WorldWideScience

Sample records for network destruction problem

  1. Destructive quantum interference in spin tunneling problems

    OpenAIRE

    von Delft, Jan; Henley, Christopher L.

    1992-01-01

    In some spin tunneling problems, there are several different but symmetry-related tunneling paths that connect the same initial and final configurations. The topological phase factors of the corresponding tunneling amplitudes can lead to destructive interference between the different paths, so that the total tunneling amplitude is zero. In the study of tunneling between different ground state configurations of the Kagom\\'{e}-lattice quantum Heisenberg antiferromagnet, this occurs when the spi...

  2. A Very Large Area Network (VLAN) knowledge-base applied to space communication problems

    Science.gov (United States)

    Zander, Carol S.

    1988-01-01

    This paper first describes a hierarchical model for very large area networks (VLAN). Space communication problems whose solution could profit by the model are discussed and then an enhanced version of this model incorporating the knowledge needed for the missile detection-destruction problem is presented. A satellite network or VLAN is a network which includes at least one satellite. Due to the complexity, a compromise between fully centralized and fully distributed network management has been adopted. Network nodes are assigned to a physically localized group, called a partition. Partitions consist of groups of cell nodes with one cell node acting as the organizer or master, called the Group Master (GM). Coordinating the group masters is a Partition Master (PM). Knowledge is also distributed hierarchically existing in at least two nodes. Each satellite node has a back-up earth node. Knowledge must be distributed in such a way so as to minimize information loss when a node fails. Thus the model is hierarchical both physically and informationally.

  3. Reinforcement Learning Based Data Self-Destruction Scheme for Secured Data Management

    Directory of Open Access Journals (Sweden)

    Young Ki Kim

    2018-04-01

    Full Text Available As technologies and services that leverage cloud computing have evolved, the number of businesses and individuals who use them are increasing rapidly. In the course of using cloud services, as users store and use data that include personal information, research on privacy protection models to protect sensitive information in the cloud environment is becoming more important. As a solution to this problem, a self-destructing scheme has been proposed that prevents the decryption of encrypted user data after a certain period of time using a Distributed Hash Table (DHT network. However, the existing self-destructing scheme does not mention how to set the number of key shares and the threshold value considering the environment of the dynamic DHT network. This paper proposes a method to set the parameters to generate the key shares needed for the self-destructing scheme considering the availability and security of data. The proposed method defines state, action, and reward of the reinforcement learning model based on the similarity of the graph, and applies the self-destructing scheme process by updating the parameter based on the reinforcement learning model. Through the proposed technique, key sharing parameters can be set in consideration of data availability and security in dynamic DHT network environments.

  4. vhv supply networks, problems of network structure

    Energy Technology Data Exchange (ETDEWEB)

    Raimbault, J

    1966-04-01

    The present and future power requirements of the Paris area and the structure of the existing networks are discussed. The various limitations that will have to be allowed for to lay down the structure of a regional transmission network leading in the power of the large national transmission network to within the Paris built up area are described. The theoretical solution that has been adopted, and the features of its final achievement, which is planned for about the year 2000, and the intermediate stages are given. The problem of the structure of the National Power Transmission network which is to supply the regional network was studied. To solve this problem, a 730 kV voltage network will have to be introduced.

  5. The role of asymmetric interactions on the effect of habitat destruction in mutualistic networks.

    Directory of Open Access Journals (Sweden)

    Guillermo Abramson

    Full Text Available Plant-pollinator mutualistic networks are asymmetric in their interactions: specialist plants are pollinated by generalist animals, while generalist plants are pollinated by a broad range involving specialists and generalists. It has been suggested that this asymmetric--or disassortative--assemblage could play an important role in determining the observed equal susceptibility of specialist and generalist plants under habitat destruction. At the core of the analysis of the phenomenon lies the observation that specialist plants, otherwise candidates to extinction, could cope with the disruption thanks to their interaction with a few generalist pollinators. We present a theoretical framework that supports this thesis. We analyze a dynamical model of a system of mutualistic plants and pollinators, subject to the destruction of their habitat. We analyze and compare two families of interaction topologies, ranging from highly assortative to highly disassortative ones, as well as real pollination networks. We found that several features observed in natural systems are predicted by the mathematical model. First, there is a tendency to increase the asymmetry of the network as a result of the extinctions. Second, an entropy measure of the differential susceptibility to extinction of specialist and generalist species show that they tend to balance when the network is disassortative. Finally, the disappearance of links in the network, as a result of extinctions, shows that specialist plants preserve more connections than the corresponding plants in an assortative system, enabling them to resist the disruption.

  6. Integrated network design and scheduling problems :

    Energy Technology Data Exchange (ETDEWEB)

    Nurre, Sarah G.; Carlson, Jeffrey J.

    2014-01-01

    We consider the class of integrated network design and scheduling problems. These problems focus on selecting and scheduling operations that will change the characteristics of a network, while being speci cally concerned with the performance of the network over time. Motivating applications of INDS problems include infrastructure restoration after extreme events and building humanitarian distribution supply chains. While similar models have been proposed, no one has performed an extensive review of INDS problems from their complexity, network and scheduling characteristics, information, and solution methods. We examine INDS problems under a parallel identical machine scheduling environment where the performance of the network is evaluated by solving classic network optimization problems. We classify that all considered INDS problems as NP-Hard and propose a novel heuristic dispatching rule algorithm that selects and schedules sets of arcs based on their interactions in the network. We present computational analysis based on realistic data sets representing the infrastructures of coastal New Hanover County, North Carolina, lower Manhattan, New York, and a realistic arti cial community CLARC County. These tests demonstrate the importance of a dispatching rule to arrive at near-optimal solutions during real-time decision making activities. We extend INDS problems to incorporate release dates which represent the earliest an operation can be performed and exible release dates through the introduction of specialized machine(s) that can perform work to move the release date earlier in time. An online optimization setting is explored where the release date of a component is not known.

  7. Supply network configuration—A benchmarking problem

    Science.gov (United States)

    Brandenburg, Marcus

    2018-03-01

    Managing supply networks is a highly relevant task that strongly influences the competitiveness of firms from various industries. Designing supply networks is a strategic process that considerably affects the structure of the whole network. In contrast, supply networks for new products are configured without major adaptations of the existing structure, but the network has to be configured before the new product is actually launched in the marketplace. Due to dynamics and uncertainties, the resulting planning problem is highly complex. However, formal models and solution approaches that support supply network configuration decisions for new products are scant. The paper at hand aims at stimulating related model-based research. To formulate mathematical models and solution procedures, a benchmarking problem is introduced which is derived from a case study of a cosmetics manufacturer. Tasks, objectives, and constraints of the problem are described in great detail and numerical values and ranges of all problem parameters are given. In addition, several directions for future research are suggested.

  8. Classification by a neural network approach applied to non destructive testing

    International Nuclear Information System (INIS)

    Lefevre, M.; Preteux, F.; Lavayssiere, B.

    1995-01-01

    Radiography is used by EDF for pipe inspection in nuclear power plants in order to detect defects. The radiographs obtained are then digitized in a well-defined protocol. The aim of EDF consists of developing a non destructive testing system for recognizing defects. In this paper, we describe the recognition procedure of areas with defects. We first present the digitization protocol, specifies the poor quality of images under study and propose a procedure to enhance defects. We then examine the problem raised by the choice of good features for classification. After having proved that statistical or standard textural features such as homogeneity, entropy or contrast are not relevant, we develop a geometrical-statistical approach based on the cooperation between signal correlations study and regional extrema analysis. The principle consists of analysing and comparing for areas with defects and without any defect, the evolution of conditional probabilities matrices for increasing neighborhood sizes, the shape of variograms and the location of regional minima. We demonstrate that anisotropy and surface of series of 'comet tails' associated with probability matrices, variograms slope and statistical indices, regional extrema location, are features able to discriminate areas with defects from areas without any. The classification is then realized by a neural network, which structure, properties and learning mechanisms are detailed. Finally we discuss the results. (authors). 21 refs., 5 figs

  9. Networks in social policy problems

    CERN Document Server

    Scotti, marco

    2012-01-01

    Network science is the key to managing social communities, designing the structure of efficient organizations and planning for sustainable development. This book applies network science to contemporary social policy problems. In the first part, tools of diffusion and team design are deployed to challenges in adoption of ideas and the management of creativity. Ideas, unlike information, are generated and adopted in networks of personal ties. Chapters in the second part tackle problems of power and malfeasance in political and business organizations, where mechanisms in accessing and controlling informal networks often outweigh formal processes. The third part uses ideas from biology and physics to understand global economic and financial crises, ecological depletion and challenges to energy security. Ideal for researchers and policy makers involved in social network analysis, business strategy and economic policy, it deals with issues ranging from what makes public advisories effective to how networks influenc...

