Search results for: rational numbers.
363 Weighted Clustering Coefficient for Identifying Modular Formations in Protein-Protein Interaction Networks
Authors: Zelmina Lubovac, Björn Olsson, Jonas Gamalielsson
Abstract:
This paper describes a novel approach for deriving modules from protein-protein interaction networks, which combines functional information with topological properties of the network. This approach is based on weighted clustering coefficient, which uses weights representing the functional similarities between the proteins. These weights are calculated according to the semantic similarity between the proteins, which is based on their Gene Ontology terms. We recently proposed an algorithm for identification of functional modules, called SWEMODE (Semantic WEights for MODule Elucidation), that identifies dense sub-graphs containing functionally similar proteins. The rational underlying this approach is that each module can be reduced to a set of triangles (protein triplets connected to each other). Here, we propose considering semantic similarity weights of all triangle-forming edges between proteins. We also apply varying semantic similarity thresholds between neighbours of each node that are not neighbours to each other (and hereby do not form a triangle), to derive new potential triangles to include in module-defining procedure. The results show an improvement of pure topological approach, in terms of number of predicted modules that match known complexes.Keywords: Modules, systems biology, protein interactionnetworks, yeast.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2106362 Design Optimization of a Double Stator Cup- Rotor Machine
Authors: E. Diryak, P. Lefley, L. Petkovska, G. Cvetkovski
Abstract:
This paper presents the optimum design for a double stator, cup rotor machine; a novel type of BLDC PM Machine. The optimization approach is divided into two stages: the first stage is calculating the machine configuration using Matlab, and the second stage is the optimization of the machine using Finite Element Modeling (FEM). Under the design specifications, the machine model will be selected from three pole numbers, namely, 8, 10 and 12 with an appropriate slot number. A double stator brushless DC permanent magnet machine is designed to achieve low cogging torque; high electromagnetic torque and low ripple torque.Keywords: Permanent magnet machine, low- cogging torque, low- ripple torque, high- electromagnetic torque, design optimization.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2166361 Boundary Effect on the Onset of Marangoni Convection with Internal Heat Generation
Authors: Norihan Md Arifin, Norfifah Bachok
Abstract:
The onset of Marangoni convection in a horizontal fluid layer with internal heat generation overlying a solid layer heated from below is studied. The upper free surface of a fluid is nondeformable and the bottom boundary are rigid and no-slip. The resulting eigenvalue problem is solved exactly. The critical values of the Marangoni numbers for the onset of Marangoni convection are calculated and the latter is found to be critically dependent on the internal heating, depth ratio and conductivity ratio. The effects of the thermal conductivity and the thickness of the solid plate on the onset of convective instability with internal heating are studied in detail.Keywords: Linear stability, Marangoni convection, Internal Heatgeneration.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1474360 Tensile Strength of Asphalt Concrete due to Moisture Conditioning
Authors: Md R. Islam, Rafiqul A. Tarefder
Abstract:
This study investigates the effect of moisture conditioning on the Indirect Tensile Strength (ITS) of asphalt concrete. As a first step, cylindrical samples of 100 mm diameter and 50 mm thick were prepared using a Superpave gyratory compactor. Next, the samples were conditioned using Moisture Induced Susceptibility Test (MIST) device at different numbers of moisture conditioning cycles. In the MIST device, samples are subjected water pressure through the sample pores cyclically. The MIST conditioned samples were tested for ITS. Results show that the ITS does not change significantly with MIST conditioning at the specific pressure and cycles adopted in this study.
