Search results for: steady state gain.
1951 Rheological Behaviors of Crude Oil in the Presence of Water
Authors: Madjid Meriem-Benziane, Hamou Zahloul
Abstract:
The rheological properties of light crude oil and its mixture with water were investigated experimentally. These rheological properties include steady flow behavior, yield stress, transient flow behavior, and viscoelastic behavior. A RheoStress RS600 rheometer was employed in all of the rheological examination tests. The light crude oil exhibits a Newtonian and for emulsion exhibits a non-Newtonian shear thinning behavior over the examined shear rate range of 0.1–120 s-1. In first time, a series of samples of crude oil from the Algerian Sahara has been tested and the results expressed in terms of τ=f(γ) have demonstrated their Newtonian character for the temperature included in [20°C, 70°C]. In second time and at T=20°C, the oil-water emulsions (30%, 50% and 70%) by volume of water), thermodynamically stable, have demonstrated a non-Newtonian rheological behavior that is to say, Herschel-Bulkley and Bingham types. For each type of crude oil-water emulsion, the rheological parameters are calculated by numerical treatment of results.
Keywords: Crude oil Algerian, Emulsion, Newtonian, Non- Newtonian, viscosity.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 34181950 Homotopy Analysis Method for Hydromagnetic Plane and Axisymmetric Stagnation-point Flow with Velocity Slip
Authors: Jing Zhu, Liancun Zheng, Xinxin Zhang
Abstract:
This work is focused on the steady boundary layer flow near the forward stagnation point of plane and axisymmetric bodies towards a stretching sheet. The no slip condition on the solid boundary is replaced by the partial slip condition. The analytical solutions for the velocity distributions are obtained for the various values of the ratio of free stream velocity and stretching velocity, slip parameter, the suction and injection velocity parameter, magnetic parameter and dimensionality index parameter in the series forms with the help of homotopy analysis method (HAM). Convergence of the series is explicitly discussed. Results show that the flow and the skin friction coefficient depend heavily on the velocity slip factor. In addition, the effects of all the parameters mentioned above were more pronounced for plane flows than for axisymmetric flows.Keywords: slip flow, axisymmetric flow, homotopy analysismethod, stagnation-point.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 17021949 CMOS Solid-State Nanopore DNA System-Level Sequencing Techniques Enhancement
Authors: Syed Islam, Yiyun Huang, Sebastian Magierowski, Ebrahim Ghafar-Zadeh
Abstract:
This paper presents system level CMOS solid-state nanopore techniques enhancement for speedup next generation molecular recording and high throughput channels. This discussion also considers optimum number of base-pair (bp) measurements through channel as an important role to enhance potential read accuracy. Effective power consumption estimation offered suitable range of multi-channel configuration. Nanopore bp extraction model in statistical method could contribute higher read accuracy with longer read-length (200 < read-length). Nanopore ionic current switching with Time Multiplexing (TM) based multichannel readout system contributed hardware savings.
Keywords: DNA, Nanopore, Amplifier, ADC, Multichannel.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 29321948 Natural Convection Boundary Layer Flow of a Viscoelastic Fluid on Solid Sphere with Newtonian Heating
Authors: A.R.M. Kasim, N.F. Mohammad, Aurangzaib, S. Sharidan
Abstract:
The present paper considers the steady free convection boundary layer flow of a viscoelastic fluid on solid sphere with Newtonian heating. The boundary layer equations are an order higher than those for the Newtonian (viscous) fluid and the adherence boundary conditions are insufficient to determine the solution of these equations completely. Thus, the augmentation an extra boundary condition is needed to perform the numerical computational. The governing boundary layer equations are first transformed into non-dimensional form by using special dimensionless group and then solved by using an implicit finite difference scheme. The results are displayed graphically to illustrate the influence of viscoelastic K and Prandtl Number Pr parameters on skin friction, heat transfer, velocity profiles and temperature profiles. Present results are compared with the published papers and are found to concur very well.Keywords: boundary layer flow, Newtonian heating, sphere, viscoelastic fluid.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 24081947 0.13-µm Complementary Metal-Oxide Semiconductor Vector Modulator for Beamforming System
Authors: J. S. Kim
Abstract:
This paper presents a 0.13-µm Complementary Metal-Oxide Semiconductor (CMOS) vector modulator for beamforming system. The vector modulator features a 360° phase and gain range of -10 dB to 10 dB with a root mean square phase and amplitude error of only 2.2° and 0.45 dB, respectively. These features make it a suitable for wireless backhaul system in the 5 GHz industrial, scientific, and medical (ISM) bands. It draws a current of 20.4 mA from a 1.2 V supply. The total chip size is 1.87x1.34 mm².
