Search results for: modified Boussinesq equation.
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2001

Search results for: modified Boussinesq equation.

771 Dissolution of Solid Particles in Liquids: A Shrinking Core Model

Authors: Wei-Lun Hsu, Mon-Jyh Lin, Jyh-Ping Hsu

Abstract:

The dissolution of spherical particles in liquids is analyzed dynamically. Here, we consider the case the dissolution of solute yields a solute-free solid phase in the outer portion of a particle. As dissolution proceeds, the interface between the undissolved solid phase and the solute-free solid phase moves towards the center of the particle. We assume that there exist two resistances for the diffusion of solute molecules: the resistance due to the solute-free portion of the particle and that due to a surface layer near solid-liquid interface. In general, the equation governing the dynamic behavior of dissolution needs to be solved numerically. However, analytical expressions for the temporal variation of the size of the undissoved portion of a particle and the variation of dissolution time can be obtained in some special cases. The present analysis takes the effect of variable bulk solute concentration on dissolution into account.

Keywords: dissolution of particles, surface layer, shrinking core model, dissolution time.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 4169
770 Random Oracle Model of Information Hiding System

Authors: Nan Jiang, Jian Wang

Abstract:

Random Oracle Model (ROM) is an effective method for measuring the practical security of cryptograph. In this paper, we try to use it into information hiding system (IHS). Because IHS has its own properties, the ROM must be modified if it is used into IHS. Firstly, we fully discuss why and how to modify each part of ROM respectively. The main changes include: 1) Divide the attacks that IHS may be suffered into two phases and divide the attacks of each phase into several kinds. 2) Distinguish Oracles and Black-boxes clearly. 3) Define Oracle and four Black-boxes that IHS used. 4) Propose the formalized adversary model. And 5) Give the definition of judge. Secondly, based on ROM of IHS, the security against known original cover attack (KOCA-KOCA-security) is defined. Then, we give an actual information hiding scheme and prove that it is KOCA-KOCA-secure. Finally, we conclude the paper and propose the open problems of further research.

Keywords: Attack, Information Hiding, Provable Security, Random Oracle Model.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1341
769 Oncogene Identification using Filter based Approaches between Various Cancer Types in Lung

Authors: Michael Netzer, Michael Seger, Mahesh Visvanathan, Bernhard Pfeifer, Gerald H. Lushington, Christian Baumgartner

Abstract:

Lung cancer accounts for the most cancer related deaths for men as well as for women. The identification of cancer associated genes and the related pathways are essential to provide an important possibility in the prevention of many types of cancer. In this work two filter approaches, namely the information gain and the biomarker identifier (BMI) are used for the identification of different types of small-cell and non-small-cell lung cancer. A new method to determine the BMI thresholds is proposed to prioritize genes (i.e., primary, secondary and tertiary) using a k-means clustering approach. Sets of key genes were identified that can be found in several pathways. It turned out that the modified BMI is well suited for microarray data and therefore BMI is proposed as a powerful tool for the search for new and so far undiscovered genes related to cancer.

Keywords: lung cancer, micro arrays, data mining, feature selection.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1747
768 A New Method for Estimating the Mass Recession Rate for Ablator Systems

Authors: Bianca A. Szasz, Keiichi Okuyama

Abstract:

As the human race will continue to explore the space by creating new space transportation means and sending them to other planets, the enhance of atmospheric reentry study is crucial. In this context, an analysis of mass recession rate of ablative materials for thermal shields of reentry spacecrafts is important to be carried out. The paper describes a new estimation method for calculating the mass recession of an ablator system made of carbon fiber reinforced plastic materials. This method is based on Arrhenius equation for low temperatures and, for high temperatures, on a theory applied for the recession phenomenon of carbon fiber reinforced plastic materials, theory which takes into account the presence of the resin inside the materials. The space mission of USERS spacecraft is considered as a case study.

