Search results for: fiber volume fraction
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 32931

Search results for: fiber volume fraction

28761 News Media in Arab Societies

Authors: B. Al-Jenaibi

Abstract:

The paper examines the theories of media, dominant effects and critical and cultural theories that are used to examine media and society issues, and then apply the theories to explore the current situation of news media in Arab societies. The research is meant to explore the nature of media in the Arab world and the way that modern technologies have changed the nature of the Arab public sphere. It considers the role of an open press in promoting a more democratic society, while recognizing the unique qualities of an Arab culture.

Keywords: Arab media and effects theory, Arab new media, Al-Jazeera channel and critical and cultural theories of communication.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1663
28760 Linear Cryptanalysis for a Chaos-Based Stream Cipher

Authors: Ruming Yin, Jian Yuan, Qiuhua Yang, Xiuming Shan, Xiqin Wang

Abstract:

Linear cryptanalysis methods are rarely used to improve the security of chaotic stream ciphers. In this paper, we apply linear cryptanalysis to a chaotic stream cipher which was designed by strictly using the basic design criterion of cryptosystem – confusion and diffusion. We show that this well-designed chaos-based stream cipher is still insecure against distinguishing attack. This distinguishing attack promotes the further improvement of the cipher.

Keywords: Stream cipher, chaos, linear cryptanalysis, distinguishing attack.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1731
28759 Study on the Atomic-Oxygen-Protection Film Preparation of Organic Silicon and Its Properties

Authors: Zheng-Kuohai, Yang-Shengsheng, Li-Zhonghua, Zhao-Lin

Abstract:

Materials used on exterior spacecraft surfaces are subjected to many environmental threats which can cause degradation, atomic oxygen is one of the most threats. We prepared organic silicon atomic-oxygen-protection film using method of polymerization. This paper presented the effects on the film structure and its durability of the preparation processing, and analyzed the polymerization theory, the film structure and composition of the film. At last, we tested the film in our ground based atomic oxygen simulator, and indicated that the film worked well.

Keywords: Atomic oxygen, siloxane, protection, plasma, polymerization.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1454
28758 Minimizing Fresh and Wastewater Using Water Pinch Technique in Petrochemical Industries

Authors: W. Mughees, M. Al-Ahmad, M. Naeem

Abstract:

This research involves the design and analysis of pinch-based water/wastewater networks to minimize water utility in the petrochemical and petroleum industries. A study has been done on Tehran Oil Refinery to analyze feasibilities of regeneration, reuse and recycling of water network. COD is considered as a single key contaminant. Amount of freshwater was reduced about 149m3/h (43.8%) regarding COD. Re-design (or retrofitting) of water allocation in the networks was undertaken. The results were analyzed through graphical method and mathematical programming technique which clearly demonstrated that amount of required water would be determined by mass transfer of COD.

Keywords: Minimization, Water Pinch, Water Management, Pollution Prevention.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3894
28757 Improving the Reusability and Interoperability of E-Learning Material

Authors: D. Del Corso, A. Tartaglia, E. Tresso, M. Cambiolo, L. Forno, G. Morrone

Abstract:

A key requirement for e-learning materials is reusability and interoperability, that is the possibility to use at least part of the contents in different courses, and to deliver them trough different platforms. These features make possible to limit the cost of new packages, but require the development of material according to proper specifications. SCORM (Sharable Content Object Reference Model) is a set of guidelines suitable for this purpose. A specific adaptation project has been started to make possible to reuse existing materials. The paper describes the main characteristics of SCORM specification, and the procedure used to modify the existing material.

Keywords: SCORM, e-learning, standard, educational effectiveness, assessment, methodology, open access.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1296
28756 ClassMATE: Enabling Ambient Intelligence in the Classroom

Authors: Asterios Leonidis, George Margetis, Margherita Antona, Constantine Stephanidis

Abstract:

Ambient Intelligence (AmI) environments bring significant potential to exploit sophisticated computer technology in everyday life. In particular, the educational domain could be significantly enhanced through AmI, as personalized and adapted learning could be transformed from paper concepts and prototypes to real-life scenarios. In this paper, an integrated framework is presented, named ClassMATE, supporting ubiquitous computing and communication in a school classroom. The main objective of ClassMATE is to enable pervasive interaction and context aware education in the technologically augmented classroom of the future.