Keywords: CMOS, vector modulator, beamforming, wireless backhaul, ISM.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 10581946 Impact of Terrorism as an Asymmetrical Threat on the State's Conventional Security Forces
Authors: Igor Pejic
Abstract:
The main focus of this research will be on analyzing correlative links between terrorism as an asymmetrical threat and the consequences it leaves on conventional security forces. The methodology behind the research will include qualitative research methods focusing on comparative analysis of books, scientific papers, documents and other sources, in order to deduce, explore and formulate the results of the research. With the coming of the 21st century and the rising multi-polar, new world threats quickly emerged. The realistic approach in international relations deems that relations among nations are in a constant state of anarchy since there are no definitive rules and the distribution of power varies widely. International relations are further characterized by egoistic and self-orientated human nature, anarchy or absence of a higher government, security and lack of morality. The asymmetry of power is also reflected on countries' security capabilities and its abilities to project power. With the coming of the new millennia and the rising multi-polar world order, the asymmetry of power can be also added as an important trait of the global society which consequently brought new threats. Among various others, terrorism is probably the most well-known, well-based and well-spread asymmetric threat. In today's global political arena, terrorism is used by state and non-state actors to fulfill their political agendas. Terrorism is used as an all-inclusive tool for regime change, subversion or a revolution. Although the nature of terrorist groups is somewhat inconsistent, terrorism as a security and social phenomenon has a one constant which is reflected in its political dimension. The state's security apparatus, which was embodied in the form of conventional armed forces, is now becoming fragile, unable to tackle new threats and to a certain extent outdated. Conventional security forces were designed to defend or engage an exterior threat which is more or less symmetric and visible. On the other hand, terrorism as an asymmetrical threat is a part of hybrid, special or asymmetric warfare in which specialized units, institutions or facilities represent the primary pillars of security. In today's global society, terrorism is probably the most acute problem which can paralyze entire countries and their political systems. This problem, however, cannot be engaged on an open field of battle, but rather it requires a different approach in which conventional armed forces cannot be used traditionally and their role must be adjusted. The research will try to shed light on the phenomena of modern day terrorism and to prove its correlation with the state conventional armed forces. States are obliged to adjust their security apparatus to the new realism of global society and terrorism as an asymmetrical threat which is a side-product of the unbalanced world.