Keywords: Ablator system, mass recession, spacecraft, atmospheric reentry.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2104
767 Force Analysis of an Automated Rapid Maxillary Expansion (ARME) Appliance

Authors: A.A.Sharizli, N.A.Abu Osman, A.A.Saifizul

Abstract:

An Automated Rapid Maxillary Expander (ARME) is a specially designed microcontroller-based orthodontic appliance to overcome the shortcomings imposed by the traditional maxillary expansion appliances. This new device is operates by automatically widening the maxilla (upper jaw) by expanding the midpalatal suture [1]. The ARME appliance that has been developed is a combination of modified butterfly expander appliance, micro gear, micro motor, and microcontroller to automatically produce light and continuous pressure to expand the maxilla. For this study, the functionality of the system is verified through laboratory tests by measure the forced applied to the teeth each time the maxilla expands. The laboratory test results show that the developed appliance meets the desired performance specifications consistently.

Keywords: Maxillary Expansion, Microcontroller, Automated, Orthodontist, Force Analysis.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1784
766 A Numerical Solution Based On Operational Matrix of Differentiation of Shifted Second Kind Chebyshev Wavelets for a Stefan Problem

Authors: Rajeev, N. K. Raigar

Abstract:

In this study, one dimensional phase change problem (a Stefan problem) is considered and a numerical solution of this problem is discussed. First, we use similarity transformation to convert the governing equations into ordinary differential equations with its boundary conditions. The solutions of ordinary differential equation with the associated boundary conditions and interface condition (Stefan condition) are obtained by using a numerical approach based on operational matrix of differentiation of shifted second kind Chebyshev wavelets. The obtained results are compared with existing exact solution which is sufficiently accurate.

Keywords: Operational matrix of differentiation, Similarity transformation, Shifted second kind Chebyshev wavelets, Stefan problem.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1997
765 Parallel Text Processing: Alignment of Indonesian to Javanese Language

Authors: Aji P. Wibawa, Andrew Nafalski, Neil Murray, Wayan F. Mahmudy

Abstract:

Parallel text alignment is proposed as a way of aligning bahasa Indonesia to words in Javanese. Since the one-to-one word translator does not have the facility to translate pragmatic aspects of Javanese, the parallel text alignment model described uses a phrase pair combination. The algorithm aligns the parallel text automatically from the beginning to the end of each sentence. Even though the results of the phrase pair combination outperform the previous algorithm, it is still inefficient. Recording all possible combinations consume more space in the database and time consuming. The original algorithm is modified by applying the edit distance coefficient to improve the data-storage efficiency. As a result, the data-storage consumption is 90% reduced as well as its learning period (42s).

Keywords: Parallel text alignment, phrase pair combination, edit distance coefficient, Javanese-Indonesian language.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2477
764 Identification of LTI Autonomous All Pole System Using Eigenvector Algorithm

Authors: Sudipta Majumdar

Abstract:

This paper presents a method for identification of a linear time invariant (LTI) autonomous all pole system using singular value decomposition. The novelty of this paper is two fold: First, MUSIC algorithm for estimating complex frequencies from real measurements is proposed. Secondly, using the proposed algorithm, we can identify the coefficients of differential equation that determines the LTI system by switching off our input signal. For this purpose, we need only to switch off the input, apply our complex MUSIC algorithm and determine the coefficients as symmetric polynomials in the complex frequencies. This method can be applied to unstable system and has higher resolution as compared to time series solution when, noisy data are used. The classical performance bound, Cramer Rao bound (CRB), has been used as a basis for performance comparison of the proposed method for multiple poles estimation in noisy exponential signal.

Keywords: MUSIC algorithm, Cramer Rao bound, frequency estimation.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 930
763 Modeling Exponential Growth Activity Using Technology: A Research with Bachelor of Business Administration Students

Authors: V. Vargas-Alejo, L. E. Montero-Moguel

Abstract:

Understanding the concept of function has been important in mathematics education for many years. In this study, the models built by a group of five business administration and accounting undergraduate students when carrying out a population growth activity are analyzed. The theoretical framework is the Models and Modeling Perspective. The results show how the students included tables, graphics, and algebraic representations in their models. Using technology was useful to interpret, describe, and predict the situation. The first model, the students built to describe the situation, was linear. After that, they modified and refined their ways of thinking; finally, they created exponential growth. Modeling the activity was useful to deep on mathematical concepts such as covariation, rate of change, and exponential function also to differentiate between linear and exponential growth.