  10. 3D Modeling and Simulation for Electromagnetic Non-Destructive Testing- Problems and Limitations

    International Nuclear Information System (INIS)

    Ilham Mukriz Zainal Abidin; Nurul Ain Ahmad Latif

    2011-01-01

    Non-Destructive Testing (NDT) plays a critical role in nuclear power plants (NPPs) for life cycle management; such testing requires specialists with various NDT related expertise with specific equipment. This paper will discuss the importance of 3D modeling and simulation for electromagnetic NDT for critical and complex components in terms of engineering reasoning and physical trials. Results from simulation are presented which show the link established between the measurements and information relating to defects, such as 3D shape, size and location, which facilitates not only forward problem but also inverse modeling involving experimental system specification and configuration; and pattern recognition for 3D defect information. Subsequently, the problems and limitations pertinent to 3D modeling and simulation are then highlighted and areas of improvement are discussed. (author)

  11. Generalized network improvement and packing problems

    CERN Document Server

    Holzhauser, Michael

    2016-01-01

    Michael Holzhauser discusses generalizations of well-known network flow and packing problems by additional or modified side constraints. By exploiting the inherent connection between the two problem classes, the author investigates the complexity and approximability of several novel network flow and packing problems and presents combinatorial solution and approximation algorithms. Contents Fractional Packing and Parametric Search Frameworks Budget-Constrained Minimum Cost Flows: The Continuous Case Budget-Constrained Minimum Cost Flows: The Discrete Case Generalized Processing Networks Convex Generalized Flows Target Groups Researchers and students in the fields of mathematics, computer science, and economics Practitioners in operations research and logistics The Author Dr. Michael Holzhauser studied computer science at the University of Kaiserslautern and is now a research fellow in the Optimization Research Group at the Department of Mathematics of the University of Kaiserslautern.

  12. Solving network design problems via decomposition, aggregation and approximation

    CERN Document Server

    Bärmann, Andreas

    2016-01-01

    Andreas Bärmann develops novel approaches for the solution of network design problems as they arise in various contexts of applied optimization. At the example of an optimal expansion of the German railway network until 2030, the author derives a tailor-made decomposition technique for multi-period network design problems. Next, he develops a general framework for the solution of network design problems via aggregation of the underlying graph structure. This approach is shown to save much computation time as compared to standard techniques. Finally, the author devises a modelling framework for the approximation of the robust counterpart under ellipsoidal uncertainty, an often-studied case in the literature. Each of these three approaches opens up a fascinating branch of research which promises a better theoretical understanding of the problem and an increasing range of solvable application settings at the same time. Contents Decomposition for Multi-Period Network Design Solving Network Design Problems via Ag...

  13. On the Update Problems for Software Defined Networks

    Directory of Open Access Journals (Sweden)

    V. A. Zakharov

    2014-01-01

    Full Text Available The designing of network update algorithms is urgent for the development of SDN control software. A particular case of Network Update Problem is that of restoring seamlessly a given network configuration after some packet forwarding rules have been disabled (say, at the expiry of their time-outs. We study this problem in the framework of a formal model of SDN, develop correct and safe network recovering algorithms, and show that in general case there is no way to restore network configuration seamlessly without referring to priorities of packet forwarding rules.

  14. A neural network approach to the orienteering problem

    Energy Technology Data Exchange (ETDEWEB)

    Golden, B.; Wang, Q.; Sun, X.; Jia, J.

    1994-12-31

    In the orienteering problem, we are given a transportation network in which a start point and an end point are specified. Other points have associated scores. Given a fixed amount of time, the goal is to determine a path from start to end through a subset of locations in order to maximize the total path score. This problem has received a considerable amount of attention in the last ten years. The TSP is a variant of the orienteering problem. This paper applies a modified, continuous Hopfield neural network to attack this NP-hard optimization problem. In it, we design an effective energy function and learning algorithm. Unlike some applications of neural networks to optimization problems, this approach is shown to perform quite well.

  15. Inverse kinematics problem in robotics using neural networks

    Science.gov (United States)

    Choi, Benjamin B.; Lawrence, Charles

    1992-01-01

    In this paper, Multilayer Feedforward Networks are applied to the robot inverse kinematic problem. The networks are trained with endeffector position and joint angles. After training, performance is measured by having the network generate joint angles for arbitrary endeffector trajectories. A 3-degree-of-freedom (DOF) spatial manipulator is used for the study. It is found that neural networks provide a simple and effective way to both model the manipulator inverse kinematics and circumvent the problems associated with algorithmic solution methods.

  16. The Network Completion Problem: Inferring Missing Nodes and Edges in Networks

    Energy Technology Data Exchange (ETDEWEB)

    Kim, M; Leskovec, J

    2011-11-14

    Network structures, such as social networks, web graphs and networks from systems biology, play important roles in many areas of science and our everyday lives. In order to study the networks one needs to first collect reliable large scale network data. While the social and information networks have become ubiquitous, the challenge of collecting complete network data still persists. Many times the collected network data is incomplete with nodes and edges missing. Commonly, only a part of the network can be observed and we would like to infer the unobserved part of the network. We address this issue by studying the Network Completion Problem: Given a network with missing nodes and edges, can we complete the missing part? We cast the problem in the Expectation Maximization (EM) framework where we use the observed part of the network to fit a model of network structure, and then we estimate the missing part of the network using the model, re-estimate the parameters and so on. We combine the EM with the Kronecker graphs model and design a scalable Metropolized Gibbs sampling approach that allows for the estimation of the model parameters as well as the inference about missing nodes and edges of the network. Experiments on synthetic and several real-world networks show that our approach can effectively recover the network even when about half of the nodes in the network are missing. Our algorithm outperforms not only classical link-prediction approaches but also the state of the art Stochastic block modeling approach. Furthermore, our algorithm easily scales to networks with tens of thousands of nodes.

  17. A matheuristic for the liner shipping network design problem

    DEFF Research Database (Denmark)

    Brouer, Berit Dangaard; Desaulniers, Guy

    2012-01-01

    for revenue and transshipment of cargo along with in/decrease of vessel- and operational cost for the current solution. The evaluation functions may be used by heuristics in general to evaluate changes to a network design without solving a large scale multicommodity flow problem.......We present a matheuristic, an integer programming based heuristic, for the Liner Shipping Network Design Problem. The heuristic applies a greedy construction heuristic based on an interpretation of the liner shipping network design problem as a multiple quadratic knapsack problem. The construction...

  18. Non-destructive testing at Chalk River

    International Nuclear Information System (INIS)

    Hilborn, J.W.