Keywords: Asymmetrical warfare, conventional forces, security, terrorism.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 12761945 Testing of Materials for Rapid Prototyping Fused Deposition Modelling Technology
Authors: L. Novakova-Marcincinova, J. Novak-Marcincin
Abstract:
Paper presents knowledge about types of test in area of materials properties of selected methods of rapid prototyping technologies. In today used rapid prototyping technologies for production of models and final parts are used materials in initial state as solid, liquid or powder material structure. In solid state are used various forms such as pellets, wire or laminates. Basic range materials include paper, nylon, wax, resins, metals and ceramics. In Fused Deposition Modeling (FDM) rapid prototyping technology are mainly used as basic materials ABS (Acrylonitrile Butadiene Styrene), polyamide, polycarbonate, polyethylene and polypropylene. For advanced FDM applications are used special materials as silicon nitrate, PZT (Piezoceramic Material - Lead Zirconate Titanate), aluminium oxide, hydroxypatite and stainless steel.Keywords: Rapid prototyping, materials, testing of materials.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 44351944 Analytical and Statistical Study of the Parameters of Expansive Soil
Authors: A. Medjnoun, R. Bahar
Abstract:
The disorders caused by the shrinking-swelling phenomenon are prevalent in arid and semi-arid in the presence of swelling clay. This soil has the characteristic of changing state under the effect of water solicitation (wetting and drying). A set of geotechnical parameters is necessary for the characterization of this soil type, such as state parameters, physical and chemical parameters and mechanical parameters. Some of these tests are very long and some are very expensive, hence the use or methods of predictions. The complexity of this phenomenon and the difficulty of its characterization have prompted researchers to use several identification parameters in the prediction of swelling potential. This document is an analytical and statistical study of geotechnical parameters affecting the potential of swelling clays. This work is performing on a database obtained from investigations swelling Algerian soil. The obtained observations have helped us to understand the soil swelling structure and its behavior.
Keywords: Analysis, estimated model, parameter identification, Swelling of clay.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 12891943 Shell Closures in Exotic Nuclei
Authors: G. Saxena, D. Singh, M. Kaushik,
Abstract:
Inspired by the recent experiments [1]-[3] indicating unusual doubly magic nucleus 24O which lies just at the neutron drip-line and encouraged by the success of our relativistic mean-field (RMF) plus state dependent BCS approach for the description of the ground state properties of the drip-line nuclei [23]-[27], we have further employed this approach, across the entire periodic table, to explore the unusual shell closures in exotic nuclei. In our RMF+BCS approach the single particle continuum corresponding to the RMF is replaced by a set of discrete positive energy states for the calculations of pairing energy. Detailed analysis of the single particle spectrum, pairing energies and densities of the nuclei predict the unusual proton shell closures at Z = 6, 14, 16, 34, and unusual neutron shell closures at N = 6, 14, 16, 34, 40, 70, 112.Keywords: Relativistic Mean Field theory, Magic Nucleus, Si isotopes, Shell Closure.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 15031942 rRNA Maturation Genes (KRR1 and PWP2) in Saccharomyces cerevisiae Inhibited by Silver Nanoparticles
Authors: Anjali Haloi, Debabrata Das
Abstract:
Silver nanoparticles inhibit a wide variety of microorganisms. The mechanism of inhibition is not entirely known although it is recognized to be concentration dependent and associated with the disruption of membrane permeability. Data on differential gene expression as a response to nanoparticles could provide insights into the mechanism of this inhibitory effect. Silver nanoparticles were synthesized in yeast growth media using a modification of the Creighton method and characterized with UV-Vis spectrophotometry, transmission electron microscopy (TEM), and X-ray diffraction (XRD). In yeasts grown in the presence of silver nanoparticles, we observed that at concentrations below the minimum inhibitory concentration (MIC) of 48.51 µg/ml, the total RNA content was steady while the cellular protein content declined rapidly. The analysis of the expression levels of KRR1 and PWP2, two important genes involved in rRNA maturation in yeasts, showed up to 258 and 42-fold decreases, respectively, compared to that of control samples. Whether silver nanoparticles have an adverse effect on ribosome assembly and function could be an area of further investigation.