Keywords: Covariation reasoning, exponential function, modeling, representations.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 492
762 Link Availability Estimation for Modified AOMDV Protocol

Authors: R. Prabha, N. Ramaraj

Abstract:

Routing in adhoc networks is a challenge as nodes are mobile, and links are constantly created and broken. Present ondemand adhoc routing algorithms initiate route discovery after a path breaks, incurring significant cost to detect disconnection and establish a new route. Specifically, when a path is about to be broken, the source is warned of the likelihood of a disconnection. The source then initiates path discovery early, avoiding disconnection totally. A path is considered about to break when link availability decreases. This study modifies Adhoc On-demand Multipath Distance Vector routing (AOMDV) so that route handoff occurs through link availability estimation.

Keywords: Mobile Adhoc Network (MANET), Routing, Adhoc On-demand Multipath Distance Vector routing (AOMDV), Link Availability.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1615
761 Information Technology and Business Alignments among Different Divisions: A Comparative Analysis of Japan and South Korea

Authors: Michiko Miyamoto

Abstract:

This paper empirically investigates whether information technology (IT) strategies, business strategies, and divisions are aligned to meet overall business goals for Korean Small and medium-sized enterprises (SMEs), based on structure based Strategic Alignment Model, and make comparison with those of Japanese SMEs. Using 2,869 valid responses of Korean Human Capital Corporate Panel survey, a result of this study suggests that Korean human resources (HR) departments have a major influence over IT strategy, which is the same as Japanese SMEs, even though their management styles are quite different. As for IT strategy, it is not related to other departments at all for Korean SMEs. The Korean management seems to possess a great power over each division, such as Sales/Service, Research and Development/Technical Experts, HR, and Production.

Keywords: IT-business alignment, structured based strategic alignment model, structural equation model, human resources department.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1090
760 Polyacrylate Modified Copper Nanoparticles with Controlled Size

Authors: Robert Prucek, Aleš Panáček, Jan Filip, Libor Kvítek, Radek Zbořil

Abstract:

The preparation of Cu nanoparticles (NPs) through the reduction of copper ions by sodium borohydride in the presence of sodium polyacrylate with a molecular weight of 1200 is reported. Cu NPs were synthesized at a concentration of copper salt equal to 2.5, 5, and 10 mM, and at a molar ratio of copper ions and monomeric unit of polyacrylate equal to 1:2. The as-prepared Cu NPs have diameters of about 2.5–3 nm for copper concentrations of 2.5 and 5 mM, and 6 nm for copper concentration of 10 mM. Depending on the copper salt concentration and concentration of additionally added polyacrylate to Cu particle dispersion, primarily formed NPs grow through the process of aggregation and/or coalescence into clusters and/or particles with a diameter between 20–100 nm. The amount of additionally added sodium polyacrylate influences the stability of Cu particles against air oxidation. The catalytic efficiency of the prepared Cu particles for the reduction of 4-nitrophenol is discussed.

Keywords: Copper, nanoparticles, sodium polyacrylate, catalyst, 4-nitrophenol.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3443
759 The Application of an Ensemble of Boosted Elman Networks to Time Series Prediction: A Benchmark Study

Authors: Chee Peng Lim, Wei Yee Goh

Abstract:

In this paper, the application of multiple Elman neural networks to time series data regression problems is studied. An ensemble of Elman networks is formed by boosting to enhance the performance of the individual networks. A modified version of the AdaBoost algorithm is employed to integrate the predictions from multiple networks. Two benchmark time series data sets, i.e., the Sunspot and Box-Jenkins gas furnace problems, are used to assess the effectiveness of the proposed system. The simulation results reveal that an ensemble of boosted Elman networks can achieve a higher degree of generalization as well as performance than that of the individual networks. The results are compared with those from other learning systems, and implications of the performance are discussed.