    1976-01-01

    In 1969 CRNL recognized the need for a strong group skilled in non-destructive test procedures. Within two years a new branch called Quality Control Branch was staffed and working. This branch engages in all aspects of non-destructive testing including development of new techniques, new applications of known technology, and special problems in support of operating reactors. (author)

  19. DESTRUCTIVE EDUCATIONAL PRACTICES AT UNIVERSITY

    Directory of Open Access Journals (Sweden)

    Андрей Владимирович Феоктистов

    2013-05-01

    Full Text Available The article is devoted to problems of origin and development of destructive educational practices at university. The authors focus on complex of interactions that disturb the existing in the academic environment norms and ethical principles. The most vivid evidence of destructive educational practice is the corruption issue. On the basis of the analyzed publications dealing with dynamics of corruption in the Russian higher education and the results of the survey by questionnaire, carried out at the technical university, the complex of recommendations has been prepared and suggested that is directed at minimization of destructive behavior at university.DOI: http://dx.doi.org/10.12731/2218-7405-2013-4-28

  20. Game Theoretic Problems in Network Economics and Mechanism Design Solutions

    CERN Document Server

    Narahari, Y; Narayanam, Ramasuri; Prakash, Hastagiri

    2009-01-01

    Explores game theoretic modeling and mechanism design for problem solving in Internet and network economics. This monograph contains an exposition of representative game theoretic problems in three different network economics situations and a systematic exploration of mechanism design solutions to these problems.

  1. Solving inversion problems with neural networks

    Science.gov (United States)

    Kamgar-Parsi, Behzad; Gualtieri, J. A.

    1990-01-01

    A class of inverse problems in remote sensing can be characterized by Q = F(x), where F is a nonlinear and noninvertible (or hard to invert) operator, and the objective is to infer the unknowns, x, from the observed quantities, Q. Since the number of observations is usually greater than the number of unknowns, these problems are formulated as optimization problems, which can be solved by a variety of techniques. The feasibility of neural networks for solving such problems is presently investigated. As an example, the problem of finding the atmospheric ozone profile from measured ultraviolet radiances is studied.

  2. Solving Constraint Satisfaction Problems with Networks of Spiking Neurons.

    Science.gov (United States)

    Jonke, Zeno; Habenschuss, Stefan; Maass, Wolfgang

    2016-01-01

    Network of neurons in the brain apply-unlike processors in our current generation of computer hardware-an event-based processing strategy, where short pulses (spikes) are emitted sparsely by neurons to signal the occurrence of an event at a particular point in time. Such spike-based computations promise to be substantially more power-efficient than traditional clocked processing schemes. However, it turns out to be surprisingly difficult to design networks of spiking neurons that can solve difficult computational problems on the level of single spikes, rather than rates of spikes. We present here a new method for designing networks of spiking neurons via an energy function. Furthermore, we show how the energy function of a network of stochastically firing neurons can be shaped in a transparent manner by composing the networks of simple stereotypical network motifs. We show that this design approach enables networks of spiking neurons to produce approximate solutions to difficult (NP-hard) constraint satisfaction problems from the domains of planning/optimization and verification/logical inference. The resulting networks employ noise as a computational resource. Nevertheless, the timing of spikes plays an essential role in their computations. Furthermore, networks of spiking neurons carry out for the Traveling Salesman Problem a more efficient stochastic search for good solutions compared with stochastic artificial neural networks (Boltzmann machines) and Gibbs sampling.

  3. Augmented neural networks and problem structure-based heuristics for the bin-packing problem

    Science.gov (United States)

    Kasap, Nihat; Agarwal, Anurag

    2012-08-01

    In this article, we report on a research project where we applied augmented-neural-networks (AugNNs) approach for solving the classical bin-packing problem (BPP). AugNN is a metaheuristic that combines a priority rule heuristic with the iterative search approach of neural networks to generate good solutions fast. This is the first time this approach has been applied to the BPP. We also propose a decomposition approach for solving harder BPP, in which subproblems are solved using a combination of AugNN approach and heuristics that exploit the problem structure. We discuss the characteristics of problems on which such problem structure-based heuristics could be applied. We empirically show the effectiveness of the AugNN and the decomposition approach on many benchmark problems in the literature. For the 1210 benchmark problems tested, 917 problems were solved to optimality and the average gap between the obtained solution and the upper bound for all the problems was reduced to under 0.66% and computation time averaged below 33 s per problem. We also discuss the computational complexity of our approach.

  4. A theory of intelligence: networked problem solving in animal societies

    OpenAIRE

    Shour, Robert

    2009-01-01

    A society's single emergent, increasing intelligence arises partly from the thermodynamic advantages of networking the innate intelligence of different individuals, and partly from the accumulation of solved problems. Economic growth is proportional to the square of the network entropy of a society's population times the network entropy of the number of the society's solved problems.

  5. An Algorithm for the Mixed Transportation Network Design Problem.

    Science.gov (United States)

    Liu, Xinyu; Chen, Qun

    2016-01-01

    This paper proposes an optimization algorithm, the dimension-down iterative algorithm (DDIA), for solving a mixed transportation network design problem (MNDP), which is generally expressed as a mathematical programming with equilibrium constraint (MPEC). The upper level of the MNDP aims to optimize the network performance via both the expansion of the existing links and the addition of new candidate links, whereas the lower level is a traditional Wardrop user equilibrium (UE) problem. The idea of the proposed solution algorithm (DDIA) is to reduce the dimensions of the problem. A group of variables (discrete/continuous) is fixed to optimize another group of variables (continuous/discrete) alternately; then, the problem is transformed into solving a series of CNDPs (continuous network design problems) and DNDPs (discrete network design problems) repeatedly until the problem converges to the optimal solution. The advantage of the proposed algorithm is that its solution process is very simple and easy to apply. Numerical examples show that for the MNDP without budget constraint, the optimal solution can be found within a few iterations with DDIA. For the MNDP with budget constraint, however, the result depends on the selection of initial values, which leads to different optimal solutions (i.e., different local optimal solutions). Some thoughts are given on how to derive meaningful initial values, such as by considering the budgets of new and reconstruction projects separately.

  6. An Algorithm for the Mixed Transportation Network Design Problem.

    Directory of Open Access Journals (Sweden)

    Xinyu Liu

    Full Text Available This paper proposes an optimization algorithm, the dimension-down iterative algorithm (DDIA, for solving a mixed transportation network design problem (MNDP, which is generally expressed as a mathematical programming with equilibrium constraint (MPEC. The upper level of the MNDP aims to optimize the network performance via both the expansion of the existing links and the addition of new candidate links, whereas the lower level is a traditional Wardrop user equilibrium (UE problem. The idea of the proposed solution algorithm (DDIA is to reduce the dimensions of the problem. A group of variables (discrete/continuous is fixed to optimize another group of variables (continuous/discrete alternately; then, the problem is transformed into solving a series of CNDPs (continuous network design problems and DNDPs (discrete network design problems repeatedly until the problem converges to the optimal solution. The advantage of the proposed algorithm is that its solution process is very simple and easy to apply. Numerical examples show that for the MNDP without budget constraint, the optimal solution can be found within a few iterations with DDIA. For the MNDP with budget constraint, however, the result depends on the selection of initial values, which leads to different optimal solutions (i.e., different local optimal solutions. Some thoughts are given on how to derive meaningful initial values, such as by considering the budgets of new and reconstruction projects separately.

  7. Solving constraint satisfaction problems with networks of spiking neurons

    Directory of Open Access Journals (Sweden)

    Zeno eJonke

    2016-03-01

    Full Text Available Network of neurons in the brain apply – unlike processors in our current generation ofcomputer hardware – an event-based processing strategy, where short pulses (spikes areemitted sparsely by neurons to signal the occurrence of an event at a particular point intime. Such spike-based computations promise to be substantially more power-efficient thantraditional clocked processing schemes. However it turned out to be surprisingly difficult todesign networks of spiking neurons that can solve difficult computational problems on the levelof single spikes (rather than rates of spikes. We present here a new method for designingnetworks of spiking neurons via an energy function. Furthermore we show how the energyfunction of a network of stochastically firing neurons can be shaped in a quite transparentmanner by composing the networks of simple stereotypical network motifs. We show that thisdesign approach enables networks of spiking neurons to produce approximate solutions todifficult (NP-hard constraint satisfaction problems from the domains of planning/optimizationand verification/logical inference. The resulting networks employ noise as a computationalresource. Nevertheless the timing of spikes (rather than just spike rates plays an essential rolein their computations. Furthermore, networks of spiking neurons carry out for the Traveling Salesman Problem a more efficient stochastic search for good solutions compared with stochastic artificial neural networks (Boltzmann machines and Gibbs sampling.