Keywords: Asphalt concrete, tensile strength, moisture, laboratory test.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2801359 Recursive Path-finding in a Dynamic Maze with Modified Tremaux's Algorithm
Authors: Nien-Zheng Yew, Kung-Ming Tiong, Su-Ting Yong
Abstract:
Number Link is a Japanese logic puzzle where pairs of same numbers are connected using lines. Number Link can be regarded as a dynamic multiple travelers, multiple entries and exits maze, where the walls and passages are dynamically changing as the travelers move. In this paper, we apply the Tremaux’s algorithm to solve Number Link puzzles of size 8x8, 10x10 and 15x20. The algorithm works well and produces a solution for puzzles of size 8x8 and 10x10. However, solving a puzzle of size 15x20 requires high computer processing power and is time consuming.
Keywords: Number Link, maze, puzzle, Tremaux’s algorithm
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 4027358 RUPSec: An Extension on RUP for Developing Secure Systems - Requirements Discipline
Authors: Mohammad Reza Ayatollahzadeh Shirazi, Pooya Jaferian, Golnaz Elahi, Hamid Baghi, Babak Sadeghian
Abstract:
The world is moving rapidly toward the deployment of information and communication systems. Nowadays, computing systems with their fast growth are found everywhere and one of the main challenges for these systems is increasing attacks and security threats against them. Thus, capturing, analyzing and verifying security requirements becomes a very important activity in development process of computing systems, specially in developing systems such as banking, military and e-business systems. For developing every system, a process model which includes a process, methods and tools is chosen. The Rational Unified Process (RUP) is one of the most popular and complete process models which is used by developers in recent years. This process model should be extended to be used in developing secure software systems. In this paper, the Requirement Discipline of RUP is extended to improve RUP for developing secure software systems. These proposed extensions are adding and integrating a number of Activities, Roles, and Artifacts to RUP in order to capture, document and model threats and security requirements of system. These extensions introduce a group of clear and stepwise activities to developers. By following these activities, developers assure that security requirements are captured and modeled. These models are used in design, implementation and test activitie Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2810357 Forced Heat Transfer Convection in a Porous Channel with an Oriented Confined Jet
Authors: A. Abdedou, K. Bouhadef
Abstract:
The present study is an analysis of the forced convection heat transfer in porous channel with an oriented jet at the inlet with uniform velocity and temperature distributions. The upper wall is insulated when the bottom one is kept at constant temperature higher than that of the fluid at the entrance. The dynamic field is analysed by the Brinkman-Forchheimer extended Darcy model and the thermal field is traduced by the energy one equation model. The numerical solution of the governing equations is obtained by using the finite volume method. The results mainly concern the effect of Reynolds number, jet angle and thermal conductivity ratio on the flow structure and local and average Nusselt numbers evolutions.
Keywords: Forced convection, oriented confined jet, porous media.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2002356 Analysis of a Fluid Behavior in a Rectangular Enclosure under the Effect of Magnetic Field
Authors: Y.Bakhshan, H.Ashoori
Abstract:
In this research, a 2-D computational analysis of steady state free convection in a rectangular enclosure filled with an electrically conducting fluid under Effect of Magnetic Field has been performed. The governing equations (mass, momentum, and energy) are formulated and solved by a finite volume method (FVM) subjected to different boundary conditions. A parametric study has been conducted to consider the influence of Grashof number (Gr), Prantdl number (Pr) and the orientation of magnetic field on the flow and heat transfer characteristics. It is observed that Nusselt number (Nu) and heat flux will increase with increasing Grashof and Prandtl numbers and decreasing the slope of the orientation of magnetic field.Keywords: Rectangular Cavity, magneto-hydrodynamic, free convection, simulation
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1582355 Mixed Convective Heat Transfer in Water-Based Al2O3 Nanofluid in Horizontal Rectangular Duct
Authors: Nur Irmawati, H.A. Mohammed
Abstract:
In the present study, mixed convection in a horizontal rectangular duct using Al2O3 is numerically investigated. The effects of different Rayleigh number, Reynolds number and radiation on flow and heat transfer characteristics are studied in detail. This study covers Rayleigh number in the range of 2 × 10^6 ≤ Ra ≤ 2 × 10^7 and Reynolds number in the range of 100 ≤ Re ≤ 1100. Results reveal that the Nusselt number increases as Reynolds and Rayleigh numbers increase. It is also found that the dimensionless temperature distribution increases as Rayleigh number increases.
