encryption algorithm the modified algorithm gives better encryption results in terms of security against statistical attacks.Keywords: advanced encryption standard (AES), on dynamic chaotic S-BOX, image encryption, security analysis, ShiftRow transformation
Procedia PDF Downloads 4293532 The Dao of Political Economy - A Holistic Perspective
Authors: Tao Peng
Abstract:
This paper presents a holistic model of political economy based on Daoism – the foundational philosophy of classical Chinese epistemology. Daoism is both comprehensive and subtle in its manifestations and applications in all aspects of nature and society. Based on Daoist creation theory of the universe, life theory and five element functioning theory, a holistic model in economics with minimal assumptions and independent of ideology are constructed. Under this framework, different schools of economics, such as neo-liberal, Marxism, and Austrian school, are explored and shed new light on. Economic and financial predictions can be realized in applications to Qi Men Dun Jia. This framework can provide guidelines and inspirations to economic modelling, economic policies formulation and strategy development and guide society towards a more sustainable future.Keywords: daoism, economics, holistic, philosophy
Procedia PDF Downloads 803531 A Novel Design in the Use of Planar Transformers for LDMOS Based Amplifiers in Bands II, III, DRM+, DVB-T and DAB+
Authors: Antonis Constantinides, Christos Yiallouras, Christakis Damianou
Abstract:
The coaxial transformer-coupled push-pull circuitry has been used widely in HF and VHF amplifiers for many decades without significant changes in the topology of the transformers. Basic changes over the years concerned the construction and turns ratio of the transformers as has been imposed upon the newer technologies active devices demands. The balun transmission line transformers applied in push-pull amplifiers enable input/output impedance transformation, but are mainly used to convert the balanced output into unbalanced and the input unbalanced into balanced. A simple and affordable alternative solution over the traditional coaxial transformer is the coreless planar balun. A key advantage over the traditional approach lies in the high specifications repeatability; simplifying the amplifier construction requirements as the planar balun constitutes an integrated part of the PCB copper layout. This paper presents the performance analysis of a planar LDMOS MRFE6VP5600 Push-Pull amplifier that enables robust operation in Band III, DVB-T, DVB-T2 standards but functions equally well in Band II, for DRM+ new generation transmitters.Keywords: amplifier, balun, complex impedance, LDMOS, planar-transformers
Procedia PDF Downloads 4363530 Design of Lead-Lag Based Internal Model Controller for Binary Distillation Column
Authors: Rakesh Kumar Mishra, Tarun Kumar Dan
Abstract:
Lead-Lag based Internal Model Control method is proposed based on Internal Model Control (IMC) strategy. In this paper, we have designed the Lead-Lag based Internal Model Control for binary distillation column for SISO process (considering only bottom product). The transfer function has been taken from Wood and Berry model. We have find the composition control and disturbance rejection using Lead-Lag based IMC and comparing with the response of simple Internal Model Controller.Keywords: SISO, lead-lag, internal model control, wood and berry, distillation column
Procedia PDF Downloads 6373529 A Method for Compression of Short Unicode Strings
Authors: Masoud Abedi, Abbas Malekpour, Peter Luksch, Mohammad Reza Mojtabaei
Abstract:
The use of short texts in communication has been greatly increasing in recent years. Applying different languages in short texts has led to compulsory use of Unicode strings. These strings need twice the space of common strings, hence, applying algorithms of compression for the purpose of accelerating transmission and reducing cost is worthwhile. Nevertheless, other compression methods like gzip, bzip2 or PAQ due to high overhead data size are not appropriate. The Huffman algorithm is one of the rare algorithms effective in reducing the size of short Unicode strings. In this paper, an algorithm is proposed for compression of very short Unicode strings. At first, every new character to be sent to a destination is inserted in the proposed mapping table. At the beginning, every character is new. In case the character is repeated for the same destination, it is not considered as a new character. Next, the new characters together with the mapping value of repeated characters are arranged through a specific technique and specially formatted to be transmitted. The results obtained from an assessment made on a set of short Persian and Arabic strings indicate that this proposed algorithm outperforms the Huffman algorithm in size reduction.Keywords: Algorithms, Data Compression, Decoding, Encoding, Huffman Codes, Text Communication
