Search results for: multiple stream model
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 8709

Search results for: multiple stream model

2919 The Core and Shapley Function for Games on Augmenting Systems with a Coalition Structure

Authors: Fan-Yong Meng

Abstract:

In this paper, we first introduce the model of games on augmenting systems with a coalition structure, which can be seen as an extension of games on augmenting systems. The core of games on augmenting systems with a coalition structure is defined, and an equivalent form is discussed. Meantime, the Shapley function for this type of games is given, and two axiomatic systems of the given Shapley function are researched. When the given games are quasi convex, the relationship between the core and the Shapley function is discussed, which does coincide as in classical case. Finally, a numerical example is given.

Keywords: Cooperative game, augmenting system, Shapley function, core.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1166
2918 Assessment the Quality of Telecommunication Services by Fuzzy Inferences System

Authors: Oktay Nusratov, Ramin Rzaev, Aydin Goyushov

Abstract:

Fuzzy inference method based approach to the forming of modular intellectual system of assessment the quality of communication services is proposed. Developed under this approach the basic fuzzy estimation model takes into account the recommendations of the International Telecommunication Union in respect of the operation of packet switching networks based on IPprotocol. To implement the main features and functions of the fuzzy control system of quality telecommunication services it is used multilayer feedforward neural network.

Keywords: Quality of communication, IP-telephony, Fuzzy set, Fuzzy implication, Neural network.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2328
2917 Extended Minimal Controller Synthesis for Voltage-Fed Induction Motor Based on the Hyperstability Theory

Authors: A. Ramdane, F.Naceri, S. Ramdane

Abstract:

in this work, we present a new strategy of direct adaptive control denoted: Extended minimal controller synthesis (EMCS). This algorithm is designed for an induction motor, which includes both electrical and mechanical dynamics under the assumptions of linear magnetic circuits. The main motivation of the EMCS control is to enhance the robustness of the MRAC algorithms, i.e. the rejection of bounded effects of rapidly varying external disturbances.

Keywords: Adaptive Control, Simple model reference adaptive control (SMRAC), Extended Minimal Controller synthesis (EMCS), Induction Motor (IM)

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1619
2916 2D Image Processing for DSO Astrophotography

Authors: R. Suszynski, K. Wawryn, R. Wirski

Abstract:

The new concept of two–dimensional (2D) image processing implementation for auto-guiding system is shown in this paper. It is dedicated to astrophotography and operates with astronomy CCD guide cameras or with self-guided dual-detector CCD cameras and ST4 compatible equatorial mounts. This idea was verified by MATLAB model, which was used to test all procedures and data conversions. Next the circuit prototype was implemented at Altera MAX II CPLD device and tested for real astronomical object images. The digital processing speed of CPLD prototype board was sufficient for correct equatorial mount guiding in real-time system.

Keywords: DSO astrophotography, image processing, twodimensionalconvolution method, two-dimensional filtering.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2251
2915 Stakeholder Analysis: Who are the Key Actorsin Establishing and Developing Thai Independent Consumer Organizations?

Authors: P. Ondee, S. Pannarunothai

Abstract:

In Thailand, both the 1997 and the current 2007 Thai Constitutions have mentioned the establishment of independent organizations as a new mechanism to play a key role in proposing policy recommendations to national decision-makers in the interest of collective consumers. Over the last ten years, no independent organizations have yet been set up. Evidently, nobody could point out who should be key players in establishing provincial independent consumer bodies. The purpose of this study was to find definitive stakeholders in establishing and developing independent consumer bodies in a Thai context. This was a cross-sectional study between August and September 2007, using a postal questionnaire with telephone follow-up. The questionnaire was designed and used to obtain multiple stakeholder assessment of three key attributes (power, interest and influence). Study population was 153 stakeholders associated with policy decision-making, formulation and implementation processes of civil-based consumer protection in pilot provinces. The population covered key representatives from five sectors (academics, government officers, business traders, mass media and consumer networks) who participated in the deliberative forums at 10 provinces. A 49.7% response rate was achieved. Data were analyzed, comparing means of three stakeholder attributes and classification of stakeholder typology. The results showed that the provincial health officers were the definitive stakeholders as they had legal power, influence and interest in establishing and sustaining the independent consumer bodies. However, only a few key representatives of the provincial health officers expressed their own paradigm on the civil-based consumer protection. Most provincial health officers put their own standpoint of building civic participation at only a plan-implementation level. For effective policy implementation by the independent consumer bodies, the Thai government should provide budgetary support for the operation of the provincial health officers with their paradigm shift as well as their own clarified standpoint on corporate governance.