  8. Solving Minimum Cost Multi-Commodity Network Flow Problem ...

    African Journals Online (AJOL)

    ADOWIE PERE

    2018-03-23

    Mar 23, 2018 ... network-based modeling framework for integrated fixed and mobile ... Minimum Cost Network Flow Problem (MCNFP) and some ..... Unmanned Aerial Vehicle Routing in Traffic. Incident ... Ph.D. Thesis, Dept. of Surveying &.

  9. Cellular neural networks for the stereo matching problem

    International Nuclear Information System (INIS)

    Taraglio, S.; Zanela, A.

    1997-03-01

    The applicability of the Cellular Neural Network (CNN) paradigm to the problem of recovering information on the tridimensional structure of the environment is investigated. The approach proposed is the stereo matching of video images. The starting point of this work is the Zhou-Chellappa neural network implementation for the same problem. The CNN based system we present here yields the same results as the previous approach, but without the many existing drawbacks

  10. Recurrent neural network for non-smooth convex optimization problems with application to the identification of genetic regulatory networks.

    Science.gov (United States)

    Cheng, Long; Hou, Zeng-Guang; Lin, Yingzi; Tan, Min; Zhang, Wenjun Chris; Wu, Fang-Xiang

    2011-05-01

    A recurrent neural network is proposed for solving the non-smooth convex optimization problem with the convex inequality and linear equality constraints. Since the objective function and inequality constraints may not be smooth, the Clarke's generalized gradients of the objective function and inequality constraints are employed to describe the dynamics of the proposed neural network. It is proved that the equilibrium point set of the proposed neural network is equivalent to the optimal solution of the original optimization problem by using the Lagrangian saddle-point theorem. Under weak conditions, the proposed neural network is proved to be stable, and the state of the neural network is convergent to one of its equilibrium points. Compared with the existing neural network models for non-smooth optimization problems, the proposed neural network can deal with a larger class of constraints and is not based on the penalty method. Finally, the proposed neural network is used to solve the identification problem of genetic regulatory networks, which can be transformed into a non-smooth convex optimization problem. The simulation results show the satisfactory identification accuracy, which demonstrates the effectiveness and efficiency of the proposed approach.

  11. Controlled neural network application in track-match problem

    International Nuclear Information System (INIS)

    Baginyan, S.A.; Ososkov, G.A.

    1993-01-01

    Track-match problem of high energy physics (HEP) data handling is formulated in terms of incidence matrices. The corresponding Hopfield neural network is developed to solve this type of constraint satisfaction problems (CSP). A special concept of the controlled neural network is proposed as a basis of an algorithm for the effective CSP solution. Results of comparable calculations show the very high performance of this algorithm against conventional search procedures. 8 refs.; 1 fig.; 1 tab

  12. Destructive Leadership: The Hatfield and McCoy Feud

    Science.gov (United States)

    Sparks, George; Wolf, Patricia; Zurick, Andryce M.

    2015-01-01

    This paper explores the phenomenon of destructive leadership using the historical case study of the feud between the Hatfields and McCoys. The characteristics of destructive leadership as well as the consequences of this leadership style are reviewed, examined and analyzed. Utilizing a case from history to shine light on a contemporary problem,…

  13. Enhancement of a model for Large-scale Airline Network Planning Problems

    NARCIS (Netherlands)

    Kölker, K.; Lopes dos Santos, Bruno F.; Lütjens, K.

    2016-01-01

    The main focus of this study is to solve the network planning problem based on passenger decision criteria including the preferred departure time and travel time for a real-sized airline network. For this purpose, a model of the integrated network planning problem is formulated including scheduling

  14. Combating Weapons of Mass Destruction: Models, Complexity, and Algorithms in Complex Dynamic and Evolving Networks

    Science.gov (United States)

    2015-11-01

    Gholamreza, and Ester, Martin. “Modeling the Temporal Dynamics of Social Rating Networks Using Bidirectional Effects of Social Relations and Rating...1.1.2 β-disruptor Problems Besides the homogeneous network model consisting of uniform nodes and bidirectional links, the heterogeneous network model... neural and metabolic networks .” Biological Cybernetics 90 (2004): 311–317. 10.1007/s00422-004-0479-1. URL http://dx.doi.org/10.1007/s00422-004-0479-1 [51

  15. Reconstructing the Hopfield network as an inverse Ising problem

    International Nuclear Information System (INIS)

    Huang Haiping

    2010-01-01

    We test four fast mean-field-type algorithms on Hopfield networks as an inverse Ising problem. The equilibrium behavior of Hopfield networks is simulated through Glauber dynamics. In the low-temperature regime, the simulated annealing technique is adopted. Although performances of these network reconstruction algorithms on the simulated network of spiking neurons are extensively studied recently, the analysis of Hopfield networks is lacking so far. For the Hopfield network, we found that, in the retrieval phase favored when the network wants to memory one of stored patterns, all the reconstruction algorithms fail to extract interactions within a desired accuracy, and the same failure occurs in the spin-glass phase where spurious minima show up, while in the paramagnetic phase, albeit unfavored during the retrieval dynamics, the algorithms work well to reconstruct the network itself. This implies that, as an inverse problem, the paramagnetic phase is conversely useful for reconstructing the network while the retrieval phase loses all the information about interactions in the network except for the case where only one pattern is stored. The performances of algorithms are studied with respect to the system size, memory load, and temperature; sample-to-sample fluctuations are also considered.

  16. Comparative study of destructive and non-destructive methods in the activation analysis of rocks

    International Nuclear Information System (INIS)

    Vasconcellos, M.B.A.

    1978-01-01

    A comparative study between non-destructive thermal neutron activation analysis and activation analysis with radiochemical group separation is made Both methods are applied to the determination of trace elements minor and major elements in rocks. The treatment of the rocks, with special reference to the problems related to grinding and contamination by foreign elements is described. The choice of standards for multielement trace activation analysis is discussed. Two types of computer programs for the evalution of data obtained through Ge-li detector counting are used. All the phases of the destructive and non destructive analysis are described. In the destructive analysis, an adaptation of the group separation scheme developed by Morrison et al for the activation analysis of geological samples is made. The changes introduced make the radiochemical separation simpler and more rapid. Both destructive and non destructive methods are tested by means of the analysis of the United States Geological Survey standard rock AGV-1, which has been analysed by many authors. The same procedure is then applied to some alcaline rocks taken from the apatite mine of Jacupiranga, in the State of Sao Paulo, Brazil. The knowledge of the trace element concentration in these rocks is important for geochemical studies. A detailed study of the possible interferences encountered in the neutron activation analysis of these rocks is made, considering the interferences due to major activities, and to the proximity of the several gamma ray energies of the radioisotopes produced. Finally, the comparative study between the two methods is presented, using statistical tests for the quantitative evalution of results. (Author) [pt

  17. Neural network for solving convex quadratic bilevel programming problems.

    Science.gov (United States)

    He, Xing; Li, Chuandong; Huang, Tingwen; Li, Chaojie

    2014-03-01

    In this paper, using the idea of successive approximation, we propose a neural network to solve convex quadratic bilevel programming problems (CQBPPs), which is modeled by a nonautonomous differential inclusion. Different from the existing neural network for CQBPP, the model has the least number of state variables and simple structure. Based on the theory of nonsmooth analysis, differential inclusions and Lyapunov-like method, the limit equilibrium points sequence of the proposed neural networks can approximately converge to an optimal solution of CQBPP under certain conditions. Finally, simulation results on two numerical examples and the portfolio selection problem show the effectiveness and performance of the proposed neural network. Copyright © 2013 Elsevier Ltd. All rights reserved.

  18. Mental Health, School Problems, and Social Networks: Modeling Urban Adolescent Substance Use

    Science.gov (United States)

    Mason, Michael J.