Procedia PDF Downloads 3423528 Implementation of Total Quality Management in Public Sector: Case of Tunisia
Authors: Rafla Hchaichi
Abstract:
The public administration is currently experiencing in the field of quality unprecedented effervescence. However, in a globalized world more and more competitive, public services are confronted with the need to improve their performances which push public companies to implement quality approaches. Quality approaches have taken diverse forms such as service commitment, labels, certifications and the Common Assessment Framework. This paper provides an overview on the strategy for administrative development in Tunisia since the Carthaginian civilization until today. It outlines the evolution of quality management in the Tunisian public context while focusing on the National Referential of Quality of Administrative Services.Keywords: quality approach, the common assessment framework, service commitment, label, certification, quality of public service, performance of public service, Tunisian Public Service
Procedia PDF Downloads 5483527 Network Coding with Buffer Scheme in Multicast for Broadband Wireless Network
Authors: Gunasekaran Raja, Ramkumar Jayaraman, Rajakumar Arul, Kottilingam Kottursamy
Abstract:
Broadband Wireless Network (BWN) is the promising technology nowadays due to the increased number of smartphones. Buffering scheme using network coding considers the reliability and proper degree distribution in Worldwide interoperability for Microwave Access (WiMAX) multi-hop network. Using network coding, a secure way of transmission is performed which helps in improving throughput and reduces the packet loss in the multicast network. At the outset, improved network coding is proposed in multicast wireless mesh network. Considering the problem of performance overhead, degree distribution makes a decision while performing buffer in the encoding / decoding process. Consequently, BuS (Buffer Scheme) based on network coding is proposed in the multi-hop network. Here the encoding process introduces buffer for temporary storage to transmit packets with proper degree distribution. The simulation results depend on the number of packets received in the encoding/decoding with proper degree distribution using buffering scheme.Keywords: encoding and decoding, buffer, network coding, degree distribution, broadband wireless networks, multicast
Procedia PDF Downloads 3973526 Antibacterial Activity of Noble Metal Functionalized Magnetic Core-Zeolitic Shell Nanostructures
Authors: Mohsen Padervand
Abstract:
Functionalized magnetic core-zeolitic shell nanostructures were prepared by the hydrothermal and coprecipitation methods. The products were characterized by Vibrating Sample Magnetometer (VSM), X-ray powder diffraction (XRD), Fourier Transform Infrared spectra (FTIR), nitrogen adsorption-desorption isotherms (BET) and Transmission Electron Microscopy (TEM). The growth of mordenite nanoparticles on the surface of silica coated nickel ferrite nanoparticles at the presence of organic templates was well approved. The antibacterial activity of prepared samples was investigated by the inactivation of E.coli as a gram negative bacterium. A new mechanism was proposed to inactivate the bacterium over the prepared samples. Minimum Inhibitory Concentration (MIC) and reuse ability were studied too. TEM images of the destroyed microorganism after the treatment time were applied to illustrate the inactivation mechanism. The interaction of the noble metals with organic components on the surface of nanostructures studied theoretically and the results were used to interpret the experimental results.Keywords: nickel ferrite nanoparticles, magnetic core-zeolitic shell, antibacterial activity, E. coli
Procedia PDF Downloads 3263525 Green Synthesis of Silver Nanoparticles from Citrus aurantium Aqueous Pollen Extract and Their Antibacterial Activity
Authors: Mohammad Ali Karimi, Hossein Tavallali, Abdolhamid Hatefi-Mehrjardi
Abstract:
Pollen extract of in vitro plants raised of Citrus aurantium as reducer and stabilizer was assessed for the green synthesis of silver nanoparticles (AgNPs). The synthesis of AgNPs was performed at room temperature assisting in solutions by reduction takes place rapidly for 10 min. Surface plasmon resonance (SPR) peaks in UV–Vis spectra indicated the formation of polydispersive AgNPs. Silver ions concentration, pH, temperature and reaction time were optimized in the synthesis of AgNPs. The nanoparticles obtained were characterized by UV-Vis spectrophotometer, transmission electron microscopy (TEM). X-ray diffraction (XRD) and Fourier transform infrared (FTIR) spectroscopy techniques. The synthesized AgNPs were mostly spherical in shape with an average size of 15 nm. XRD study shows that the AgNPs are crystalline in nature with face-centered cubic (fcc) geometry. It shows the significant antibacterial efficacy against Gram-positive (Staphylococcus aureus) and Gram-negative bacteria (Escherichia coli) by disk diffusion method using Mueller-Hinton Agar.Keywords: green synthesis, Citrus aurantium, silver nanoparticles, antibacterial activity