Keywords: Civic participation, civil society, consumerprotection, independent organization, policy decision-making, stakeholder analysis.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1923
2914 Detailed Phenomenological Study of 14N Elastically Scattered on 12C in a wide Energy Range

Authors: Sh. Hamada, N. Burtebayev, N. Amangeldi, A. Amar

Abstract:

An experiment was performed with a 24.5 MeV 14N beam on a 12C target in the cyclotron DC-60 located in Astana, Kazakhstan, to study the elastic scattering of 14N on 12C; the scattering was also analyzed at different energies for tracking the phenomenon of remarkable structure at large angles. Its aims were to extend the measurements to very large angles, and attempt to uniquely identify the elastic scattering potential. Good agreement between the theoretical and experimental data has been obtained with suitable optical potential parameters. Optical model calculations with l -dependent imaginary potentials were also applied to the data and relatively good agreement was found.

Keywords: Optical Potential Codes, Elastic Scattering, SPIVALCode.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1544
2913 Improving Cleanability by Changing Fish Processing Equipment Design

Authors: Lars A. L. Giske, Ola J. Mork, Emil Bjoerlykhaug

Abstract:

The design of fish processing equipment greatly impacts how easy the cleaning process for the equipment is. This is a critical issue in fish processing, as cleaning of fish processing equipment is a task that is both costly and time consuming, in addition to being very important with regards to product quality. Even more, poorly cleaned equipment could in the worst case lead to contaminated product from which consumers could get ill. This paper will elucidate how equipment design changes could improve the work for the cleaners and saving money for the fish processing facilities by looking at a case for product design improvements. The design of fish processing equipment largely determines how easy it is to clean. “Design for cleaning” is the new hype in the industry and equipment where the ease of cleaning is prioritized gets a competitive advantage over equipment in which design for cleaning has not been prioritized. Design for cleaning is an important research area for equipment manufacturers. SeaSide AS is doing continuously improvements in the design of their products in order to gain a competitive advantage. The focus in this paper will be conveyors for internal logistic and a product called the “electro stunner” will be studied with regards to “Design for cleaning”. Often together with SeaSide’s customers, ideas for new products or product improvements are sketched out, 3D-modelled, discussed, revised, built and delivered. Feedback from the customers is taken into consideration, and the product design is revised once again. This loop was repeated multiple times, and led to new product designs. The new designs sometimes also cause the manufacturing processes to change (as in going from bolted to welded connections). Customers report back that the concrete changes applied to products by SeaSide has resulted in overall more easily cleaned equipment. These changes include, but are not limited to; welded connections (opposed to bolted connections), gaps between contact faces, opening up structures to allow cleaning “inside” equipment, and generally avoiding areas in which humidity and water may gather and build up. This is important, as there will always be bacteria in the water which will grow if the area never dries up. The work of creating more cleanable design is still ongoing, and will “never” be finished as new designs and new equipment will have their own challenges.

Keywords: Cleaning, design, equipment, fish processing, innovation.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1132
2912 Enhancing the Network Security with Gray Code

Authors: Thomas Adi Purnomo Sidhi

Abstract:

Nowadays, network is an essential need in almost every part of human daily activities. People now can seamlessly connect to others through the Internet. With advanced technology, our personal data now can be more easily accessed. One of many components we are concerned for delivering the best network is a security issue. This paper is proposing a method that provides more options for security. This research aims to improve network security by focusing on the physical layer which is the first layer of the OSI model. The layer consists of the basic networking hardware transmission technologies of a network. With the use of observation method, the research produces a schematic design for enhancing the network security through the gray code converter.

Keywords: Network, network security, gray code, physical layer.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2145
2911 Calculation of Wave Function at the Origin (WFO) for Heavy Mesons by Numerical Solving of the Schrodinger Equation

Authors: M. Momeni Feyli

Abstract:

Many recent high energy physics calculations involving charm and beauty invoke wave function at the origin (WFO) for the meson bound state. Uncertainties of charm and beauty quark masses and different models for potentials governing these bound states require a simple numerical algorithm for evaluation of the WFO's for these bound states. We present a simple algorithm for this propose which provides WFO's with high precision compared with similar ones already obtained in the literature.