    2010-01-01

    This study tested a mediation model of the relationship with school problems, social network quality, and substance use with a primary care sample of 301 urban adolescents. It was theorized that social network quality (level of risk or protection in network) would mediate the effects of school problems, accounting for internalizing problems and…

  19. Non-destructive testing and evaluation for structural integrity

    International Nuclear Information System (INIS)

    Baldev Raj; Jayakumar, T.; Rao, B.P.C.

    1995-01-01

    In this paper, a brief description of the physical concepts of non-destructive evaluation (NDE) methods and the physical/derived parameters that are used for assessing defects, stresses and microstructures are given. A few case studies highlighting the importance of non-destructive testing and evaluation for structural integrity assessment are also discussed based on the investigations carried out. Emerging concepts like intelligent processing of materials, expert systems, neural networks, use of multisensors with fusion of data and exploitation of signal analysis and imaging approaches are also addressed in this paper. (author). 92 refs., 1 tab

  20. Sensitivity analysis of linear programming problem through a recurrent neural network

    Science.gov (United States)

    Das, Raja

    2017-11-01

    In this paper we study the recurrent neural network for solving linear programming problems. To achieve optimality in accuracy and also in computational effort, an algorithm is presented. We investigate the sensitivity analysis of linear programming problem through the neural network. A detailed example is also presented to demonstrate the performance of the recurrent neural network.

  1. A two-layer recurrent neural network for nonsmooth convex optimization problems.

    Science.gov (United States)

    Qin, Sitian; Xue, Xiaoping

    2015-06-01

    In this paper, a two-layer recurrent neural network is proposed to solve the nonsmooth convex optimization problem subject to convex inequality and linear equality constraints. Compared with existing neural network models, the proposed neural network has a low model complexity and avoids penalty parameters. It is proved that from any initial point, the state of the proposed neural network reaches the equality feasible region in finite time and stays there thereafter. Moreover, the state is unique if the initial point lies in the equality feasible region. The equilibrium point set of the proposed neural network is proved to be equivalent to the Karush-Kuhn-Tucker optimality set of the original optimization problem. It is further proved that the equilibrium point of the proposed neural network is stable in the sense of Lyapunov. Moreover, from any initial point, the state is proved to be convergent to an equilibrium point of the proposed neural network. Finally, as applications, the proposed neural network is used to solve nonlinear convex programming with linear constraints and L1 -norm minimization problems.

  2. SOCIAL NETWORK OPTIMIZATION A NEW METHAHEURISTIC FOR GENERAL OPTIMIZATION PROBLEMS

    Directory of Open Access Journals (Sweden)

    Hassan Sherafat

    2017-12-01

    Full Text Available In the recent years metaheuristics were studied and developed as powerful technics for hard optimization problems. Some of well-known technics in this field are: Genetic Algorithms, Tabu Search, Simulated Annealing, Ant Colony Optimization, and Swarm Intelligence, which are applied successfully to many complex optimization problems. In this paper, we introduce a new metaheuristic for solving such problems based on social networks concept, named as Social Network Optimization – SNO. We show that a wide range of np-hard optimization problems may be solved by SNO.

  3. A HYBRID HOPFIELD NEURAL NETWORK AND TABU SEARCH ALGORITHM TO SOLVE ROUTING PROBLEM IN COMMUNICATION NETWORK

    Directory of Open Access Journals (Sweden)

    MANAR Y. KASHMOLA

    2012-06-01

    Full Text Available The development of hybrid algorithms for solving complex optimization problems focuses on enhancing the strengths and compensating for the weakness of two or more complementary approaches. The goal is to intelligently combine the key elements of these approaches to find superior solutions to solve optimization problems. Optimal routing in communication network is considering a complex optimization problem. In this paper we propose a hybrid Hopfield Neural Network (HNN and Tabu Search (TS algorithm, this algorithm called hybrid HNN-TS algorithm. The paradigm of this hybridization is embedded. We embed the short-term memory and tabu restriction features from TS algorithm in the HNN model. The short-term memory and tabu restriction control the neuron selection process in the HNN model in order to get around the local minima problem and find an optimal solution using the HNN model to solve complex optimization problem. The proposed algorithm is intended to find the optimal path for packet transmission in the network which is fills in the field of routing problem. The optimal path that will be selected is depending on 4-tuples (delay, cost, reliability and capacity. Test results show that the propose algorithm can find path with optimal cost and a reasonable number of iterations. It also shows that the complexity of the network model won’t be a problem since the neuron selection is done heuristically.

  4. A matheuristic for the liner shipping network design problem

    DEFF Research Database (Denmark)

    Brouer, Berit Dangaard; Desaulniers, Guy; Pisinger, David

    We present a matheuristic, an integer programming based heuristic, for the liner shipping network design problem. This problem consists of finding a set of container shipping routes defining a capacitated network for cargo transport. The objective is to maximize the revenue of cargo transport...... the available fleet of container vessels. The cargo transports make extensive use of transshipments between routes and the number of transshipments of the cargo flow is decisive for network profitability. Computational results are reported for the benchmark suite LINER-LIB 2012 following the industry standard...... of weekly departures on every schedule. The heuristic shows overall good performance and is able to find high quality solutions within competitive execution times. The matheuristic can also be applied as a decision support tool to improve an existing network by optimizing on a designated subset...

  5. A new neural network model for solving random interval linear programming problems.

    Science.gov (United States)

    Arjmandzadeh, Ziba; Safi, Mohammadreza; Nazemi, Alireza

    2017-05-01

    This paper presents a neural network model for solving random interval linear programming problems. The original problem involving random interval variable coefficients is first transformed into an equivalent convex second order cone programming problem. A neural network model is then constructed for solving the obtained convex second order cone problem. Employing Lyapunov function approach, it is also shown that the proposed neural network model is stable in the sense of Lyapunov and it is globally convergent to an exact satisfactory solution of the original problem. Several illustrative examples are solved in support of this technique. Copyright © 2017 Elsevier Ltd. All rights reserved.

  6. Digital transfer of non-destructive testing images

    International Nuclear Information System (INIS)

    Nelson, S.

    1996-01-01

    This paper intends to address a possible avenue to assist the Non-Destructive Testing Industry in managing and transferring results to their clients in a more efficient way. Data is sent around the globe in various forms to a multitude of destinations. The problem has been twofold in any industry: how to get the data into a communication network and, how to manage and utilize this data. There are many types of scanners which can digitize the graph which can then be displayed on a computer screen via a software programme. The one presented in this paper has been jointly developed by a Melbourne company, Compu Medics and AGFA Australia. This system can also capture a video signal from Ultrasound Units and display on the screen. The author also explore what can be done with this data. Possibilities are endless and include: sending it via satellite or land line to a remote reader, saving or archiving for future reference and utilising the data base for education

  7. Issues of weapons of mass destruction non-proliferation in Tajikistan

    International Nuclear Information System (INIS)

    Mirsaidov, U.M.

    2010-01-01

    This article is devoted to issues of weapons of mass destruction non-proliferation in Tajikistan. Over a period of 20 century, starting from First World War, the weapons of mass destruction arouse serious concern of world community. Geneva protocol of 1925 prohibits the use of chemical and biological weapons. Once nuclear weapon was created, the weapons of mass destruction distributions become the subject of high concern. Besides, during the end of 'cold war', regional conflicts, collapse of Soviet Union, as well as access to sensitive technologies considerably increase the danger of weapons of mass destruction distribution. More than 10 countries have active programs, relating to weapons of mass destruction and, possibly, more than ten countries have potential to start implementing such kinds of programs. Nowadays, trans national organized criminal groups and international terrorist networks are appeared in the world scene, which show interest in obtaining an access to sensitive materials, technologies, weapons and their distribution. After 11 September events, the risk of such weapons of mass destruction components use by such forces for Governments blackmail become real scene, which, despite of low possibility of this threat implementation, could have very serious and disastrous consequences. International community responded to these problems and challenges, basically through the following actions, which is detailed regime development of multilateral international treaties, directed to weapons of mass destruction distribution prevention. Non-proliferation treaty of nuclear weapons, Convention on prohibition of chemical weapons and Convention on prohibition of biological and toxin weapons are some of them. As it is known, Tajikistan signed all these treaties. For different reasons these treaties were subject of serious tests. Nuclear weapons tests in India and Pakistan in 1998 year, actual Israel status as state having nuclear weapon and North Korean program on

  8. Solving Dynamic Battlespace Movement Problems Using Dynamic Distributed Computer Networks

    National Research Council Canada - National Science Library

    Bradford, Robert

    2000-01-01

    .... The thesis designs a system using this architecture that invokes operations research network optimization algorithms to solve problems involving movement of people and equipment over dynamic road networks...