Keywords: AdaBoost, Elman network, neural network ensemble, time series regression.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1684
758 SMCC: Self-Managing Congestion Control Algorithm

Authors: Sh. Jamali, A. Eftekhari

Abstract:

Transmission control protocol (TCP) Vegas detects network congestion in the early stage and successfully prevents periodic packet loss that usually occurs in TCP Reno. It has been demonstrated that TCP Vegas outperforms TCP Reno in many aspects. However, TCP Vegas suffers several problems that affect its congestion avoidance mechanism. One of the most important weaknesses in TCP Vegas is that alpha and beta depend on a good expected throughput estimate, which as we have seen, depends on a good minimum RTT estimate. In order to make the system more robust alpha and beta must be made responsive to network conditions (they are currently chosen statically). This paper proposes a modified Vegas algorithm, which can be adjusted to present good performance compared to other transmission control protocols (TCPs). In order to do this, we use PSO algorithm to tune alpha and beta. The simulation results validate the advantages of the proposed algorithm in term of performance.

Keywords: Self-managing, Congestion control, TCP.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1459
757 The Impact of Environmental Dynamism on Strategic Outsourcing Success

Authors: Mohamad Ghozali Hassan, Abdul Aziz Othman, Mohd Azril Ismail

Abstract:

Adapting quickly to environmental dynamism is essential for an organization to develop outsourcing strategic and management in order to sustain competitive advantage. This research used the Partial Least Squares Structural Equation Modeling (PLSSEM) tool to investigate the factors of environmental dynamism impact on the strategic outsourcing success among electrical and electronic manufacturing industries in outsourcing management. Statistical results confirm that the inclusion of customer demand, technological change, and competition level as a new combination concept of environmental dynamism, has positive effects on outsourcing success. Additionally, this research demonstrates the acceptability of PLS-SEM as a statistical analysis to furnish a better understanding of environmental dynamism in outsourcing management in Malaysia. A practical finding contributes to academics and practitioners in the field of outsourcing management.

Keywords: Environmental Dynamism, Customer Demand, Technological Change, Competition Level, Outsourcing Success.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2198
756 A Variable Incremental Conductance MPPT Algorithm Applied to Photovoltaic Water Pumping System

Authors: S. Abdourraziq, R. El Bachtiri

Abstract:

The use of solar energy as a source for pumping water is one of the promising areas in the photovoltaic (PV) application. The energy of photovoltaic pumping systems (PVPS) can be widely improved by employing an MPPT algorithm. This will lead consequently to maximize the electrical motor speed of the system. This paper presents a modified incremental conductance (IncCond) MPPT algorithm with direct control method applied to a standalone PV pumping system. The influence of the algorithm parameters on system behavior is investigated and compared with the traditional (INC) method. The studied system consists of a PV panel, a DC-DC boost converter, and a PMDC motor-pump. The simulation of the system by MATLAB-SIMULINK is carried out. Simulation results found are satisfactory.

Keywords: Photovoltaic pumping system (PVPS), incremental conductance (INC), MPPT algorithm, boost converter.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2244
755 Three-dimensional Simulation of Flow Pattern at the Lateral Intake in Straight Path, using Finite-Volume Method

Authors: R.Goudarzizadeh, N.Hedayat, S.H.Mousavi Jahromi

Abstract:

Channel junctions can be analyzed in two ways of division (lateral intake) and combined flows (confluence). The present paper investigates 3D flow pattern at lateral intake using Navier-Stokes equation and κ -ε (RNG) turbulent model. The equations are solved by Finite-Volume Method (FVM) and results are compared with the experimental data of (Barkdoll, B.D., 1997) to test the validity of the findings. Comparison of the results with the experimental data indicated a close proximity between the two sets of data which suggest a very close simulation. Results further indicated an inverse relation between the effects of discharge ratio ( r Q ) on the length and width of the separation zone. In other words, as the discharge ration increases, the length and width of separation zone decreases.

Keywords: 900 junction, flow division, turbulent flow, numerical modeling, flow separation zone.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1710
754 Investigation on Pore Water Pressure in Core of Karkheh Dam

Authors: Bahar Razavi, Mansour Parehkar, Ali Gholami

Abstract:

Pore water pressure is normally because of consolidation, compaction and water level fluctuation on reservoir. Measuring, controlling and analyzing of pore water pressure have significant importance in both of construction and operation period. Since end of 2002, (dam start up) nature of KARKHEH dam has been analyzed by using the gathered information from instrumentation system of dam. In this lecture dam condition after start up have been analyzed by using the gathered data from located piezometers in core of dam. According to TERZAGHI equation and records of piezometers, consolidation lasted around five years during early years of construction stage, and current pore water pressure in core of dam is caused by water level fluctuation in reservoir. Although there is time lag between water level fluctuation and results of piezometers. These time lags have been checked and the results clearly show that one of the most important causes of it is distance between piezometer and reservoir.