Keywords: Mesons, Bound states, Schrodinger equation, Nonrelativistic quark model.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1484
2910 A Strategy to Optimize the SPC Scheme for Mass Production of HDD Arm with ClusteringTechnique and Three-Way Control Chart

Authors: W. Chattinnawat

Abstract:

Consider a mass production of HDD arms where hundreds of CNC machines are used to manufacturer the HDD arms. According to an overwhelming number of machines and models of arm, construction of separate control chart for monitoring each HDD arm model by each machine is not feasible. This research proposed a strategy to optimize the SPC management on shop floor. The procedure started from identifying the clusters of the machine with similar manufacturing performance using clustering technique. The three way control chart ( I - MR - R ) is then applied to each clustered group of machine. This proposed research has advantageous to the manufacturer in terms of not only better performance of the SPC but also the quality management paradigm.

Keywords: Three way control chart. I - MR - R , between/within variation, HDD arm.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1616
2909 Cooling of Fresh Vegetable Farm Produce: Experimental and Numerical Studies

Authors: Hala Yassine, Hervé Noel, Pascal Le Bideau, Patrick Glouannec

Abstract:

Following harvest, fresh produce needs to be cooled immediately in a room where the air temperature and the relative air humidity are controlled to maintain the produce quality. In this paper, an experimental study for forced air cooling of fresh produce (cauliflower) is performed using a pilot developed within our laboratory. Furthermore, a numerical simulation of spherical produces, taking into account the aerodynamic aspect and also the heat transfer in the produce and in the air, was carried out using a finite element method. At the end of this communication, experimental results are presented and compared with the simulation.

Keywords: Cauliflower, Forced air cooling, Heat transfer, Numerical model, Tunnel of air.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2224
2908 Probability of Globality

Authors: Eva Eggeling, Dieter W. Fellner, Torsten Ullrich

Abstract:

The objective of global optimization is to find the globally best solution of a model. Nonlinear models are ubiquitous in many applications and their solution often requires a global search approach; i.e. for a function f from a set A ⊂ Rn to the real numbers, an element x0 ∈ A is sought-after, such that ∀ x ∈ A : f(x0) ≤ f(x). Depending on the field of application, the question whether a found solution x0 is not only a local minimum but a global one is very important. This article presents a probabilistic approach to determine the probability of a solution being a global minimum. The approach is independent of the used global search method and only requires a limited, convex parameter domain A as well as a Lipschitz continuous function f whose Lipschitz constant is not needed to be known.

Keywords: global optimization, probability theory, probability of globality

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1560
2907 Observer Design for Chaos Synchronization of Time-delayed Power Systems

Authors: Jui-Sheng Lin, Yi-Sung Yang, Meei-Ling Hung, Teh-Lu Liao, Jun-Juh Yan

Abstract:

The global chaos synchronization for a class of time-delayed power systems is investigated via observer-based approach. By employing the concepts of quadratic stability theory and generalized system model, a new sufficient criterion for constructing an observer is deduced. In contrast to the previous works, this paper proposes a theoretical and systematic design procedure to realize chaos synchronization for master-slave power systems. Finally, an illustrative example is given to show the applicability of the obtained scheme.

Keywords: Chaos, Synchronization, Quadratic stability theory, Observer

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1694
2906 Enterprise Infrastructure Related to the Product Value Transferred from Intellectual Capital

Authors: Chih Chin Yang

Abstract:

The paper proposed a new theory of intellectual capital (so called IC) and a value approach in associated with production and market. After an in-depth review and research analysis of leading firms in this field, a holistic intellectual capital model is discussed, which involves transport, delivery supporting, and interface and systems of on intellectual capital. Through a quantity study, it is found that there is a significant relationship between the product value and infrastructure in a company. The product values are transferred from intellectual capital elements which includes three elements of content and the enterprise includes three elements of infrastructure in its market and product values of enterprise. 

Keywords: Enterprise, product value, intellectual capital.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1504
2905 A Side-Peak Cancellation Scheme for CBOC Code Acquisition

Authors: Youngpo Lee, Seokho Yoon

Abstract:

In this paper, we propose a side-peak cancellation scheme for code acquisition of composite binary offset carrier (CBOC) signals. We first model the family of CBOC signals in a generic form, and then, propose a side-peak cancellation scheme by combining correlation functions between the divided sub-carrier and received signals. From numerical results, it is shown that the proposed scheme removes the side-peak completely, and moreover, the resulting correlation function demonstrates the better power ratio performance than the CBOC autocorrelation.