Keywords: Ambient intelligence, smart classroom, pervasivecomputing, education.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2307
28755 A New Decision Making Approach based on Possibilistic Influence Diagrams

Authors: Wided Guezguez, Nahla Ben Amor

Abstract:

This paper proposes a new decision making approch based on quantitative possibilistic influence diagrams which are extension of standard influence diagrams in the possibilistic framework. We will in particular treat the case where several expert opinions relative to value nodes are available. An initial expert assigns confidence degrees to other experts and fixes a similarity threshold that provided possibility distributions should respect. To illustrate our approach an evaluation algorithm for these multi-source possibilistic influence diagrams will also be proposed.

Keywords: influnece diagram, decision making, graphical decision models, influence diagrams, possibility theory.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1281
28754 Numerical Calculation of the Ionization Energy of Donors in a Cubic Quantum well and Wire

Authors: Sara Sedaghat, Mahmood Barati, Iraj Kazeminezhad

Abstract:

The ionization energy in semiconductor systems in nano scale was investigated by using effective mass approximation. By introducing the Hamiltonian of the system, the variational technique was employed to calculate the ground state and the ionization energy of a donor at the center and in the case that the impurities are randomly distributed inside a cubic quantum well. The numerical results for GaAs/GaAlAs show that the ionization energy strongly depends on the well width for both cases and it decreases as the well width increases. The ionization energy of a quantum wire was also calculated and compared with the results for the well.

Keywords: quantum well, quantum wire, quantum dot, impuritystate

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1714
28753 The HDH Model for the Development of Creative Structural Thinking and Its Applications to Other Systems

Authors: Mosseri Avraham

Abstract:

Teaching structures and structural design in architectural studies is considered a difficult mission due to complex reasons and circumstances. This article proposes a new conceptual model (HDH) for teaching structures and structural design in architectural studies. Because of its systems-thinking orientation it is also relevant and applicable to other fields and systems. The HDH model was developed in order to encourage the integration of science and art, especially in relation to structures, in architectural studies.

Keywords: Structural Thinking, Conceptual Design, Teaching Structures, Systems Thinking.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1393
28752 An Iterative Method for the Least-squares Symmetric Solution of AXB+CYD=F and its Application

Authors: Minghui Wang

Abstract:

Based on the classical algorithm LSQR for solving (unconstrained) LS problem, an iterative method is proposed for the least-squares like-minimum-norm symmetric solution of AXB+CYD=E. As the application of this algorithm, an iterative method for the least-squares like-minimum-norm biymmetric solution of AXB=E is also obtained. Numerical results are reported that show the efficiency of the proposed methods.

Keywords: Matrix equation, bisymmetric matrix, least squares problem, like-minimum norm, iterative algorithm.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1472
28751 Multiple Positive Periodic Solutions to a Predator-prey system with Harvesting Terms and Holling II Type Functional Response

Authors: Pan Wang, Yongkun Li

Abstract:

In this paper, a periodic predator-prey system with harvesting terms and Holling II type functional response is considered. Sufficient criteria for the existence of at least sixteen periodic solutions are established by using the well known continuation theorem due to Mawhin. An example is given to illustrate the main result.

Keywords: Periodic solution, predator-prey system, harvesting terms, continuation theorem.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1268
28750 Heat Transfer from Two Cam Shaped Cylinders in Side-by-Side Arrangement

Authors: Arash Mir Abdolah Lavasani, Hamidreza Bayat

Abstract:

Heat transfer from two cam shape cylinder in side-byside arrangement had been studied numerically. The transverse gap between the centers of cylinders (T) is allowed to vary to change the pitch ratio (T/Deq). The equivalent diameter of the cylinder (Deq) is 27.6 mm and pitch ratio varies in range of 1≤T/Deq≤3. The Reynolds numbers based on equivalent circular cylinder are within 50≤ Reeq≤150. Results show that Nusselt number of cylinders increases about 1 to 36 percent when pitch ratio increases from 1 to 3.

Keywords: Cam shaped, side-by-side cylinders, numerical, heat Transfer.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1491
28749 Affine Projection Adaptive Filter with Variable Regularization

Authors: Young-Seok Choi

Abstract:

We propose two affine projection algorithms (APA) with variable regularization parameter. The proposed algorithms dynamically update the regularization parameter that is fixed in the conventional regularized APA (R-APA) using a gradient descent based approach. By introducing the normalized gradient, the proposed algorithms give birth to an efficient and a robust update scheme for the regularization parameter. Through experiments we demonstrate that the proposed algorithms outperform conventional R-APA in terms of the convergence rate and the misadjustment error.