Keywords: Numerical simulation, Mixed convection, Horizontal rectangular duct, Nanofluids.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2359354 Overhead Estimation over Capacity of Mobile WiMAX
Authors: Saeed AL-Rashdy, Qing Guo
Abstract:
The IEEE802.16 standard which has emerged as Broadband Wireless Access (BWA) technology, promises to deliver high data rate over large areas to a large number of subscribers in the near future. This paper analyze the effect of overheads over capacity of downlink (DL) of orthogonal frequency division multiple access (OFDMA)–based on the IEEE802.16e mobile WiMAX system with and without overheads. The analysis focuses in particular on the impact of Adaptive Modulation and Coding (AMC) as well as deriving an algorithm to determine the maximum numbers of subscribers that each specific WiMAX sector may support. An analytical study of the WiMAX propagation channel by using Cost- 231 Hata Model is presented. Numerical results and discussion estimated by using Matlab to simulate the algorithm for different multi-users parameters.Keywords: BWA, mobile WiMAX, capacity, AMC , overheads.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2081353 Swiss Scientific Society for Developing Countries: A Concept of Relationship
Authors: Jawad Alzeer
Abstract:
Cultural setup is varied from country to country and nation to nation, but the ability to adapt successfully to the new cultural setup may pave the way toward the development of cultural intelligence. Overcoming differences may require to build up our personality with the ability to learn, exchange thoughts, and have a constructive dream. Adaptation processes can be accelerated if we effectively utilize our cultural diversity. This can be done through a unified body or society; people with common goals can collectively work to satisfy their values. Narrowing the gap between developed and developing countries is of prime importance. Many international organizations are trying to resolve these issues by rational and peaceful means. Failing to understand the cultural differences, mentalities, strengths and weaknesses of developed and developing countries led to the collapse of many partnerships. Establishment of a neutral body influenced by developed countries intellectuality and developing countries personality may offer a better understanding and reasonable solutions, suggestions, advice that may assist in narrowing gaps and promote-strengthening relationship between developed and developing countries. The key issues, goals, and potential concepts associated with initiating Swiss scientific society for developing countries as a model to facilitate integration of highly skilled scientists are discussed.
Keywords: Cultural diversity, developing countries, integration, Switzerland.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1621352 Prediction of Scour Profile Caused by Submerged Three-Dimensional Wall Jets
Authors: Abdullah Al Faruque, Ram Balachandar
Abstract:
Series of laboratory tests were carried out to study the extent of scour caused by a three-dimensional wall jets exiting from a square cross-section nozzle and into a non-cohesive sand beds. Previous observations have indicated that the effect of the tail water depth was significant for densimetric Froude number greater than ten. However, the present results indicate that the cut off value could be lower depending on the value of grain size-to-nozzle width ratio. Numbers of equations are drawn out for a better scaling of numerous scour parameters. Also suggested the empirical prediction of scour to predict the scour centre line profile and plan view of scour profile at any particular time.