Keywords: Earth dam, Reservoir, Piezometer, Terzaghi, Consolidation

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2756
753 Analytical Solution for Free Vibration of Rectangular Kirchhoff Plate from Wave Approach

Authors: Mansour Nikkhah-Bahrami, Masih Loghmani, Mostafa Pooyanfar

Abstract:

In this paper, an analytical approach for free vibration analysis of four edges simply supported rectangular Kirchhoff plates is presented. The method is based on wave approach. From wave standpoint vibration propagate, reflect and transmit in a structure. Firstly, the propagation and reflection matrices for plate with simply supported boundary condition are derived. Then, these matrices are combined to provide a concise and systematic approach to free vibration analysis of a simply supported rectangular Kirchhoff plate. Subsequently, the eigenvalue problem for free vibration of plates is formulated and the equation of plate natural frequencies is constructed. Finally, the effectiveness of the approach is shown by comparison of the results with existing classical solution.

Keywords: Kirchhoff plate, propagation matrix, reflection matrix, vibration analysis.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2414
752 A Framework for Successful TQM Implementation and Its Effect on the Organizational Sustainability Development

Authors: Redha Elhuni, M. Munir Ahmad

Abstract:

The main purpose of this research is to construct a generic model for successful implementation of Total Quality Management (TQM) in Oil sector, and to find out the effects of this model on the organizational sustainability development (OSD) performance of Libyan oil and gas companies using the structured equation modeling (SEM) approach. The research approach covers both quantitative and qualitative methods. A questionnaire was developed in order to identify the quality factors that are seen by Libyan oil and gas companies to be critical to the success of TQM implementation. Hypotheses were developed to evaluate the impact of TQM implementation on O SD. Data analysis reveals that there is a significant positive effect of the TQM implementation on OSD. 24 quality factors are found to be critical and absolutely essential for successful TQM implementation. The results generated a structure of the TQMSD implementation framework based on the four major road map constructs (Top management commitment, employee involvement and participation, customer-driven processes, and continuous improvement culture).

Keywords: TQM, CQFs, Oil & Gas, OSD, Libya.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 4277
751 A Discrete Choice Modeling Approach to Modular Systems Design

Authors: Ivan C. Mustakerov, Daniela I. Borissova

Abstract:

The paper proposes an approach for design of modular systems based on original technique for modeling and formulation of combinatorial optimization problems. The proposed approach is described on the example of personal computer configuration design. It takes into account the existing compatibility restrictions between the modules and can be extended and modified to reflect different functional and users- requirements. The developed design modeling technique is used to formulate single objective nonlinear mixedinteger optimization tasks. The practical applicability of the developed approach is numerically tested on the basis of real modules data. Solutions of the formulated optimization tasks define the optimal configuration of the system that satisfies all compatibility restrictions and user requirements.

Keywords: Constrained discrete combinatorial choice, modular systems design, optimization problem, PC configuration.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2013
750 A Novel Compression Algorithm for Electrocardiogram Signals based on Wavelet Transform and SPIHT

Authors: Sana Ktata, Kaïs Ouni, Noureddine Ellouze

Abstract:

Electrocardiogram (ECG) data compression algorithm is needed that will reduce the amount of data to be transmitted, stored and analyzed, but without losing the clinical information content. A wavelet ECG data codec based on the Set Partitioning In Hierarchical Trees (SPIHT) compression algorithm is proposed in this paper. The SPIHT algorithm has achieved notable success in still image coding. We modified the algorithm for the one-dimensional (1-D) case and applied it to compression of ECG data. By this compression method, small percent root mean square difference (PRD) and high compression ratio with low implementation complexity are achieved. Experiments on selected records from the MIT-BIH arrhythmia database revealed that the proposed codec is significantly more efficient in compression and in computation than previously proposed ECG compression schemes. Compression ratios of up to 48:1 for ECG signals lead to acceptable results for visual inspection.