Keywords: Affine projection, regularization, gradient descent, system identification.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1587
28748 Investigation and Evalution of Swelling Kinetics Related to Biocopolymers Based on CMC poly(AA-co BuMC)

Authors: Mohammad Sadeghi, Behrouz Heidari, Korush Montazeri

Abstract:

In this paper, we have focused on study of swelling kinetics and salt-sensitivity behavior of a superabsorbing hydrogel based on carboxymethylcellulose (CMC) and acrylic acid and 2- Buthyl methacrylate. The swelling kinetics of the hydrogels with various particle sizes was preliminary investigated as well. The swelling of the hydrogel showed a second order kinetics of swelling in water. In addition, swelling measurements of the synthesized hydrogels in various chloride salt solutions was measured. Results indicated that a swelling-loss with an increase in the ionic strength of the salt solutions.

Keywords: Carboxymethylcellulose, swelling kinetics, 2-hydroxypropylmetacrylate, acrylic acid.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1518
28747 VoIP Networks Performance Analysis with Encryption Systems

Authors: Edward Paul Guillen, Diego Alejandro Chacon

Abstract:

The VoIP networks as alternative method to traditional PSTN system has been implemented in a wide variety of structures with multiple protocols, codecs, software and hardware–based distributions. The use of cryptographic techniques let the users to have a secure communication, but the calculate throughput as well as the QoS parameters are affected according to the used algorithm. This paper analyzes the VoIP throughput and the QoS parameters with different commercial encryption methods. The measurement–based approach uses lab scenarios to simulate LAN and WAN environments. Security mechanisms such as TLS, SIAX2, SRTP, IPSEC and ZRTP are analyzed with μ-LAW and GSM codecs.

Keywords: VoIP, Secure VoIP, Throughput Analysis, VoIP QoS evaluation

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2877
28746 The Role of Work Ethic in the Development of Singapore, South Korea, Malaysia, Japan and European Countries

Authors: Aidos Altynbekov, Gulmira Abdiraiymova, Gulnar Kenzhakimova, Mansya Sadyrova, Gulnapis Abdikerova

Abstract:

Work ethic and labour productivity issues are extremely important for any society. It has been long proven by the global practice and various scholars that the country promoting the labour has always been way forward from the other countries. This paper studies the thoughts suggested by M.Weber, Confucius, Lee Kuan Yew, Mahathir Mohammad and other prominent thinkers concerning the issues of work ethics and labour productivity. The article analyzes why developed nations are way more advanced in their development compared to other nations.

Keywords: Work ethic, labour productivity, religion, philosophy.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3676
28745 Influence of Sodium Acetate on Electroless Ni-P Deposits and Effect of Heat Treatment on Corrosion Behavior

Authors: Y. El Kaissi, M. Allam, A. Koulou, M. Galai, M. Ebn Touhami

Abstract:

The aim of our work is to develop an industrial bath of nickel alloy deposit on mild steel. The optimization of the operating parameters made it possible to obtain a stable Ni-P alloy deposition formulation. To understand the reaction mechanism of the deposition process, a kinetic study was performed by cyclic voltammetry and by electrochemical impedance spectroscopy (EIS). The coatings obtained have a very high corrosion resistance in a very aggressive acid medium which increases with the heat treatment.

Keywords: Ni–P coating, electrochemical impedance spectroscopy, heat treatment, cyclic voltammetry, potentiodynamic polarization.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1226
28744 Propagation of Nonlinear Surface Waves in Relativistically Degenerate Quantum Plasma Half-Space

Authors: Swarniv Chandra, Parthasona Maji, Basudev Ghosh

Abstract:

The nonlinear self-interaction of an electrostatic surface wave on a semibounded quantum plasma with relativistic degeneracy is investigated by using quantum hydrodynamic (QHD) model and the Poisson’s equation with appropriate boundary conditions. It is shown that a part of the second harmonic generated through self-interaction does not have a true surface wave character but propagates obliquely away from the plasma-vacuum interface into the bulk of plasma.