  9. An outer approximation method for the road network design problem.

    Science.gov (United States)

    Asadi Bagloee, Saeed; Sarvi, Majid

    2018-01-01

    Best investment in the road infrastructure or the network design is perceived as a fundamental and benchmark problem in transportation. Given a set of candidate road projects with associated costs, finding the best subset with respect to a limited budget is known as a bilevel Discrete Network Design Problem (DNDP) of NP-hard computationally complexity. We engage with the complexity with a hybrid exact-heuristic methodology based on a two-stage relaxation as follows: (i) the bilevel feature is relaxed to a single-level problem by taking the network performance function of the upper level into the user equilibrium traffic assignment problem (UE-TAP) in the lower level as a constraint. It results in a mixed-integer nonlinear programming (MINLP) problem which is then solved using the Outer Approximation (OA) algorithm (ii) we further relax the multi-commodity UE-TAP to a single-commodity MILP problem, that is, the multiple OD pairs are aggregated to a single OD pair. This methodology has two main advantages: (i) the method is proven to be highly efficient to solve the DNDP for a large-sized network of Winnipeg, Canada. The results suggest that within a limited number of iterations (as termination criterion), global optimum solutions are quickly reached in most of the cases; otherwise, good solutions (close to global optimum solutions) are found in early iterations. Comparative analysis of the networks of Gao and Sioux-Falls shows that for such a non-exact method the global optimum solutions are found in fewer iterations than those found in some analytically exact algorithms in the literature. (ii) Integration of the objective function among the constraints provides a commensurate capability to tackle the multi-objective (or multi-criteria) DNDP as well.

  10. Modelling, simulation and visualisation for electromagnetic non-destructive testing

    International Nuclear Information System (INIS)

    Ilham Mukriz Zainal Abidin; Abdul Razak Hamzah

    2010-01-01

    This paper reviews the state-of-the art and the recent development of modelling, simulation and visualization for eddy current Non-Destructive Testing (NDT) technique. Simulation and visualization has aid in the design and development of electromagnetic sensors and imaging techniques and systems for Electromagnetic Non-Destructive Testing (ENDT); feature extraction and inverse problems for Quantitative Non-Destructive Testing (QNDT). After reviewing the state-of-the art of electromagnetic modelling and simulation, case studies of Research and Development in eddy current NDT technique via magnetic field mapping and thermography for eddy current distribution are discussed. (author)

  11. Network Model for The Problem of Integer Balancing of a Fourdimensional Matrix

    Directory of Open Access Journals (Sweden)

    A. V. Smirnov

    2016-01-01

    Full Text Available The problem of integer balancing of a four-dimensional matrix is studied. The elements of the inner part (all four indices are greater than zero of the given real matrix are summed in each direction and each two- and three-dimensional section of the matrix; the total sum is also found. These sums are placed into the elements where one or more indices are equal to zero (according to the summing directions. The problem is to find an integer matrix of the same structure, which can be produced from the initial one by replacing the elements with the largest previous or the smallest following integer. At the same time, the element with four zero indices should be produced with standard rules of rounding - off. In the article the problem of finding the maximum multiple flow in the network of any natural multiplicity   is also studied. There are arcs of three types: ordinary arcs, multiple arcs and multi-arcs. Each multiple and multi-arc is a union of   linked arcs, which are adjusted with each other. The network constructing rules are described. The definitions of a divisible network and some associated subjects are stated. There are defined the basic principles for reducing the integer balancing problem of an  -dimensional matrix (  to the problem of finding the maximum flow in a divisible multiple network of multiplicity  . There are stated the rules for reducing the four-dimensional balancing problem to the maximum flow problem in the network of multiplicity 5. The algorithm of finding the maximum flow, which meets the solvability conditions for the integer balancing problem, is formulated for such a network.

  12. Pricing and Capacity Planning Problems in Energy Transmission Networks

    DEFF Research Database (Denmark)

    Villumsen, Jonas Christoffer

    strategy. In the Nordic electricity system a market with zonal prices is adopted. We consider the problem of designing zones in an optimal way explicitly considering uncertainty. Finally, we formulate the integrated problem of pipeline capacity expansion planning and transmission pricing in natural gas...... necessitates a radical change in the way we plan and operate energy systems. Another paradigm change which began in the 1990’s for electricity systems is that of deregulation. This has led to a variety of different market structures implemented across the world. In this thesis we discuss capacity planning...... and transmission pricing problems in energy transmission networks. Although the modelling framework applies to energy networks in general, most of the applications discussed concern the transmission of electricity. A number of the problems presented involves transmission switching, which allows the operator...

  13. Relevant problems in collaborative processes of non-hierarchical manufacturing networks

    Directory of Open Access Journals (Sweden)

    Beatriz Andrés

    2013-07-01

    Full Text Available Purpose: The purpose of this paper is to identify some of existing problems associated with collaboration among SMEs of the same network. Concretely, the problems are focused. The research objective is to identify the most relevant problems existing when SMEs have to deal with decentralized decisions (DDM. Design/methodology/approach: Through the literature review there have been collected collaborative problems caused by inter-organizational barriers. The approach taken is a qualitative study and analysis that classifies collaborative problems from less important to very important. In light of this, we are able to identify what are the most relevant problems to study in the NHN collaborative context. Findings and Originality/value: The developed methodology allows researchers to indentify amongst the collaborative problems those that are most relevant to solve in the NHN context, with the main aim of providing solutions in the future. The research aim is to provide the expert in the collaborative field a starting point to address the collaborative problems SMEs can find when belonging to collaborative networks. Research limitations/implications: Not all the problems that appear when an SME establish collaborative relationships, in a NHN, are considered. The identified problems have been arisen because there are discussed in the literature for addressing collaborative problems among networked partners. Identified problems are also considered because there are relevant to achieve collaboration among SMEs. Originality/value: The degree of coverage and the degree of significance is the taxonomy criteria used to identify the importance of solution degree of the encountered collaborative problems, in NHN context, in order to provide a future research of solutions to overcome them.

  14. "Cold combustion" as a new method of toxic waste destruction

    Directory of Open Access Journals (Sweden)

    Екатерина Юрьевна Ткаченко

    2015-05-01

    Full Text Available This article describes a promising new method for the destruction of toxic industrial waste, obsolete pesticides and military poisons and explosives. The proposed method can be used to create mobile modular units that will produce the destruction of the "field", to clean the soil and water containing low concentrations of a pollutant, to solve the problem of disposal of explosives, which is often accompanied by the destruction of uncontrolled detonation. The proposed method is environmentally friendly, using ice as the working body

  15. Competence building or destruction in small business networks

    DEFF Research Database (Denmark)

    Neergaard, Helle

    The paper explores the evolution of government-funded strategic networks among Danish firms. It challenges the preoccupation of both policy makers and management scholars with network structures. It proposes that process analysis at the firm level is better suited to elucidate evolutionary network......, on the other hand, reveals only the discontinuance of the original, government-funded networks. Thus, network success should be measured in terms of competence building, organizational learning and change rather than in terms of longevity and stabillity of network structures....