Keywords: Discrete Wavelet Transform, ECG compression, SPIHT.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2124
749 Audio Watermarking Using Spectral Modifications

Authors: Jyotsna Singh, Parul Garg, Alok Nath De

Abstract:

In this paper, we present a non-blind technique of adding the watermark to the Fourier spectral components of audio signal in a way such that the modified amplitude does not exceed the maximum amplitude spread (MAS). This MAS is due to individual Discrete fourier transform (DFT) coefficients in that particular frame, which is derived from the Energy Spreading function given by Schroeder. Using this technique one can store double the information within a given frame length i.e. overriding the watermark on the host of equal length with least perceptual distortion. The watermark is uniformly floating on the DFT components of original signal. This helps in detecting any intentional manipulations done on the watermarked audio. Also, the scheme is found robust to various signal processing attacks like presence of multiple watermarks, Additive white gaussian noise (AWGN) and mp3 compression.

Keywords: Discrete Fourier Transform, Spreading Function, Watermark, Pseudo Noise Sequence, Spectral Masking Effect

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1696
748 Modeling and Simulation of Flow Shop Scheduling Problem through Petri Net Tools

Authors: Joselito Medina Marin, Norberto Hernández Romero, Juan Carlos Seck Tuoh Mora, Erick S. Martinez Gomez

Abstract:

The Flow Shop Scheduling Problem (FSSP) is a typical problem that is faced by production planning managers in Flexible Manufacturing Systems (FMS). This problem consists in finding the optimal scheduling to carry out a set of jobs, which are processed in a set of machines or shared resources. Moreover, all the jobs are processed in the same machine sequence. As in all the scheduling problems, the makespan can be obtained by drawing the Gantt chart according to the operations order, among other alternatives. On this way, an FMS presenting the FSSP can be modeled by Petri nets (PNs), which are a powerful tool that has been used to model and analyze discrete event systems. Then, the makespan can be obtained by simulating the PN through the token game animation and incidence matrix. In this work, we present an adaptive PN to obtain the makespan of FSSP by applying PN analytical tools.

Keywords: Flow-shop scheduling problem, makespan, Petri nets, state equation.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1732
747 The Effect of Biochar, Inoculated Biochar and Compost Biological Component of the Soil

Authors: H. Dvořáčková, I. Mikajlo, J. Záhora, J. Elbl

Abstract:

Biochar can be produced from the waste matter and its application has been associated with returning of carbon in large amounts into the soil. The impacts of this material on physical and chemical properties of soil have been described. The biggest part of the research work is dedicated to the hypothesis of this material’s toxic effects on the soil life regarding its effect on the soil biological component. At present, it has been worked on methods which could eliminate these undesirable properties of biochar. One of the possibilities is to mix biochar with organic material, such as compost, or focusing on the natural processes acceleration in the soil. In the experiment has been used as the addition of compost as well as the elimination of toxic substances by promoting microbial activity in aerated water environment. Biochar was aerated for 7 days in a container with a volume of 20 l. This way modified biochar had six times higher biomass production and reduce mineral nitrogen leaching. Better results have been achieved by mixing biochar with compost.

Keywords: Leaching of nitrogen, soil, biochar, compost.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3027
746 A New Approach to Steganography using Sinc-Convolution Method

Authors: Ahmad R. Naghsh-Nilchi, Latifeh Pourmohammadbagher

Abstract:

Both image steganography and image encryption have advantages and disadvantages. Steganograhy allows us to hide a desired image containing confidential information in a covered or host image while image encryption is decomposing the desired image to a non-readable, non-comprehended manner. The encryption methods are usually much more robust than the steganographic ones. However, they have a high visibility and would provoke the attackers easily since it usually is obvious from an encrypted image that something is hidden! The combination of steganography and encryption will cover both of their weaknesses and therefore, it increases the security. In this paper an image encryption method based on sinc-convolution along with using an encryption key of 128 bit length is introduced. Then, the encrypted image is covered by a host image using a modified version of JSteg steganography algorithm. This method could be applied to almost all image formats including TIF, BMP, GIF and JPEG. The experiment results show that our method is able to hide a desired image with high security and low visibility.