Keywords: Ag NP, yeast, qRT-PCR, KRR1, PWP2.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3871941 New VLSI Architecture for Motion Estimation Algorithm
Authors: V. S. K. Reddy, S. Sengupta, Y. M. Latha
Abstract:
This paper presents an efficient VLSI architecture design to achieve real time video processing using Full-Search Block Matching (FSBM) algorithm. The design employs parallel bank architecture with minimum latency, maximum throughput, and full hardware utilization. We use nine parallel processors in our architecture and each controlled by a state machine. State machine control implementation makes the design very simple and cost effective. The design is implemented using VHDL and the programming techniques we incorporated makes the design completely programmable in the sense that the search ranges and the block sizes can be varied to suit any given requirements. The design can operate at frequencies up to 36 MHz and it can function in QCIF and CIF video resolution at 1.46 MHz and 5.86 MHz, respectively.Keywords: Video Coding, Motion Estimation, Full-Search, Block-Matching, VLSI Architecture.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 18071940 Effects of Slip Condition and Peripheral Layer on Couple Stress Fluid Flow through a Channel with Mild Stenosis
Authors: Gurju Awgichew, G. Radhakrishnamacharya
Abstract:
Steady incompressible couple stress fluid flow through two dimensional symmetric channel with stenosis is investigated. The flow consisting of a core region to be a couple stress fluid and a peripheral layer of plasma (Newtonian fluid). Assuming the stenosis to be mild, the equations governing the flow of the proposed model are solved using the slip boundary condition and closed form expressions for the flow characteristics (the dimensionless resistance to flow and wall shear stress at the maximum height of stenosis) are derived. The effects of various parameters on these flow variables have been studied. It is observed that the resistance to flow as well as the wall shear stress increase with the height of stenosis, viscosity ratio and Darcy number. However, the trend is reversed as the slip and the couple stress parameter increase.
Keywords: Stenosis, Couple stress fluid, Slip condition, Peripheral layer.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 23491939 Revolving Ferrofluid Flow in Porous Medium with Rotating Disk
Authors: Paras Ram, Vikas Kumar
Abstract:
An attempt has been made to study the effect of rotation on incompressible, electrically non-conducting ferrofluid in porous medium on Axi-symmetric steady flow over a rotating disk excluding thermal effects. Here, we solved the boundary layer equations with boundary conditions using Neuringer-Rosensweig model considering the z-axis as the axis of rotation. The non linear boundary layer equations involved in the problem are transformed to the non linear coupled ordinary differential equations by Karman's transformation and solved by power series approximations. Besides numerically calculating the velocity components and pressure for different values of porosity parameter with the variation of Karman's parameter we have also calculated the displacement thickness of boundary layer, the total volume flowing outward the z-axis and angle between wall and ferrofluid. The results for all above variables are obtained numerically and discussed graphically.
Keywords: Ferrofluid, magnetic field porous medium, rotating disk.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 21351938 A Modular On-line Profit Sharing Approach in Multiagent Domains
Authors: Pucheng Zhou, Bingrong Hong
Abstract:
How to coordinate the behaviors of the agents through learning is a challenging problem within multi-agent domains. Because of its complexity, recent work has focused on how coordinated strategies can be learned. Here we are interested in using reinforcement learning techniques to learn the coordinated actions of a group of agents, without requiring explicit communication among them. However, traditional reinforcement learning methods are based on the assumption that the environment can be modeled as Markov Decision Process, which usually cannot be satisfied when multiple agents coexist in the same environment. Moreover, to effectively coordinate each agent-s behavior so as to achieve the goal, it-s necessary to augment the state of each agent with the information about other existing agents. Whereas, as the number of agents in a multiagent environment increases, the state space of each agent grows exponentially, which will cause the combinational explosion problem. Profit sharing is one of the reinforcement learning methods that allow agents to learn effective behaviors from their experiences even within non-Markovian environments. In this paper, to remedy the drawback of the original profit sharing approach that needs much memory to store each state-action pair during the learning process, we firstly address a kind of on-line rational profit sharing algorithm. Then, we integrate the advantages of modular learning architecture with on-line rational profit sharing algorithm, and propose a new modular reinforcement learning model. The effectiveness of the technique is demonstrated using the pursuit problem.Keywords: Multi-agent learning; reinforcement learning; rationalprofit sharing; modular architecture.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 14461937 Quadrature Formula for Sampled Functions
Authors: Khalid Minaoui, Thierry Chonavel, Benayad Nsiri, Driss Aboutajdine
Abstract:
This paper deals with efficient quadrature formulas involving functions that are observed only at fixed sampling points. The approach that we develop is derived from efficient continuous quadrature formulas, such as Gauss-Legendre or Clenshaw-Curtis quadrature. We select nodes at sampling positions that are as close as possible to those of the associated classical quadrature and we update quadrature weights accordingly. We supply the theoretical quadrature error formula for this new approach. We show on examples the potential gain of this approach.