Keywords: Densimetric Froude Number, Jets, Nozzle, Sand, Scour, Tailwater, Time.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1980351 Motion Detection Techniques Using Optical Flow
Authors: A. A. Shafie, Fadhlan Hafiz, M. H. Ali
Abstract:
Motion detection is very important in image processing. One way of detecting motion is using optical flow. Optical flow cannot be computed locally, since only one independent measurement is available from the image sequence at a point, while the flow velocity has two components. A second constraint is needed. The method used for finding the optical flow in this project is assuming that the apparent velocity of the brightness pattern varies smoothly almost everywhere in the image. This technique is later used in developing software for motion detection which has the capability to carry out four types of motion detection. The motion detection software presented in this project also can highlight motion region, count motion level as well as counting object numbers. Many objects such as vehicles and human from video streams can be recognized by applying optical flow technique.Keywords: Background modeling, Motion detection, Optical flow, Velocity smoothness constant, motion trajectories.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 5383350 Fermat’s Last Theorem a Simple Demonstration
Authors: Jose William Porras Ferreira
Abstract:
This paper presents two solutions to the Fermat’s Last Theorem (FLT). The first one using some algebraic basis related to the Pythagorean theorem, expression of equations, an analysis of their behavior, when compared with power and power and using " the “Well Ordering Principle” of natural numbers it is demonstrated that in Fermat equation . The second one solution is using the connection between and power through the Pascal’s triangle or Newton’s binomial coefficients, where de Fermat equation do not fulfill the first coefficient, then it is impossible that:
zn=xn+yn for n>2 and (x, y, z) E Z+ - {0}
Keywords: Fermat’s Last Theorem, Pythagorean Theorem, Newton Binomial Coefficients, Pascal’s Triangle, Well Ordering Principle.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3002349 Financial Information and Collective Bargaining: Conflicting or Complementing?
Authors: Humayun Murshed, Shibly Abdullah
Abstract:
The research conducted in early seventies apparently assumed the existence of a universal decision model for union negotiators and furthermore tended to regard financial information as a ‘neutral’ input into a rational decision making process. However, research in the eighties began to question the neutrality of financial information as an input in collective bargaining rather viewing it as a potentially effective means for controlling the labour force. Furthermore, this later research also started challenging the simplistic assumptions relating particularly to union objectives which have underpinned the earlier search for universal union decision models. Despite the above developments there seems to be a dearth of studies in developing countries concerning the use of financial information in collective bargaining. This paper seeks to begin to remedy this deficiency. Utilising a case study approach based on two enterprises, one in the public sector and the other a multinational, the universal decision model is rejected and it is argued that the decision whether or not to use financial information is a contingent one and such a contingency is largely defined by the context and environment in which both union and management negotiators work. An attempt is also made to identify the factors constraining as well as promoting the use of financial information in collective bargaining, these being regarded as unique to the organisations within which the case studies are conducted.
Keywords: Collective Bargaining, Developing Countries, Disclosures, Financial Information.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1582348 Sensitizing Rules for Fuzzy Control Charts
Authors: N. Pekin Alakoç, A. Apaydın
Abstract:
Quality control charts indicate out of control conditions if any nonrandom pattern of the points is observed or any point is plotted beyond the control limits. Nonrandom patterns of Shewhart control charts are tested with sensitizing rules. When the processes are defined with fuzzy set theory, traditional sensitizing rules are insufficient for defining all out of control conditions. This is due to the fact that fuzzy numbers increase the number of out of control conditions. The purpose of the study is to develop a set of fuzzy sensitizing rules, which increase the flexibility and sensitivity of fuzzy control charts. Fuzzy sensitizing rules simplify the identification of out of control situations that results in a decrease in the calculation time and number of evaluations in fuzzy control chart approach.Keywords: Fuzzy set theory, Quality control charts, Run Rules, Unnatural patterns.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3540347 A New Classification of Risk-Reduction Options to Improve the Risk-Reduction Readiness of the Railway Industry
Authors: Eberechi Weli, Michael Todinov
Abstract:
The gap between the selection of risk-reduction options in the railway industry and the task of their effective implementation results in compromised safety and substantial losses. An effective risk management must necessarily integrate the evaluation phases with the implementation phase. This paper proposes an essential categorisation of risk reduction measures that best addresses a standard railway industry portfolio. By categorising the risk reduction options into design, operational, procedural and technical options, it is guaranteed that the efforts of the implementation facilitators (people, processes and supporting systems) are systematically harmonised. The classification is based on an integration of fundamental principles of risk reduction in the railway industry with the systems engineering approach.