  16. Evaluation of Techniques to Detect Significant Network Performance Problems using End-to-End Active Network Measurements

    Energy Technology Data Exchange (ETDEWEB)

    Cottrell, R.Les; Logg, Connie; Chhaparia, Mahesh; /SLAC; Grigoriev, Maxim; /Fermilab; Haro, Felipe; /Chile U., Catolica; Nazir, Fawad; /NUST, Rawalpindi; Sandford, Mark

    2006-01-25

    End-to-End fault and performance problems detection in wide area production networks is becoming increasingly hard as the complexity of the paths, the diversity of the performance, and dependency on the network increase. Several monitoring infrastructures are built to monitor different network metrics and collect monitoring information from thousands of hosts around the globe. Typically there are hundreds to thousands of time-series plots of network metrics which need to be looked at to identify network performance problems or anomalous variations in the traffic. Furthermore, most commercial products rely on a comparison with user configured static thresholds and often require access to SNMP-MIB information, to which a typical end-user does not usually have access. In our paper we propose new techniques to detect network performance problems proactively in close to realtime and we do not rely on static thresholds and SNMP-MIB information. We describe and compare the use of several different algorithms that we have implemented to detect persistent network problems using anomalous variations analysis in real end-to-end Internet performance measurements. We also provide methods and/or guidance for how to set the user settable parameters. The measurements are based on active probes running on 40 production network paths with bottlenecks varying from 0.5Mbits/s to 1000Mbit/s. For well behaved data (no missed measurements and no very large outliers) with small seasonal changes most algorithms identify similar events. We compare the algorithms' robustness with respect to false positives and missed events especially when there are large seasonal effects in the data. Our proposed techniques cover a wide variety of network paths and traffic patterns. We also discuss the applicability of the algorithms in terms of their intuitiveness, their speed of execution as implemented, and areas of applicability. Our encouraging results compare and evaluate the accuracy of our

  17. Feed Forward Neural Network and Optimal Control Problem with Control and State Constraints

    Science.gov (United States)

    Kmet', Tibor; Kmet'ová, Mária

    2009-09-01

    A feed forward neural network based optimal control synthesis is presented for solving optimal control problems with control and state constraints. The paper extends adaptive critic neural network architecture proposed by [5] to the optimal control problems with control and state constraints. The optimal control problem is transcribed into a nonlinear programming problem which is implemented with adaptive critic neural network. The proposed simulation method is illustrated by the optimal control problem of nitrogen transformation cycle model. Results show that adaptive critic based systematic approach holds promise for obtaining the optimal control with control and state constraints.

  18. Hub location problems in transportation networks

    DEFF Research Database (Denmark)

    Gelareh, Shahin; Nickel, Stefan

    2011-01-01

    In this paper we propose a 4-index formulation for the uncapacitated multiple allocation hub location problem tailored for urban transport and liner shipping network design. This formulation is very tight and most of the tractable instances for MIP solvers are optimally solvable at the root node....... also introduce fixed cost values for Australian Post (AP) dataset....

  19. Multicast backup reprovisioning problem for Hamiltonian cycle-based protection on WDM networks

    Science.gov (United States)

    Din, Der-Rong; Huang, Jen-Shen

    2014-03-01

    As networks grow in size and complexity, the chance and the impact of failures increase dramatically. The pre-allocated backup resources cannot provide 100% protection guarantee when continuous failures occur in a network. In this paper, the multicast backup re-provisioning problem (MBRP) for Hamiltonian cycle (HC)-based protection on WDM networks for the link-failure case is studied. We focus on how to recover the protecting capabilities of Hamiltonian cycle against the subsequent link-failures on WDM networks for multicast transmissions, after recovering the multicast trees affected by the previous link-failure. Since this problem is a hard problem, an algorithm, which consists of several heuristics and a genetic algorithm (GA), is proposed to solve it. The simulation results of the proposed method are also given. Experimental results indicate that the proposed algorithm can solve this problem efficiently.

  20. Digital Networked Information Society and Public Health: Problems and Promises of Networked Health Communication of Lay Publics.

    Science.gov (United States)

    Kim, Jeong-Nam

    2018-01-01

    This special issue of Health Communication compiles 10 articles to laud the promise and yet confront the problems in the digital networked information society related to public health. We present this anthology of symphony and cacophony of lay individuals' communicative actions in a digital networked information society. The collection of problems and promise of the new digital world may be a cornerstone joining two worlds-pre- and postdigital network society-and we hope this special issue will help better shape our future states of public health.

  1. Model of the discrete destruction process of a solid body

    Science.gov (United States)

    Glagolev, V. V.; Markin, A. A.

    2018-03-01

    Destruction is considered as a discrete thermomechanical process, in which the deformation of a solid body is achieved by changing the boundary stresses acting on the part of the volume being destroyed with the external load unchanged. On the basis of the proposed concept, a model for adhesive stratification of a composite material is constructed. When adhesive stratification is used, the stress state of one or two boundaries of the adhesive layer changes to zero if the bonds with the joined body are broken. As a result of the stratification, the interaction between the part of the composite, which may include an adhesive layer and the rest of the body stops. When solving the elastoplastic problem of cohesive stratification, the region in which the destruction criterion is achieved is identified. With the help of a repeated solution of the problem of subcritical deformation with the known law of motion of the boundary of the region, the distribution of the load (nodal forces) acting from the region to the body is located. The next step considers the change in the stress–strain state of the body in the process of destruction of the selected area. The elastoplastic problem is solved with a simple unloading of the formed surface of the body and preservation of the external load corresponding to the beginning of the process of destruction.

  2. Observation and inverse problems in coupled cell networks

    International Nuclear Information System (INIS)

    Joly, Romain

    2012-01-01

    A coupled cell network is a model for many situations such as food webs in ecosystems, cellular metabolism and economic networks. It consists in a directed graph G, each node (or cell) representing an agent of the network and each directed arrow representing which agent acts on which. It yields a system of differential equations .x(t)=f(x(t)), where the component i of f depends only on the cells x j (t) for which the arrow j → i exists in G. In this paper, we investigate the observation problems in coupled cell networks: can one deduce the behaviour of the whole network (oscillations, stabilization, etc) by observing only one of the cells? We show that the natural observation properties hold for almost all the interactions f

  3. Open Problems in Network-aware Data Management in Exa-scale Computing and Terabit Networking Era

    Energy Technology Data Exchange (ETDEWEB)

    Balman, Mehmet; Byna, Surendra

    2011-12-06

    Accessing and managing large amounts of data is a great challenge in collaborative computing environments where resources and users are geographically distributed. Recent advances in network technology led to next-generation high-performance networks, allowing high-bandwidth connectivity. Efficient use of the network infrastructure is necessary in order to address the increasing data and compute requirements of large-scale applications. We discuss several open problems, evaluate emerging trends, and articulate our perspectives in network-aware data management.

  4. Evolving neural networks for strategic decision-making problems.

    Science.gov (United States)

    Kohl, Nate; Miikkulainen, Risto

    2009-04-01

    Evolution of neural networks, or neuroevolution, has been a successful approach to many low-level control problems such as pole balancing, vehicle control, and collision warning. However, certain types of problems-such as those involving strategic decision-making-have remained difficult for neuroevolution to solve. This paper evaluates the hypothesis that such problems are difficult because they are fractured: The correct action varies discontinuously as the agent moves from state to state. A method for measuring fracture using the concept of function variation is proposed and, based on this concept, two methods for dealing with fracture are examined: neurons with local receptive fields, and refinement based on a cascaded network architecture. Experiments in several benchmark domains are performed to evaluate how different levels of fracture affect the performance of neuroevolution methods, demonstrating that these two modifications improve performance significantly. These results form a promising starting point for expanding neuroevolution to strategic tasks.

  5. A One-Layer Recurrent Neural Network for Pseudoconvex Optimization Problems With Equality and Inequality Constraints.

    Science.gov (United States)

    Qin, Sitian; Yang, Xiudong; Xue, Xiaoping; Song, Jiahui

    2017-10-01

    Pseudoconvex optimization problem, as an important nonconvex optimization problem, plays an important role in scientific and engineering applications. In this paper, a recurrent one-layer neural network is proposed for solving the pseudoconvex optimization problem with equality and inequality constraints. It is proved that from any initial state, the state of the proposed neural network reaches the feasible region in finite time and stays there thereafter. It is also proved that the state of the proposed neural network is convergent to an optimal solution of the related problem. Compared with the related existing recurrent neural networks for the pseudoconvex optimization problems, the proposed neural network in this paper does not need the penalty parameters and has a better convergence. Meanwhile, the proposed neural network is used to solve three nonsmooth optimization problems, and we make some detailed comparisons with the known related conclusions. In the end, some numerical examples are provided to illustrate the effectiveness of the performance of the proposed neural network.