Keywords: Gauss-Legendre, Clenshaw-Curtis, quadrature, Peano kernel, irregular sampling.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 14171936 Dempster-Shafer Information Filtering in Multi-Modality Wireless Sensor Networks
Authors: D.M. Weeraddana, K.S. Walgama, E.C. Kulasekere
Abstract:
A framework to estimate the state of dynamically varying environment where data are generated from heterogeneous sources possessing partial knowledge about the environment is presented. This is entirely derived within Dempster-Shafer and Evidence Filtering frameworks. The belief about the current state is expressed as belief and plausibility functions. An addition to Single Input Single Output Evidence Filter, Multiple Input Single Output Evidence Filtering approach is introduced. Variety of applications such as situational estimation of an emergency environment can be developed within the framework successfully. Fire propagation scenario is used to justify the proposed framework, simulation results are presented.
Keywords: Dempster-Shafer Belief theory, Evidence Filtering, Evidence Fusion, Sensor Modalities, Wireless Sensor Networks
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 22361935 Method to Improve Channel Coding Using Cryptography
Authors: Ayyaz Mahmood
Abstract:
A new approach for the improvement of coding gain in channel coding using Advanced Encryption Standard (AES) and Maximum A Posteriori (MAP) algorithm is proposed. This new approach uses the avalanche effect of block cipher algorithm AES and soft output values of MAP decoding algorithm. The performance of proposed approach is evaluated in the presence of Additive White Gaussian Noise (AWGN). For the verification of proposed approach, computer simulation results are included.Keywords: Advanced Encryption Standard (AES), Avalanche Effect, Maximum A Posteriori (MAP), Soft Input Decryption (SID).
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 19471934 The National Security Assurance of the Republic of Kazakhstan
Authors: Sholpan Zhandossova, Erden Ordabek, Yelbolsyn Nazarov
Abstract:
the article analyzes the national security as a scientific and practical problem, characterized by the state's political institutions to ensure effective action to maintain optimal conditions for the existence and development of the individual and society. National security, as a category of political science reflects the relationship between the security to the nation, including public relations and social consciousness, social institutions and their activities, ensuring the realization of national interests in a particular historical situation. In national security are three security levels: individual, society and state. Their role and place determined by the nature of social relations, political systems, the presence of internal and external threats. In terms of content in the concept of national security is taken to provide political, economic, military, environmental, information security and safety of the cultural development of the nation.
Keywords: Kazakhstan, national security, religious extremism
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 19551933 Frontal EEG Asymmetry Based Classification of Emotional Valence using Common Spatial Patterns
Authors: Irene Winkler, Mark Jager, Vojkan Mihajlovic, Tsvetomira Tsoneva
Abstract:
In this work we evaluate the possibility of predicting the emotional state of a person based on the EEG. We investigate the problem of classifying valence from EEG signals during the presentation of affective pictures, utilizing the "frontal EEG asymmetry" phenomenon. To distinguish positive and negative emotions, we applied the Common Spatial Patterns algorithm. In contrast to our expectations, the affective pictures did not reliably elicit changes in frontal asymmetry. The classifying task thereby becomes very hard as reflected by the poor classifier performance. We suspect that the masking of the source of the brain activity related to emotions, coming mostly from deeper structures in the brain, and the insufficient emotional engagement are among main reasons why it is difficult to predict the emotional state of a person.Keywords: Emotion, Valence, EEG, Common Spatial Patterns(CSP).