This paper argues that the use of a similar classification approach is an attribute of organisations possessing a superior level of risk-reduction readiness. The integration of the proposed rational classification structure provides a solid ground for effective risk reduction.
Keywords: Cost effectiveness, organisational readiness, risk reduction, railway, system engineering.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1802346 Software to Encrypt Messages Using Public-Key Cryptography
Authors: E. Inzunza-González, C. Cruz-Hernández, R. M. López-Gutiérrez, E. E. García-Guerrero, L. Cardoza- Avendaño, H. Serrano-Guerrero
Abstract:
In this paper the development of a software to encrypt messages with asymmetric cryptography is presented. In particular, is used the RSA (Rivest, Shamir and Adleman) algorithm to encrypt alphanumeric information. The software allows to generate different public keys from two prime numbers provided by the user, the user must then select a public-key to generate the corresponding private-key. To encrypt the information, the user must provide the public-key of the recipient as well as the message to be encrypted. The generated ciphertext can be sent through an insecure channel, so that would be very difficult to be interpreted by an intruder or attacker. At the end of the communication, the recipient can decrypt the original message if provide his/her public-key and his/her corresponding private-key.Keywords: Asymmetric cryptography, Prime number, Publickey, Private-key, Software.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1687345 A Fuzzy Nonlinear Regression Model for Interval Type-2 Fuzzy Sets
Authors: O. Poleshchuk, E.Komarov
Abstract:
This paper presents a regression model for interval type-2 fuzzy sets based on the least squares estimation technique. Unknown coefficients are assumed to be triangular fuzzy numbers. The basic idea is to determine aggregation intervals for type-1 fuzzy sets, membership functions of whose are low membership function and upper membership function of interval type-2 fuzzy set. These aggregation intervals were called weighted intervals. Low and upper membership functions of input and output interval type-2 fuzzy sets for developed regression models are considered as piecewise linear functions.
Keywords: Interval type-2 fuzzy sets, fuzzy regression, weighted interval.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2218344 Fuzzy Multi-Component DEA with Shared and Undesirable Fuzzy Resources
Authors: Jolly Puri, Shiv Prasad Yadav
Abstract:
Multi-component data envelopment analysis (MC-DEA) is a popular technique for measuring aggregate performance of the decision making units (DMUs) along with their components. However, the conventional MC-DEA is limited to crisp input and output data which may not always be available in exact form. In real life problems, data may be imprecise or fuzzy. Therefore, in this paper, we propose (i) a fuzzy MC-DEA (FMC-DEA) model in which shared and undesirable fuzzy resources are incorporated, (ii) the proposed FMC-DEA model is transformed into a pair of crisp models using α cut approach, (iii) fuzzy aggregate performance of a DMU and fuzzy efficiencies of components are defined to be fuzzy numbers, and (iv) a numerical example is illustrated to validate the proposed approach.
Keywords: Multi-component DEA, fuzzy multi-component DEA, fuzzy resources.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2073343 An Experimental Study of the Effect of Coil Step on Heat Transfer Coefficient in Shell- Side of Shell-and-Coil Heat Exchanger
Authors: Mofid Gorji Bandpy, Hasan Sajjadi
Abstract:
In this study the mixed convection heat transfer in a coil-in-shell heat exchanger for various Reynolds numbers and various dimensionless coil pitch was experimentally investigated. The experiments were conducted for both laminar and turbulent flow inside coil and the effects of coil pitch on shell-side heat transfer coefficient of the heat exchanger were studied. The particular difference in this study in comparison with the other similar studies was the boundary conditions for the helical coils. The results indicate that with the increase of coil pitch, shell-side heat transfer coefficient is increased.Keywords: Coil pitch, Shell-and-Coil heat exchanger, Mixed convection, Experimental investigation.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2457342 Studies of Zooplankton in Gdańsk Basin (2010-2011)
Authors: Dzierzbicka-Glowacka, A. Lemieszek, M. Figiela
Abstract:
In 2010-2011, the research on zooplankton was conducted in the southern part of the Baltic Sea to determine seasonal variability in changes occurring throughout the zooplankton in 2010 and 2011, both in the region of Gdańsk Deep, and in the western part of Gdańsk Bay. The research in the sea showed that the taxonomic composition of holoplankton in the southern part of the Baltic Sea was similar to that recorded in this region for many years. The maximum values of abundance and biomass of zooplankton both in the Deep and the Bay of Gdańsk were observed in the summer season. Copepoda dominated in the composition of zooplankton for almost the entire study period, while rotifers occurred in larger numbers only in the summer 2010 in the Gdańsk Deep as well as in May and July 2010 in the western part of Gdańsk Bay, and meroplankton – in April 2011.