Keywords: CBOC, side-peak, ambiguity problem, synchronization

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1719
2904 The Application of Non-quantitative Modelling in the Analysis of a Network Warfare Environment

Authors: N. Veerasamy, JPH Eloff

Abstract:

Network warfare is an emerging concept that focuses on the network and computer based forms through which information is attacked and defended. Various computer and network security concepts thus play a role in network warfare. Due the intricacy of the various interacting components, a model to better understand the complexity in a network warfare environment would be beneficial. Non-quantitative modeling is a useful method to better characterize the field due to the rich ideas that can be generated based on the use of secular associations, chronological origins, linked concepts, categorizations and context specifications. This paper proposes the use of non-quantitative methods through a morphological analysis to better explore and define the influential conditions in a network warfare environment.

Keywords: Morphological, non-quantitative, network warfare.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1358
2903 On the Operation Mechanism and Device Modeling of AlGaN/GaN High Electron Mobility Transistors (HEMTs)

Authors: Li Yuan, Weizhu Wang, Kean Boon Lee, Haifeng Sun, Susai Lawrence Selvaraj, Shane Todd, Guo-Qiang Lo

Abstract:

In this work, the physical based device model of AlGaN/GaN high electron mobility transistors (HEMTs) has been established and the corresponding device operation behavior has been investigated also by using Sentaurus TCAD from Synopsys. Advanced AlGaN/GaN hetero-structures with GaN cap layer and AlN spacer have been considered and the GaN cap layer and AlN spacer are found taking important roles on the gate leakage blocking and off-state breakdown voltage enhancement.

Keywords: AlGaN/GaN, HEMT, Physical mechanism, TCAD simulation

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3780
2902 Automatic Intelligent Analysis of Malware Behaviour

Authors: H. Dornhackl, K. Kadletz, R. Luh, P. Tavolato

Abstract:

In this paper, we describe the use of formal methods to model malware behaviour. The modelling of harmful behaviour rests upon syntactic structures that represent malicious procedures inside malware. The malicious activities are modelled by a formal grammar, where API calls’ components are the terminals and the set of API calls used in combination to achieve a goal are designated non-terminals. The combination of different non-terminals in various ways and tiers make up the attack vectors that are used by harmful software. Based on these syntactic structures a parser can be generated which takes execution traces as input for pattern recognition.

Keywords: Malware behaviour, modelling, parsing, search, pattern matching.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1487
2901 Genetic Algorithm with Fuzzy Genotype Values and Its Application to Neuroevolution

Authors: Hidehiko Okada

Abstract:

The author proposes an extension of genetic algorithm (GA) for solving fuzzy-valued optimization problems. In the proposed GA, values in the genotypes are not real numbers but fuzzy numbers. Evolutionary processes in GA are extended so that GA can handle genotype instances with fuzzy numbers. The proposed method is applied to evolving neural networks with fuzzy weights and biases. Experimental results showed that fuzzy neural networks evolved by the fuzzy GA could model hidden target fuzzy functions well despite the fact that no training data was explicitly provided.

Keywords: Evolutionary algorithm, genetic algorithm, fuzzy number, neural network, neuroevolution.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2280
2900 Hybrid Project Management Model Based on Lean and Agile Approach

Authors: F. Z. Eddoug, J. Benhra, R. Benabbou

Abstract:

Excellence and Success are the ultimate goal for any project and in order to achieve it, every project manager looks for the convenient tools and methods. This work proposes a framework that seeks an efficient management of general project through a lean and agile approach. In order to get this objective, the article was divided in two stages, the first one was emphasized on exploring and analyzing the existing project management models and then in the second one the desired framework was created, beginning by focusing on seven existing models and then proposing for each phase of the framework the convenient lean and agile tools.