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 26111932 Measurement Scheme Improving for State Estimation Using Stochastic Tabu Search
Authors: T. Kerdchuen
Abstract:
This paper proposes the stochastic tabu search (STS) for improving the measurement scheme for power system state estimation. If the original measured scheme is not observable, the additional measurements with minimum number of measurements are added into the system by STS so that there is no critical measurement pair. The random bit flipping and bit exchanging perturbations are used for generating the neighborhood solutions in STS. The Pδ observable concept is used to determine the network observability. Test results of 10 bus, IEEE 14 and 30 bus systems are shown that STS can improve the original measured scheme to be observable without critical measurement pair. Moreover, the results of STS are superior to deterministic tabu search (DTS) in terms of the best solution hit.Keywords: Measurement Scheme, Power System StateEstimation, Network Observability, Stochastic Tabu Search (STS).
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 12751931 Relevance for Traditional Medicine in South Africa: Experiences of Urban Traditional Healers, Izinyanga
Authors: Ntokozo Mthembu
Abstract:
Access to relevant health indicates people’s likelihood of survival, including craft of indigenous healing and its related practitioners- izinyanga. However, the emergence of a dreaded novel corona virus - COVID-19 that has engulfed almost the whole world has necessitated the need to revisit the state of traditional healers in South Africa. This circumstance tended to expose the reality of social settings in various social structures and related policies including the manner coloniality reveal its ugly head when it comes treatment between western and African based therapeutic practices in this country. In attempting to gain a better understanding of such experiences, primary and secondary sources were consulted when collecting data that perusal of various literature in this instance including face-to-face interviews with traditional healers working on the street of Tshwane Municipality in South Africa. Preliminary findings revealed that the emergence of this deadly virus coincided with the moment when the government agenda was focussed on fulfilment of its promise of addressing the past inequity practices, including the transformation of medical sector. This scenario can be witnessed by the manner in which government and related agencies such as health department keeps on undermining indigenous healing practice irrespective of its historical record in terms of healing profession and fighting various diseases before times of father of medicine, Imhotep. Based on these preliminary findings, it is recommended that the government should hasten the incorporation of African knowledge systems especially medicine to offer alternatives and diverse to assess the underutilised indigenous African therapeutic approach and relevant skills that could be useful in combating ailments such as COVID 19. Perhaps, the plural medical systems should be recognized and related policies are formulated to guarantee mutual respect among citizens and the incorporation of healing practices in South African health sector, Africa and in the broader global community.Keywords: Indigenous healing practice, inyanga, COVID-19, therapeutic, urban, experience.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 4391930 Enhanced-Delivery Overlay Multicasting Scheme by Optimizing Bandwidth and Latency Discrepancy Ratios
Authors: Omar F. Hamad, T. Marwala
Abstract:
With optimized bandwidth and latency discrepancy ratios, Node Gain Scores (NGSs) are determined and used as a basis for shaping the max-heap overlay. The NGSs - determined as the respective bandwidth-latency-products - govern the construction of max-heap-form overlays. Each NGS is earned as a synergy of discrepancy ratio of the bandwidth requested with respect to the estimated available bandwidth, and latency discrepancy ratio between the nodes and the source node. The tree leads to enhanceddelivery overlay multicasting – increasing packet delivery which could, otherwise, be hindered by induced packet loss occurring in other schemes not considering the synergy of these parameters on placing the nodes on the overlays. The NGS is a function of four main parameters – estimated available bandwidth, Ba; individual node's requested bandwidth, Br; proposed node latency to its prospective parent (Lp); and suggested best latency as advised by source node (Lb). Bandwidth discrepancy ratio (BDR) and latency discrepancy ratio (LDR) carry weights of α and (1,000 - α ) , respectively, with arbitrary chosen α ranging between 0 and 1,000 to ensure that the NGS values, used as node IDs, maintain a good possibility of uniqueness and balance between the most critical factor between the BDR and the LDR. A max-heap-form tree is constructed with assumption that all nodes possess NGS less than the source node. To maintain a sense of load balance, children of each level's siblings are evenly distributed such that a node can not accept a second child, and so on, until all its siblings able to do so, have already acquired the same number of children. That is so logically done from left to right in a conceptual overlay tree. The records of the pair-wise approximate available bandwidths as measured by a pathChirp scheme at individual nodes are maintained. Evaluation measures as compared to other schemes – Bandwidth Aware multicaSt architecturE (BASE), Tree Building Control Protocol (TBCP), and Host Multicast Tree Protocol (HMTP) - have been conducted. This new scheme generally performs better in terms of trade-off between packet delivery ratio; link stress; control overhead; and end-to-end delays.