Keywords: Harmonic Generation, Quantum Plasma, Quantum Hydrodynamic Model, Relativistic Degeneracy, Surface waves.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2248
28743 Analysis of Security Vulnerabilities for Mobile Health Applications

Authors: Y. Cifuentes, L. Beltrán, L. Ramírez

Abstract:

The availability to deploy mobile applications for health care is increasing daily thru different mobile app stores. But within these capabilities the number of hacking attacks has also increased, in particular into medical mobile applications. The security vulnerabilities in medical mobile apps can be triggered by errors in code, incorrect logic, poor design, among other parameters. This is usually used by malicious attackers to steal or modify the users’ information. The aim of this research is to analyze the vulnerabilities detected in mobile medical apps according to risk factor standards defined by OWASP in 2014.

Keywords: mHealth apps, OWASP, protocols, security vulnerabilities, risk factors.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 4386
28742 Numerical Simulation of a Solar Photovoltaic Panel Cooled by a Forced Air System

Authors: D. Nebbali, R. Nebbali, A. Ouibrahim

Abstract:

This study focuses on the cooling of a photovoltaic panel (PV). Indeed, the cooling improves the conversion capacity of this one and maintains, under extreme conditions of air temperature, the panel temperature at an appreciable level which avoids the altering. To do this, a fan provides forced circulation of air. Because the fan is supplied by the panel, it is necessary to determine the optimum operating point that unites efficiency of the PV with the consumption of the fan. For this matter, numerical simulations are performed at varying mass flow rates of air, under two extreme air temperatures (50°C, 25°C) and a fixed solar radiation (1000W.m2) in a case of no wind.

Keywords: Energy conversion, efficiency, balance energy, solar cell.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2454
28741 Fuzzy Set Approach to Study Appositives and Its Impact Due to Positional Alterations

Authors: E. Mike Dison, T. Pathinathan

Abstract:

Computing with Words (CWW) and Possibilistic Relational Universal Fuzzy (PRUF) are the two concepts which widely represent and measure the vaguely defined natural phenomenon. In this paper, we study the positional alteration of the phrases by which the impact of a natural language proposition gets affected and/or modified. We observe the gradations due to sensitivity/feeling of a statement towards the positional alterations. We derive the classification and modification of the meaning of words due to the positional alteration. We present the results with reference to set theoretic interpretations.

Keywords: Appositive, computing with words, PRUF, semantic sentiment analysis, set theoretic interpretations.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 818
28740 The Analysis and Simulation of TRACE in the Ultimate Response Guideline for Chinshan BWR/4 Nuclear Power Plant

Authors: J. R. Wang, H. T. Lin, H. C. Chen, C. Shih, S. W. Chen, S. C. Chiang, C. C. Liu

Abstract:

In this research, TRACE model of Chinshan BWR/4 nuclear power plant (NPP) has been developed for the simulation and analysis of ultimate response guideline (URG).The main actions of URG are the depressurization and low pressure water injection of reactor and containment venting. This research focuses to verify the URG efficiency under Fukushima-like conditions. TRACE analysis results show that the URG can keep the PCT below the criteria 1088.7 K under Fukushima-like conditions. It indicated that Chinshan NPP was safe.

Keywords: BWR, TRACE, safety analysis, URG.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2321
28739 Modeling and Control of Two Manipulators Handling a Flexible Beam

Authors: Amer S. Al-Yahmadi, T.C. Hsia

Abstract:

This paper seeks to develop simple yet practical and efficient control scheme that enables cooperating arms to handle a flexible beam. Specifically the problem studied herein is that of two arms rigidly grasping a flexible beam and such capable of generating forces/moments in such away as to move a flexible beam along a predefined trajectory. The paper develops a sliding mode control law that provides robustness against model imperfection and uncertainty. It also provides an implicit stability proof. Simulation results for two three joint arms moving a flexible beam, are presented to validate the theoretical results.

Keywords: Sliding mode control, cooperative manipulators.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1614
28738 A System Functions Set-Up through Near Field Communication of a Smartphone

Authors: Jaemyoung Lee

Abstract:

We present a method to set up system functions through a near filed communication (NFC) of a smartphone. The short communication distance of the NFC which is usually less than 4 cm could prevent any interferences from other devices and establish a secure communication channel between a system and the smartphone. The proposed set-up method for system function values is demonstrated for a blacbox system in a car. In demonstration, system functions of a blackbox which is manipulated through NFC of a smartphone are controls of image quality, sound level, shock sensing level to store images, etc. The proposed set-up method for system function values can be used for any devices with NFC.