Keywords: Agility, hybrid project management, lean, scrum.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 379
2899 Integral Methods in the Determination of Temperature Fields of Cooled Blades of Gas Turbines

Authors: C. Ardil

Abstract:

A mathematical model and an effective numerical method for calculating the temperature field of the profile part of convection cooled blades have been developed. The theoretical substantiation of the method is proved by corresponding theorems. To this end, convergent quadrature processes were developed and error estimates were obtained in terms of the Zygmund continuity moduli.The boundary conditions for heat exchange are determined from the solution of the corresponding integral equations and empirical relations.The reliability of the developed methods is confirmed by the calculation-experimental studies of the thermohydraulic characteristics of the nozzle apparatus of the first stage of a gas turbine.

Keywords: Integral methods, determination of temperature fields, cooled blades, gas turbines.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 731
2898 The Shanghai Cooperation Organization: China's Grand Strategy in Central Asia

Authors: Mara Gubaidullina, Aigerim Yelibayeva

Abstract:

The Shanghai Cooperation Organization is one of the successful outcomes of China's foreign policy since the end of the Cold war. The expansion of multilateral ties all over the world by dint of pursuing institutional strategies as SCO, identify China as a more constructive power. SCO became a new model of cooperation that was formed on remains of collapsed Soviet system, and predetermined China's geopolitical role in the region. As the fast developing effective regional mechanism, SCO today has more of external impact on the international system and forms a new type of interaction for promoting China's grand strategy of 'peaceful rise'.

Keywords: Central Asia, China's grand strategy, Shanghai Cooperation Organization.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1972
2897 Periodic Solutions for a Food Chain System with Monod–Haldane Functional Response on Time Scales

Authors: Kejun Zhuang, Hailong Zhu

Abstract:

In this paper, the three species food chain model on time scales is established. The Monod–Haldane functional response and time delay are considered. With the help of coincidence degree theory, existence of periodic solutions is investigated, which unifies the continuous and discrete analogies.

Keywords: Food chain system, periodic solution, time scales, coincidence degree.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 8449
2896 Vibroacoustic Modulation of Wideband Vibrations and Its Possible Application for Windmill Blade Diagnostics

Authors: Abdullah Alnutayfat, Alexander Sutin, Dong Liu

Abstract:

Wind turbine has become one of the most popular energy production methods. However, failure of blades and maintenance costs evolve into significant issues in the wind power industry, so it is essential to detect the initial blade defects to avoid the collapse of the blades and structure. This paper aims to apply modulation of high-frequency blade vibrations by low-frequency blade rotation, which is close to the known Vibro-Acoustic Modulation (VAM) method. The high-frequency wideband blade vibration is produced by the interaction of the surface blades with the environment air turbulence, and the low-frequency modulation is produced by alternating bending stress due to gravity. The low-frequency load of rotational wind turbine blades ranges between 0.2-0.4 Hz and can reach up to 2 Hz for strong wind. The main difference between this study and previous ones on VAM methods is the use of a wideband vibration signal from the blade's natural vibrations. Different features of the VAM are considered using a simple model of breathing crack. This model considers the simple mechanical oscillator, where the parameters of the oscillator are varied due to low-frequency blade rotation. During the blade's operation, the internal stress caused by the weight of the blade modifies the crack's elasticity and damping. The laboratory experiment using steel samples demonstrates the possibility of VAM using a probe wideband noise signal. A cycle load with a small amplitude was used as a pump wave to damage the tested sample, and a small transducer generated a wideband probe wave. The received signal demodulation was conducted using the Detecting of Envelope Modulation on Noise (DEMON) approach. In addition, the experimental results were compared with the modulation index (MI) technique regarding the harmonic pump wave. The wideband and traditional VAM methods demonstrated similar sensitivity for earlier detection of invisible cracks. Importantly, employing a wideband probe signal with the DEMON approach speeds up and simplifies testing since it eliminates the need to conduct tests repeatedly for various harmonic probe frequencies and to adjust the probe frequency.

Keywords: Damage detection, turbine blades, Vibro-Acoustic Structural Health Monitoring, SHM, Detecting of Envelope Modulation on Noise.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 394
2895 An Investigation of the Cu-Ni Compound Cathode Materials Affecting on Transient Recovery Voltage

Authors: Arunrungrusmi S, Chaokamnerd W, Tanitteerapan T, Mungkung N., Yuji T.

Abstract:

The purpose of this research was to analyze and compare the instability of a contact surface between Copper and Nickel an alloy cathode in vacuum, the different ratio of Copper and Copper were conducted at 1%, 2% and 4% by using the cathode spot model. The transient recovery voltage is predicted. The cathode spot region is recognized as the collisionless space charge sheath connected with singly ionized collisional plasma. It was found that the transient voltage is decreased with increasing the percentage of an amount of Nickel in cathode materials.