Keywords: Overlay multicast, Available bandwidth, Max-heapform overlay, Induced packet loss, Bandwidth-latency product, Node Gain Score (NGS).
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 15711929 Convective Heat Transfer of Viscoelastic Flow in a Curved Duct
Authors: M. Norouzi, M. H. Kayhani, M. R. H. Nobari, M. Karimi Demneh
Abstract:
In this paper, fully developed flow and heat transfer of viscoelastic materials in curved ducts with square cross section under constant heat flux have been investigated. Here, staggered mesh is used as computational grids and flow and heat transfer parameters have been allocated in this mesh with marker and cell method. Numerical solution of governing equations has being performed with FTCS finite difference method. Furthermore, Criminale-Eriksen- Filbey (CEF) constitutive equation has being used as viscoelastic model. CEF constitutive equation is a suitable model for studying steady shear flow of viscoelastic materials which is able to model both effects of the first and second normal stress differences. Here, it is shown that the first and second normal stresses differences have noticeable and inverse effect on secondary flows intensity and mean Nusselt number which is the main novelty of current research.Keywords: Viscoelastic, fluid flow, heat convection, CEF model, curved duct, square cross section.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 21551928 Pay Differentials and Employee Retention in the State Colleges of Education in the South-South Zone, Nigeria
Authors: Emmanuel U. Ingwu
Abstract:
The study examined the influence of pay differentials on employee retention in the State Colleges of Education in the South-South Region of Nigeria. 275 subjects drawn from members of the wage negotiating teams in the Colleges were administered questionnaires constructed for study. Analysis of Variance revealed that the observed pay differentials significantly influenced retainership, f(5,269 = 6.223, P< 0.05). However, the Multiple Classification Analysis and Post-Hoc test indicated that employees in two of the Colleges with slightly lower and higher pay levels may probably remain with their employers while employees in other Colleges with the least and highest pay levels suggested quitting. Based on these observations, the influence of pay on employee retention seems inconclusive. Generally, employees in the colleges studied are dissatisfied with current pay levels. Management should confront these challenges by improving pay packages to encourage employees to remain and be dedicated to duty.
Keywords: Employee, Influence, Pay differentials, Retention.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 23491927 How the Decrease of Collagen or Mineral Affect the Fracture in the Turkey Long Bones
Authors: P. Vosynek, T. Návrat, M. Peč, J. Pořízka, P. Diviš
Abstract:
Bone properties and response behavior after static or dynamic activation (loading) are still interesting topics in many fields of the science especially in the biomechanical problems such as bone loss of astronauts in space, osteoporosis, bone remodeling after fracture or remodeling after surgery (endoprosthesis and implants) and in osteointegration. This contribution deals with the relation between physiological, demineralized and deproteinized state of the turkey long bone – tibia. Three methods for comparison were used: 1) densitometry, 2) three point bending and 3) frequency analysis. The main goal of this work was to describe the decrease of the protein (collagen) or mineral of the bone with relation to the fracture in three point bending. The comparison is linked to the problem of different bone mechanical behavior in physiological and osteoporotic state.