Procedia PDF Downloads 2823524 Convex Restrictions for Outage Constrained MU-MISO Downlink under Imperfect Channel State Information
Authors: A. Preetha Priyadharshini, S. B. M. Priya
Abstract:
In this paper, we consider the MU-MISO downlink scenario, under imperfect channel state information (CSI). The main issue in imperfect CSI is to keep the probability of each user achievable outage rate below the given threshold level. Such a rate outage constraints present significant and analytical challenges. There are many probabilistic methods are used to minimize the transmit optimization problem under imperfect CSI. Here, decomposition based large deviation inequality and Bernstein type inequality convex restriction methods are used to perform the optimization problem under imperfect CSI. These methods are used for achieving improved output quality and lower complexity. They provide a safe tractable approximation of the original rate outage constraints. Based on these method implementations, performance has been evaluated in the terms of feasible rate and average transmission power. The simulation results are shown that all the two methods offer significantly improved outage quality and lower computational complexity.Keywords: imperfect channel state information, outage probability, multiuser- multi input single output, channel state information
Procedia PDF Downloads 8103523 Intelligent Computing with Bayesian Regularization Artificial Neural Networks for a Nonlinear System of COVID-19 Epidemic Model for Future Generation Disease Control
Authors: Tahir Nawaz Cheema, Dumitru Baleanu, Ali Raza
Abstract:
In this research work, we design intelligent computing through Bayesian Regularization artificial neural networks (BRANNs) introduced to solve the mathematical modeling of infectious diseases (Covid-19). The dynamical transmission is due to the interaction of people and its mathematical representation based on the system's nonlinear differential equations. The generation of the dataset of the Covid-19 model is exploited by the power of the explicit Runge Kutta method for different countries of the world like India, Pakistan, Italy, and many more. The generated dataset is approximately used for training, testing, and validation processes for every frequent update in Bayesian Regularization backpropagation for numerical behavior of the dynamics of the Covid-19 model. The performance and effectiveness of designed methodology BRANNs are checked through mean squared error, error histograms, numerical solutions, absolute error, and regression analysis.Keywords: mathematical models, beysian regularization, bayesian-regularization backpropagation networks, regression analysis, numerical computing
Procedia PDF Downloads 1363522 Investigation of Diseases and Enemies of Bees of Breeding Apis mellifera intermissa (Buttel-Reepen, 1906)
Authors: S. Zenia, L. Bitta, O. Bouhamam, H. Brines, M. Boudriaa, F. Haddadj, F. Marniche, A. Milla, H. Saadi, A. Smai
Abstract:
The bee Apis mellifera intermissa is a major social insect, in addition to its honey production, it is a pillar of our biodiversity. Several living organisms can come into contact with it: bacteria, viruses, protozoa, fungi, mites, and insects. In Algeria, many beekeepers have reported unusual mortality of local bees, loss of foragers and significant losses of their livestock. Despite the presence of a varied honey-bearing flora and a favourable Mediterranean climate, honey production remains low. This phenomenon can be attributed to the excess winter mortality, but also to the increasing difficulties that beekeepers face in maintaining healthy bee colonies, particularly bee diseases and their transmission facilitated by trade and beekeeping practices. Our survey is based on a questionnaire composed of several parts. The results obtained show that the disease that most affects bees according to beekeepers is varroa mite with 93% followed by fungi with 26%. The most replied enemy of bees is the false ringworm with 73%, followed by the bee-eater with 63%. Our goal is to determine the causes of this low production in two areas: Bejaia and Tizi-Ouzou.Keywords: diseases, Apis mellifera L., varroa, European foulbrood
Procedia PDF Downloads 1583521 Stress Analysis of Vertebra Using Photoelastic and Finite Element Methods
Authors: Jamal A. Hassan, Ali Q. Abdulrazzaq, Sadiq J. Abass
Abstract:
In this study, both the photoelastic, as well as the finite element methods, are used to study the stress distribution within human vertebra (L4) under forces similar to those that occur during normal life. Two & three dimensional models of vertebra were created by the software AutoCAD. The coordinates obtained were fed into a computer numerical control (CNC) tensile machine to fabricate the models from photoelastic sheets. Completed models were placed in a transmission polariscope and loaded with static force (up to 1500N). Stresses can be quantified and localized by counting the number of fringes. In both methods the Principle stresses were calculated at different regions. The results noticed that the maximum von-mises stress on the area of the extreme superior vertebral body surface and the facet surface with high normal stress (σ) and shear stress (τ). The facets and other posterior elements have a load-bearing function to help support the weight of the upper body and anything that it carries, and are also acted upon by spinal muscle forces. The numerical FE results have been compared with the experimental method using photoelasticity which shows good agreement between experimental and simulation results.Keywords: photoelasticity, stress, load, finite element
Procedia PDF Downloads 2843520 Identification of Arglecins B and C and Actinofuranosin A from a Termite Gut-Associated Streptomyces Species
Authors: Christian A. Romero, Tanja Grkovic, John. R. J. French, D. İpek Kurtböke, Ronald J. Quinn
Abstract:
A high-throughput and automated 1H NMR metabolic fingerprinting dereplication approach was used to accelerate the discovery of unknown bioactive secondary metabolites. The applied dereplication strategy accelerated the discovery of natural products, provided rapid and competent identification and quantification of the known secondary metabolites and avoided time-consuming isolation procedures. The effectiveness of the technique was demonstrated by the isolation and elucidation of arglecins B (1), C (2) and actinofuranosin A (3) from a termite-gut associated Streptomyces sp. (USC 597) grown under solid state fermentation. The structures of these compounds were elucidated by extensive interpretation of 1H, 13C and 2D NMR spectroscopic data. These represent the first report of arglecin analogs isolated from a termite gut-associated Streptomyces species.Keywords: actinomycetes, actinofuranosin, antibiotics, arglecins, NMR spectroscopy
Procedia PDF Downloads 543519 Age-Stage, Two-Sex Life Table Characteristics of Aedes albopictus (Skuse) and Aedes aegypti (Linnaeus)) (Diptera: Culicidae) in Penang Island, Malaysia
Authors: A. H. Maimusa, A. Abu Hassan, Nur Faeza A. Kassim
Abstract:
In this study, we report on the main life table developmental attributes of laboratory colonies of wild strains Ae. albopictus and Ae. aegypti. The raw life history data of the two species were analyzed and compared based on the age-stage and two-sex life table. The total pre-adult development times were 9.47 days (Ae. albopictus) and 8.76 days (Ae. aegypti). The adult pre-oviposition periods (APOP) was 1.61 day for Ae. albopictus and 2.02 for Ae. aegypti. The total pre-oviposition period (TPOP) of Ae. albopictus is significantly longer (11.66 days) than (10.75 days) for Ae. aegypti. The mean intrinsic rate of increase (r) was 0.124 days (Ae. albopictus) and 1.151 days (Ae. aegypti) while the mean finite rate of increase (λ) was 1.13 day (Ae. albopictus) and (1.16 d) (Ae. aegypti). The net reproductive rates (Ro) were 8.10 and 10.75 for Ae. albopictus and Ae. aegypti, respectively. The mean generation time (T) for Ae. albopictus and Ae. aegypti, were 16.81 days and 15.77 days respectively. The mean development time for each stage insignificantly correlated with temperature (r = -0.208, p > 0.05) and (r = -0.312, p > 0.05) for Ae. albopictus and Ae. aegypti respectively. The life expectancy was 19.01 and 19.94 days for Ae. albopictus and Ae. aegypti respectively. Mortality occurred mostly during the adult stage and ranged between 0.01 and 0.07%. The population parameters suggest that Ae. albopictus and Ae. aegypti populations are r-strategist characterized by a high r, a large Ro, and short T. This kind of information is crucial in understanding mosquito population dynamics in disease transmission and control.Keywords: Ae. aegypti, Ae. albopictus, age-stage, life table, two-sex
Procedia PDF Downloads 3123518 Investigation of Steel-Concrete Composite Bridges under Blasting Loads Based on Slope Reflection
Authors: Yuan Li, Yitao Han, Zhao Zhu
Abstract:
In this paper, the effect of blasting loads on steel-concrete composite bridges has been investigated considering the slope reflection effect. Reasonable values of girder size, plate thickness, stiffening rib, and other design parameters were selected according to design specifications. Modified RHT (Riedel-Hiermaier-Thoma) was used as constitutive relation in analyses. In order to simulate the slope reflection effect, the slope of the bridge was precisely built in the model. Different blasting conditions, including top, middle, and bottom explosions, were simulated. The multi-Euler domain method based on fully coupled Lagrange and Euler models was adopted for the structural analysis of the explosion process using commercial software AUTODYN. The obtained results showed that explosion overpressure was increased by 3006, 879, and 449kPa, corresponding to explosions occurring at the top, middle, and bottom of the slope, respectively. At the same time, due to energy accumulation and transmission dissipation caused by slope reflection, the corresponding yield lengths of steel beams were increased by 8, 0, and 5m, respectively.Keywords: steel-concrete composite bridge, explosion damage, slope reflection, blasting loads, RHT
Procedia PDF Downloads 893517 Global Mittag-Leffler Stability of Fractional-Order Bidirectional Associative Memory Neural Network with Discrete and Distributed Transmission Delays
Authors: Swati Tyagi, Syed Abbas
Abstract:
Fractional-order Hopfield neural networks are generally used to model the information processing among the interacting neurons. To show the constancy of the processed information, it is required to analyze the stability of these systems. In this work, we perform Mittag-Leffler stability for the corresponding Caputo fractional-order bidirectional associative memory (BAM) neural networks with various time-delays. We derive sufficient conditions to ensure the existence and uniqueness of the equilibrium point by using the theory of topological degree theory. By applying the fractional Lyapunov method and Mittag-Leffler functions, we derive sufficient conditions for the global Mittag-Leffler stability, which further imply the global asymptotic stability of the network equilibrium. Finally, we present two suitable examples to show the effectiveness of the obtained results.Keywords: bidirectional associative memory neural network, existence and uniqueness, fractional-order, Lyapunov function, Mittag-Leffler stability
Procedia PDF Downloads 3523516 Urban Development from the Perspective of Lou Gang Polder System: Taihu Lake, Huzhou as an Example
Authors: Wei Bin Shen
Abstract:
Lou Gang world irrigation project heritage in Taihu Lake is a systematic irrigation project integrating water conservancy, ecology and culture. Through the methods of historical documents and field investigation, this paper deeply analyzes the formation history, connotation and value of Lou Gang polder system: Lou Gang heritage, describes in detail the relationship between Lou Gang polder system in Taihu Lake and the development and evolution of Huzhou City, and initially explores the protection and Utilization Strategies of Lou Gang water conservancy cultural heritage resources in Taihu Lake from the current situation.Keywords: Lou Gang, protection strategy, urban evolution, waterconservancyculturalheritage
Procedia PDF Downloads 1633515 Study of Cavitation Phenomena Based on Flow Visualization Test in 3-Way Reversing Valve
Authors: Hyo Lim Kang, Tae An Kim, Seung Ho Han
Abstract:
A 3-way reversing valve has been used in automotive washing machines to remove remaining oil and dirt on machined engine and transmission blocks. It provides rapid and accurate changes of water flow direction without any precise control device. However, due to its complicated bottom-plug shape, a cavitation occurs in a wide range of the bottom-plug in a downstream. In this study, the cavitation index and POC (percent of cavitation) were used to evaluate quantitatively the cavitation phenomena occurring at the bottom-plug. An optimal shape design was carried out via parametric study for geometries of the bottom-plug, in which a simple CAE-model was used in order to avoid time-consuming CFD analysis and hard to achieve convergence. To verify the results of numerical analysis, a flow visualization test was carried out using a test specimen with a transparent acryl pipe according to ISA-RP75.23. The flow characteristics such as the cavitation occurring in the downstream were investigated by using a flow test equipment with valve and pump including a flow control system and high-speed camera.Keywords: cavitation, flow visualization test, optimal shape design, percent of cavitation, reversing valve
Procedia PDF Downloads 2973514 Searching for an Effective Marketing in the Food Supplement Industry in Japan
Authors: Michiko Miyamoto
Abstract:
The market for "functional foods" and "foods with functional claims" that are effective in maintaining and improving health, has expanded year by year due to the entry of major food and beverage manufacturers following the introduction of the specified health food system in 1991 in Japan. To bring health claims related products or services to the market, it is necessary to let consumers to learn about these products or services; an effective marketing through advertising are important. This research proposes a framework for an effective advertisement medium for the food supplement industry by using survey data of 2,500 people.Keywords: functional foods, dietary supplements, marketing strategy, structural equation modeling
Procedia PDF Downloads 1403513 Nonlinear Relationship between Globalization and Control of Corruption along with Economic Growth
Authors: Elnaz Entezar, Reza Ezzati
Abstract:
In recent decades, trade flows, capital, workforce, technology and information have increased between international borders and the globalization has turned to an undeniable process in international economics. Meanwhile, despite the positive aspects of globalization, the critics of globalization opine that the risks and costs of globalization for developing vulnerable economies and the world's impoverished people are high and significant. In this regard, this study by using the data of KOF Economic Institute and the World Bank for 113 different countries during the period 2002-2012, by taking advantage of panel smooth transition regression, and by taking the gross domestic product as transmission variables discuss the nonlinear relationship between research variables. The results have revealed that globalization in low regime (countries with low GDP) has negative impact whereas in high regime (countries with high GDP) has a positive impact. In spite of the fact that in the early stages of growth, control of corruption has a positive impact on economic growth, after a threshold has a negative impact on economic growth.Keywords: globalization, corruption, panel smooth transition model, economic growth, threshold, economic convergence
Procedia PDF Downloads 2873512 On the Derivation of Variable Step BBDF for Solving Second Order Stiff ODEs
Authors: S. A. M. Yatim, Z. B. Ibrahim, K. I. Othman, M. Suleiman
Abstract:
The method of solving second order stiff ordinary differential equation (ODEs) that is based on backward differentiation formula (BDF) is considered in this paper. We derived the method by increasing the order of the existing method using an improved strategy in choosing the step size. Numerical results are presented to compare the efficiency of the proposed method to the MATLAB’s suite of ODEs solvers namely ode15s and ode23s. The method was found to be efficient to solve second order ordinary differential equation.Keywords: backward differentiation formulae, block backward differentiation formulae, stiff ordinary differential equation, variable step size
Procedia PDF Downloads 4893511 A Research Analysis on the Source Technology and Convergence Types
Authors: Kwounghee Choi
Abstract:
Technological convergence between the various sectors is expected to have a very large impact on future industrial and economy. This study attempts to do empirical approach between specific technologies’ classification. For technological convergence classification, it is necessary to set the target technology to be analyzed. This study selected target technology from national research and development plan. At first we found a source technology for analysis. Depending on the weight of source technology, NT-based, BT-based, IT-based, ET-based, CS-based convergence types were classified. This study aims to empirically show the concept of convergence technology and convergence types. If we use the source technology to classify convergence type, it will be useful to make practical strategies of convergence technology.Keywords: technology convergence, source technology, convergence type, R&D strategy, technology classification
Procedia PDF Downloads 4803510 An Application of a Feedback Control System to Minimize Unforeseen Disruption in a Paper Manufacturing Industry in South Africa
Authors: Martha E. Ndeley
Abstract:
Operation management is the key element within the manufacturing process. However, during this process, there are a number of unforeseen disruptions that causes the process to a standstill which are, machine breakdown, employees absenteeism, improper scheduling. When this happens, it forces the shop flow to a rescheduling process and these strategy reschedules only a limited part of the initial schedule to match up with the pre-schedule at some point with the objective to create a new schedule that is reliable which in the long run gets disrupted. In this work, we have developed feedback control system that minimizes any form of disruption before the impact becomes severe, the model was tested in a paper manufacturing industries and the results revealed that, if the disruption is minimized at the initial state, the impact becomes unnoticeable.Keywords: disruption, machine, absenteeism, scheduling
Procedia PDF Downloads 301