Keywords: Vacuum arc, Instability, Low current, Cathode spot, copper, Nickel, Transient Recovery Voltage.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1427
2894 Implementing Adaptive Steganography by Exploring the Ycbcr Color Model Characteristics

Authors: Surbhi Gupta, Alka Handa, Parvinder S.Sandhu

Abstract:

Stegnography is a new way of secret communication the most widely used mechanism on account of its simplicity is the use of the least significant bit. We have used the least significant bit (2 LSB and 4 LSB) substitution method. Depending upon the characteristics of the individual portions of cover image we decide whether to use 2 LSB or 4 LSB thus it is an adaptive stegnography technique. We used one of the three channels to behave as indicator to indicate the presence of hidden data in other two channels. The module showed impressive results in terms of capacity to hide the data. In proposed method, instead of using RGB color space directly, YCbCr color space is used to make use of human visual system characteristic.

Keywords: Stegoimage, steganography, Pixel indicator, segmentation, YCbCr..

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2163
2893 2D Bar Codes Reading: Solutions for Camera Phones

Authors: Hao Wang, Yanming Zou

Abstract:

Two-dimensional (2D) bar codes were designed to carry significantly more data with higher information density and robustness than its 1D counterpart. Thanks to the popular combination of cameras and mobile phones, it will naturally bring great commercial value to use the camera phone for 2D bar code reading. This paper addresses the problem of specific 2D bar code design for mobile phones and introduces a low-level encoding method of matrix codes. At the same time, we propose an efficient scheme for 2D bar codes decoding, of which the effort is put on solutions of the difficulties introduced by low image quality that is very common in bar code images taken by a phone camera.

Keywords: 2D bar code reading, camera phone, low-level encoding, mixed model

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1822
2892 Numerical Modeling of Temperature Fields in Aviation Gas Turbine Elements

Authors: A. M. Pashaev, R. A. Sadihov, A. S. Samedov, C. Ardil

Abstract:

A mathematical model and a numerical method for computing the temperature field of the profile part of convectionally cooled blades are developed. The theoretical substantiation of the method is proved by corresponding theorems. To this end, convergent quadrature processes were developed and error estimates were obtained in terms of the Zygmund continuity moduli. The boundary conditions for heat exchange are determined from the solution of the corresponding integral equations and empirical relations. The reliability of the developed methods is confirmed by calculation and experimental studies of the thermohydraulic characteristics of the nozzle apparatus of the first stage of the gas turbine.

Keywords: Aviation gas turbine, temperature field, cooled blades, numerical modeling.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 731
2891 Simulation of the Evacuation of Ships Carrying Dangerous Goods from Tsunami

Authors: Yoshinori Matsuura, Saori Iwanaga

Abstract:

The Great East Japan Earthquake occurred at 14:46 on Friday, March 11, 2011. It was the most powerful known earthquake to have hit Japan. The earthquake triggered extremely destructive tsunami waves of up to 40.5 meters in height. We focus on the ship’s evacuation from tsunami. Then we analyze about ships evacuation from tsunami using multi-agent simulation and we want to prepare for a coming earthquake. We developed a simulation model of ships that set sail from the port in order to evacuate from the tsunami considering the ship carrying dangerous goods.

Keywords: Multi-agent simulation, Ship’s evacuation, Tsunami.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1876
2890 Negative Pressures of Ca. -20 MPA for Water Enclosed into a Metal Berthelot Tube under a Vacuum Condition

Authors: K. Hiro, Y. Imai, M. Tanji, H. Deguchi, K. Hatari

Abstract:

Negative pressures of liquids have been expected to contribute many kinds of technology. Nevertheless, experiments for subjecting liquids which have not too small volumes to negative pressures are difficult even now. The reason of the difficulties is because the liquids tend to generate cavities easily. In order to remove cavitation nuclei, an apparatus for enclosing water into a metal Berthelot tube under vacuum conditions was developed. By using the apparatus, negative pressures for water rose to ca. -20 MPa. This is the highest value for water in metal Berthelot tubes. Results were explained by a traditional crevice model. Keywords

Keywords: Berthelot method, negative pressure, cavitation

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1050