Keywords: Baltic Sea, composition, Gdańsk Bay, zooplankton.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3476341 Public Key Cryptosystem based on Number Theoretic Transforms
Authors: C. Porkodi, R. Arumuganathan
Abstract:
In this paper a Public Key Cryptosystem is proposed using the number theoretic transforms (NTT) over a ring of integer modulo a composite number. The key agreement is similar to ElGamal public key algorithm. The security of the system is based on solution of multivariate linear congruence equations and discrete logarithm problem. In the proposed cryptosystem only fixed numbers of multiplications are carried out (constant complexity) and hence the encryption and decryption can be done easily. At the same time, it is very difficult to attack the cryptosystem, since the cipher text is a sequence of integers which are interrelated. The system provides authentication also. Using Mathematica version 5.0 the proposed algorithm is justified with a numerical example.Keywords: Cryptography, decryption, discrete logarithm problem encryption, Integer Factorization problem, Key agreement, Number Theoretic Transform.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1679340 E-Voting: A Trustworthiness In Democratic; A View from Technology, Political and Social Issue
Authors: Sera Syarmila Sameon, Rohaini Ramli
Abstract:
A trustworthy voting process in democratic is important that each vote is recorded with accuracy and impartiality. The accuracy and impartiality are tallied in high rate with biometric system. One of the sign is a fingerprint. Fingerprint recognition is still a challenging problem, because of the distortions among the different impression of the same finger. Because of the trustworthy of biometric voting technologies, it may give a great effect on numbers of voter-s participation and outcomes of the democratic process. Hence in this study, the authors are interested in designing and analyzing the Electronic Voting System and the participation of the users. The system is based on the fingerprint minutiae with the addition of person ID number. This is in order to enhance the accuracy and speed of the voting process. The new design is analyzed by conducting pilot election among a class of students for selecting their representative.Keywords: Biometric, FAR and FRR, democratic, voting
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1570339 The Impact of Market-Related Variables on Forward-Looking Disclosure in the Annual Reports of Non-Financial Egyptian Companies
Authors: Bassam Baroma
Abstract:
The main objective of this study is to test the relationship between numbers of variables representing the firm characteristics (market-related variables) and the extent of voluntary disclosure levels (forward-looking disclosure) in the annual reports of Egyptian firms listed on the Egyptian Stock Exchange. The results show that audit firm size is significantly positively correlated (in all the three years) with the level of forward-looking disclosure. However, industry type variable (which divided to: industries, cement, construction, petrochemicals and services), is found being insignificantly association with the level of forward-looking information disclosed in the annual reports for all the three years.Keywords: Forward-looking disclosure, market-related variables, annual reports, Egyptian Stock Exchange.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2461338 A Numerical Study on Heat Transfer in Laminar Pulsed Slot Jets Impinging on a Surface
Authors: D. Kim
Abstract:
Numerical simulations are performed for laminar continuous and pulsed jets impinging on a surface in order to investigate the effects of pulsing frequency on the heat transfer characteristics. The time-averaged Nusselt number of pulsed jets is larger in the impinging jet region as compared to the continuous jet, while it is smaller in the outer wall jet region. At the stagnation point, the mean and RMS Nusselt numbers become larger and smaller, respectively, as the pulsing frequency increases. Unsteady behaviors of vortical fluid motions and temperature field are also investigated to understand the underlying mechanisms of heat transfer enhancement.Keywords: Pulsed slot jet, impingement, pulsing frequency, heat transfer enhancement.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1731337 The Role Played by Swift Change of the Stability Characteristic of Mean Flow in Bypass Transition