Keywords: System set-up, near field communication, smartphone, Android.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1682
28737 The Role of the State Budget: An Evaluation of Public Expenditures and Taxes in Turkey

Authors: Erdal Eroğlu, Özhan Çetinkaya

Abstract:

The purpose of this paper is to show how state plays a regulatory role in the relations of distribution by analyzing tax and expenditure in Turkey. This paper has two main arguments. First, state intervenes in economic and social life via budget policies and steers the relations of distribution within the scope of the reproduction of the capital accumulation and legitimacy. Secondly, a great amount of public expenditure benefits capital owners while state gains its tax income mainly from low and middle income groups.

Keywords: Distribution, public expenditure, state budget, taxes.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1290
28736 MIMO-OFDM Coded for Digital Terrestrial Television Broadcasting Systems

Authors: El Miloud A.R. Reyouchi, Kamal Ghoumid, Koutaiba Amezian, Otman Mrabet

Abstract:

This paper proposes and analyses the wireless telecommunication system with multiple antennas to the emission and reception MIMO (multiple input multiple output) with space diversity in a OFDM context. In particular it analyses the performance of a DTT (Digital Terrestrial Television) broadcasting system that includes MIMO-OFDM techniques. Different propagation channel models and configurations are considered for each diversity scheme. This study has been carried out in the context of development of the next generation DVB-T/H and WRAN.

Keywords: MIMO, MISO, OFDM, DVB-/H/T2, WRAN.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2688
28735 Multiband CPW-Fed Slot Antenna with L-slot Bowtie Tuning Stub

Authors: Prapoch Jirasakulporn

Abstract:

This paper presents a multiband CPW-fed slot antenna with L-slot bowtie tuning stub. The proposed antenna has been designed for PCS 1900, UMTS, WLAN 802.11 a/b/g and bluetooth applications, with a cost-effective FR4 substrate. The proposed antenna still radiate as omni-directional in azimuth plane and sufficient bandwidth for all above mentions. The proposed antenna works as dual-wideband, bandwidth at low frequency band and high frequency are about 45.49 % and 22.39 % respectively. The experimental results of the constructed prototype are presented and also compared with simulation results using a commercial software tool.

Keywords: multiband antenna, slot antenna, CPW-fed, L-slotbowtie stub

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2155
28734 Survey on Jamming Wireless Networks: Attacks and Prevention Strategies

Authors: S. Raja Ratna, R. Ravi

Abstract:

Wireless networks are built upon the open shared medium which makes easy for attackers to conduct malicious activities. Jamming is one of the most serious security threats to information economy and it must be dealt efficiently. Jammer prevents legitimate data to reach the receiver side and also it seriously degrades the network performance. The objective of this paper is to provide a general overview of jamming in wireless network. It covers relevant works, different jamming techniques, various types of jammers and typical prevention techniques. Challenges associated with comparing several anti-jamming techniques are also highlighted.

Keywords: Channel, Cryptography, Frequency, Jamming, Legitimate, Security, Wavelength.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3139
28733 Flexural Properties of Halloysite Nanotubes-Polyester Nanocomposites Exposed to Aggressive Environment

Authors: Mohd Shahneel Saharudin, Jiacheng Wei, Islam Shyha, Fawad Inam

Abstract:

This study aimed to investigate the effect of aggressive environment on the flexural properties of halloysite nanotubes-polyester nanocomposites. Results showed that the addition of halloysite nanotubes into polyester matrix was found to improve flexural properties of the nanocomposites in dry condition and after water-methanol exposure. Significant increase in surface roughness was also observed and measured by Alicona Infinite Focus optical microscope.

Keywords: Halloysite nanotubes, polymer degradation, flexural properties, surface roughness.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 958
28732 Shape-Based Image Retrieval Using Shape Matrix

Authors: C. Sheng, Y. Xin

Abstract:

Retrieval image by shape similarity, given a template shape is particularly challenging, owning to the difficulty to derive a similarity measurement that closely conforms to the common perception of similarity by humans. In this paper, a new method for the representation and comparison of shapes is present which is based on the shape matrix and snake model. It is scaling, rotation, translation invariant. And it can retrieve the shape images with some missing or occluded parts. In the method, the deformation spent by the template to match the shape images and the matching degree is used to evaluate the similarity between them.

Keywords: shape representation, shape matching, shape matrix, deformation

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1491