Keywords: Bone properties, long bone, osteoporosis, response behavior.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 22761926 Hand Gestures Based Emotion Identification Using Flex Sensors
Authors: S. Ali, R. Yunus, A. Arif, Y. Ayaz, M. Baber Sial, R. Asif, N. Naseer, M. Jawad Khan
Abstract:
In this study, we have proposed a gesture to emotion recognition method using flex sensors mounted on metacarpophalangeal joints. The flex sensors are fixed in a wearable glove. The data from the glove are sent to PC using Wi-Fi. Four gestures: finger pointing, thumbs up, fist open and fist close are performed by five subjects. Each gesture is categorized into sad, happy, and excited class based on the velocity and acceleration of the hand gesture. Seventeen inspectors observed the emotions and hand gestures of the five subjects. The emotional state based on the investigators assessment and acquired movement speed data is compared. Overall, we achieved 77% accurate results. Therefore, the proposed design can be used for emotional state detection applications.
Keywords: Emotion identification, emotion models, gesture recognition, user perception.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 9401925 Calibration of Time-Skew Error in a M-Channel Time-Interleaved Analog-to-Digital Converter
Authors: Yu-Sheng Lee, Qi An
Abstract:
Offset mismatch, gain mismatch, and time-skew error between time-interleaved channels limit the performance of time-interleaved analog-to-digital converters (TIADC). This paper focused on the time-skew error. A new technique for calibrating time-skew error in M-channels TIADC is described, and simulation results are also presented.
Keywords: Calibration, time-skew error, time-interleavedanalog-to-digital converters.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 15821924 Mathematical Modeling for Dengue Transmission with the Effect of Season
Authors: R. Kongnuy., P. Pongsumpun
Abstract:
Mathematical models can be used to describe the transmission of disease. Dengue disease is the most significant mosquito-borne viral disease of human. It now a leading cause of childhood deaths and hospitalizations in many countries. Variations in environmental conditions, especially seasonal climatic parameters, effect to the transmission of dengue viruses the dengue viruses and their principal mosquito vector, Aedes aegypti. A transmission model for dengue disease is discussed in this paper. We assume that the human and vector populations are constant. We showed that the local stability is completely determined by the threshold parameter, 0 B . If 0 B is less than one, the disease free equilibrium state is stable. If 0 B is more than one, a unique endemic equilibrium state exists and is stable. The numerical results are shown for the different values of the transmission probability from vector to human populations.Keywords: Dengue disease, mathematical model, season, threshold parameters.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 22131923 Context Aware Navigation System for Using Public Transport on Smartphone
Authors: Satoru Fukuta, Masaki Ito, Takao Kawamura, Kazunori Sugahara
Abstract:
Recently, many web services to provide information for public transport are developed and released. They are optimized for mobile devices such a smartphone. We are also developing better path planning system for route buses and trains called “Bus-Net"[1]. However these systems only provide paths and related information before the user start moving. So we propose a context aware navigation to change the way to support public transport users. If we go to somewhere using many kinds of public transport, we have to know how to use them. In addition, public transport is dynamic system, and these have different characteristic by type. So we need information at real-time. Therefore we suggest the system that can support on user-s state. It has a variety of ways to help public transport users by each state, like turn-by-turn navigation. Context aware navigation will be able to reduce anxiety for using public transport.
Keywords: Navigation, Public Transport, Smartphone, User Experience.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 18251922 Analysis of EEG Signals Using Wavelet Entropy and Approximate Entropy: A Case Study on Depression Patients
Authors: Subha D. Puthankattil, Paul K. Joseph
Abstract:
Analyzing brain signals of the patients suffering from the state of depression may lead to interesting observations in the signal parameters that is quite different from a normal control. The present study adopts two different methods: Time frequency domain and nonlinear method for the analysis of EEG signals acquired from depression patients and age and sex matched normal controls. The time frequency domain analysis is realized using wavelet entropy and approximate entropy is employed for the nonlinear method of analysis. The ability of the signal processing technique and the nonlinear method in differentiating the physiological aspects of the brain state are revealed using Wavelet entropy and Approximate entropy.
Keywords: EEG, Depression, Wavelet entropy, Approximate entropy, Relative Wavelet energy, Multiresolution decomposition.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3640