Keywords: Sinc Approximation, Image Encryption, Sincconvolution, Image Steganography, JSTEG.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1820
745 Reformulations of Big Bang-Big Crunch Algorithm for Discrete Structural Design Optimization

Authors: O. Hasançebi, S. Kazemzadeh Azad

Abstract:

In the present study the efficiency of Big Bang-Big Crunch (BB-BC) algorithm is investigated in discrete structural design optimization. It is shown that a standard version of the BB-BC algorithm is sometimes unable to produce reasonable solutions to problems from discrete structural design optimization. Two reformulations of the algorithm, which are referred to as modified BB-BC (MBB-BC) and exponential BB-BC (EBB-BC), are introduced to enhance the capability of the standard algorithm in locating good solutions for steel truss and frame type structures, respectively. The performances of the proposed algorithms are experimented and compared to its standard version as well as some other algorithms over several practical design examples. In these examples, steel structures are sized for minimum weight subject to stress, stability and displacement limitations according to the provisions of AISC-ASD.

Keywords: Structural optimization, discrete optimization, metaheuristics, big bang-big crunch (BB-BC) algorithm, design optimization of steel trusses and frames.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2380
744 In vivo Introduced Extracellular Ubiquitin Regulates Intracellular Processes

Authors: Rusudan Sujashvili, Ekaterine Bakuradze, Irina Modebadze, Davit Dekanoidze

Abstract:

Extracellular ubiquitin in vivo effect on regenerative liver cells and liver histoarchitectonics has been studied. Experiments were performed on mature female white rats. Partial hepatectomy was made using the modified method of Higgins and Anderson. Standard histopathological assessment of liver tissue was used. Proliferative activity of hepatocytes was analyzed by colchicine mitotic index and immunohistochemical staining on ki67. We have found that regardless of number of injections and dose of extracellular ubiquitin liver histology has not been changed, so at tissue level no effect was observed. In vivo double injection of ubiquitin significantly decreases the mitotic activity at 32 hour point after partial hepatectomy. Thus, we can conclude that in vivo injected extracellular ubiquitin inhibits proliferative activity of hepatocytes in partially hepatectomyzed rats.

Keywords: Liver, regeneration, proliferation, ubiquitin.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1542
743 The Importance of Enterprise Support for Tourism Workers- Successful Use of a Cash Transaction System: An Information Systems Continuance Approach

Authors: Anne M. Sørebø

Abstract:

In this paper we investigate how wide-ranging organizational support and the more specific form of support, namely management support, may influence on tourism workers satisfaction with a cash transaction system. The IS continuance theory, proposed by Bhattacherjee in 2001, is utilized as a theoretical framework. This implies that both perceived usefulness and ease of use is included in the research model, in addition to organizational and management support. The sample consists of 500 workers from 10 cruise and tourist ferries in Scandinavia that use a cash transaction system to perform their work tasks. Using structural equation modelling, results indicate that organizational support and ease of use perceptions is critical for the users- level of satisfaction with the cash transaction system.The findings have implications for business managers and IS practitioners that want to increase the quality of IT-based business processes within the tourism industry.

Keywords: ease of use, IS continuance, organizational support, tourism industry, user satisfaction.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1557
742 A Power Reduction Technique for Built-In-Self Testing Using Modified Linear Feedback Shift Register

Authors: Mayank Shakya, Soundra Pandian. K. K

Abstract:

A linear feedback shift register (LFSR) is proposed which targets to reduce the power consumption from within. It reduces the power consumption during testing of a Circuit Under Test (CUT) at two stages. At first stage, Control Logic (CL) makes the clocks of the switching units of the register inactive for a time period when output from them is going to be same as previous one and thus reducing unnecessary switching of the flip-flops. And at second stage, the LFSR reorders the test vectors by interchanging the bit with its next and closest neighbor bit. It keeps fault coverage capacity of the vectors unchanged but reduces the Total Hamming Distance (THD) so that there is reduction in power while shifting operation.

Keywords: Linear Feedback Shift Register, Total Hamming Distance, Fault Coverage, Control Logic

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2018