Authors: Dong Ming, Su Caihong
Abstract:
The scenario of bypass transition is generally described as follows: the low-frequency disturbances in the free-stream may generate long stream-wise streaks in the boundary layer, which later may trigger secondary instability, leading to rapid increase of high-frequency disturbances. Then possibly turbulent spots emerge, and through their merging, lead to fully developed turbulence. This description, however, is insufficient in the sense that it does not provide the inherent mechanism of transition that during the transition, a large number of waves with different frequencies and wave numbers appear almost simultaneously, producing sufficiently large Reynolds stress, so the mean flow profile can change rapidly from laminar to turbulent. In this paper, such a mechanism will be figured out from analyzing DNS data of transition.Keywords: boundary layer, breakdown, bypass transition, stability, streak.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1503336 The Correlation between Users’ Star Rating and Usability on Mobile Applications
Authors: Abdulmohsen A. AlBesher, Richard T. Stone
Abstract:
Star rating for mobile applications is a very useful way to differentiate between the best and worst rated applications. However, the question is whether the rating reflects the level of usability or not. The aim of this paper is to find out if the user’ star ratings on mobile apps correlate with the usability of those apps. Thus, we tested three mobile apps, which have different star ratings: low, medium, and high. Participating in the study, 15 mobile phone users were asked to do one single task for each of the three tested apps. After each task, the participant evaluated the app by answering a survey based on the System Usability Scale (SUS). The results found that there is no major correlation between the star rating and the usability. However, it was found that the task completion time and the numbers of errors that may happen while completing the task were significantly correlated to the usability.Keywords: Mobile applications, SUS, Star rating, Usability.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 919335 Comparison of Two Interval Models for Interval-Valued Differential Evolution
Authors: Hidehiko Okada
Abstract:
The author previously proposed an extension of differential evolution. The proposed method extends the processes of DE to handle interval numbers as genotype values so that DE can be applied to interval-valued optimization problems. The interval DE can employ either of two interval models, the lower and upper model or the center and width model, for specifying genotype values. Ability of the interval DE in searching for solutions may depend on the model. In this paper, the author compares the two models to investigate which model contributes better for the interval DE to find better solutions. Application of the interval DE is evolutionary training of interval-valued neural networks. A result of preliminary study indicates that the CW model is better than the LU model: the interval DE with the CW model could evolve better neural networks.
Keywords: Evolutionary algorithms, differential evolution, neural network, neuroevolution, interval arithmetic.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1667334 Research on the Layout of Ground Control Points in Plain area 1:10000 DLG Production Using POS Technique
Authors: Dong Ming, Chen Haipeng
Abstract:
POS (also been called DGPS/IMU) technique can obtain the Exterior Orientation Elements of aerial photo, so the triangulation and DLG production using POS can save large numbers of ground control points (GCP), and this will improve the produce efficiency of DLG and reduce the cost of collecting GCP. This paper mainly research on POS technique in production of 1:10 000 scale DLG on GCP distribution. We designed 23 kinds of ground control points distribution schemes, using integrated sensor direction method to do the triangulation experiments, based on the results of triangulation, we produce a map with the scale of 1:10 000 and test its accuracy. This paper put forward appropriate GCP distributing schemes by experiments and research above, and made preparations for the application of POS technique on photogrammetry 4D data production.
Keywords: POS, IMU, DGPS, DLG, ground control point, triangulation
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1704