  6. Social networking sites: an adjunctive treatment modality for psychological problems.

    Science.gov (United States)

    Menon, Indu S; Sharma, Manoj Kumar; Chandra, Prabha S; Thennarasu, K

    2014-07-01

    Social networking is seen as a way to enhance social support and feeling of well-being. The present work explores the potentials of social networking sites as an adjunctive treatment modality for initiating treatment contact as well as for managing psychological problems. Interview schedule, Facebook intensity questionnaire were administered on 28 subjects with a combination of 18 males and 10 females. They were taken from the in-patient and out-patient psychiatry setting of the hospital. Facebook was the most popular sites and used to seek emotional support on the basis of the frequent updates of emotional content that users put in their profile; reconciliations, escape from the problems or to manage the loneliness; getting information about illness and its treatment and interaction with experts and also manifested as problematic use. It has implications for developing social networking based adjunctive treatment modality for psychological problems.

  7. Dismantlement and destruction of chemical, nuclear and conventional weapons

    International Nuclear Information System (INIS)

    Schulte, N.T.

    1997-01-01

    The safe destruction and dismantling of chemical, nuclear and conventional weapons is of fundamental importance to the security of all countries represented in this volume. Expertise in the field is not confined to one country or organisation: all can benefit from each other. There is an ever present danger of proliferation of weapons of mass destruction: approximately two dozen countries have ongoing programmes to develop or acquire such weapons, and many are also gaining the capability to build air-surface delivery systems. But much can be done to prevent proliferation by reducing leakage of materials and know-how and by solving the problems of the destruction of surplus weapons systems, which has now come to be a key issue. In 13 sessions of the workshop attention was paid to (1) Dismantlement and Destruction of Chemical, Nuclear and Conventional Weapons; (2) Status of Implementation of Arms Control Treaties and Voluntary Commitments; (3) National Perspectives on Cooperation in Disarmament; (4) Stocktaking of National and Bilateral Disposal/Destruction Programmes: Chemical Weapons; (5) Stocktaking of National and Bilateral Disposal/Destruction Programmes: Nuclear Weapons; (6) Stocktaking of National and Bilateral Disposal/Destruction Programmes: Conventional Weapons. Session; (7) Experience with Currently Employed Chemical Destruction Technologies; (8) Alternative Chemical Destruction Technologies; (9) Deactivation, Dismantlement and Destruction of Delivery Systems and Infrastructure for Nuclear Weapons; (10) Storage, Safeguarding and Disposition of Fissile Materials; (11) Technologies for Conversion and Civil Use of Demilitarized Materials; (12) International Organizations; and (13) Environmental Challenges Posed by Chemical and Nuclear Disarmament

  8. Inefficient Job Destructions and Training with Hold-up

    DEFF Research Database (Denmark)

    Chéron, Arnaud; Rouland, Benedicte

    2011-01-01

    This paper develops an equilibrium search model with endogenous job destructions and where firms decide at the time of job entry how much to invest in match-specific human capital. We first show that job destruction and training investment decisions are strongly complementary. It is possible...... that there are no firings at equilibrium. Further, training investments are confronted to a hold-up problem making the decentralized equilibrium always inefficient. We show therefore that both training subsidies and firing taxes must be implemented to bring back efficiency....

  9. A Bio-Inspired Approach to Traffic Network Equilibrium Assignment Problem.

    Science.gov (United States)

    Zhang, Xiaoge; Mahadevan, Sankaran

    2018-04-01

    Finding an equilibrium state of the traffic assignment plays a significant role in the design of transportation networks. We adapt the path finding mathematical model of slime mold Physarum polycephalum to solve the traffic equilibrium assignment problem. We make three contributions in this paper. First, we propose a generalized Physarum model to solve the shortest path problem in directed and asymmetric graphs. Second, we extend it further to resolve the network design problem with multiple source nodes and sink nodes. At last, we demonstrate that the Physarum solver converges to the user-optimized (Wardrop) equilibrium by dynamically updating the costs of links in the network. In addition, convergence of the developed algorithm is proved. Numerical examples are used to demonstrate the efficiency of the proposed algorithm. The superiority of the proposed algorithm is demonstrated in comparison with several other algorithms, including the Frank-Wolfe algorithm, conjugate Frank-Wolfe algorithm, biconjugate Frank-Wolfe algorithm, and gradient projection algorithm.

  10. Empirical analysis of the types of destructiveness of law enforcement officers

    Directory of Open Access Journals (Sweden)

    Zlokazov K.V.

    2014-12-01

    Full Text Available The variety of existing scientific concepts of the problem of personality destructiveness is shown. The character of such general conclusions does not facilitate the cognition and prediction of destructive phenomena. The author proves the necessity to develop psychological theory of destructiveness which methodologically unites well-known but separate phenomena of psychological life of an individual. The fundamental propositions of this theory are argued: destructiveness is an active behaviour; it is aimed at perceived goal and formed on the basis of need perceived by an individual. The following features of destructiveness are distinguished: individual typological, regulatory, value characteristics of personality; peculiarities of person’s attitude to significant aspects of life – to the self, society and professional activity. The author proposes his own method of destructiveness diagnostics aimed at describing destructive and constructive components of social and professional activity of a person. Diagnostics indicators are the following: typological preconditions of destructiveness; features of regulation of activity and relations; value characteristics of individuals related to destructiveness. Indicators, describing the level of personal disadaptation, are provided. Personality destructiveness indicators of 211 law enforcement officers (93 % – males, mean age – 34 were analyzed, which allowed to group and describe psychological characteristics of 4 types of destructiveness. They are: socially alienated – 31 % of respondents, socially destructive – 29 %, asocially destructive – 23 %, asocially alienated – 17 %. This typology allows to generalize psychological preconditions of destructive and constructive behaviour of law enforcement officers. The author proposes further analyzing the provisions of conception of personality destructiveness.

  11. Assessment of network inference methods: how to cope with an underdetermined problem.

    Directory of Open Access Journals (Sweden)

    Caroline Siegenthaler

    Full Text Available The inference of biological networks is an active research area in the field of systems biology. The number of network inference algorithms has grown tremendously in the last decade, underlining the importance of a fair assessment and comparison among these methods. Current assessments of the performance of an inference method typically involve the application of the algorithm to benchmark datasets and the comparison of the network predictions against the gold standard or reference networks. While the network inference problem is often deemed underdetermined, implying that the inference problem does not have a (unique solution, the consequences of such an attribute have not been rigorously taken into consideration. Here, we propose a new procedure for assessing the performance of gene regulatory network (GRN inference methods. The procedure takes into account the underdetermined nature of the inference problem, in which gene regulatory interactions that are inferable or non-inferable are determined based on causal inference. The assessment relies on a new definition of the confusion matrix, which excludes errors associated with non-inferable gene regulations. For demonstration purposes, the proposed assessment procedure is applied to the DREAM 4 In Silico Network Challenge. The results show a marked change in the ranking of participating methods when taking network inferability into account.

  12. Non-destructive examination system of vitreous body

    Science.gov (United States)

    Shibata, Takuma; Gong, Jin; Watanabe, Yosuke; Kabir, M. Hasnat; Masato, Makino; Furukawa, Hidemitsu; Nishitsuka, Koichi

    2014-04-01

    Eyeball plays a quite important role in acquiring the vision. Vitreous body occupies the largest part of the eyeball and consists of biological, elastic, transparent, gel materials. In the present medical examination, the non-destructive examination method of the vitreous body has not been well established. Here, we focus on an application of dynamic light scattering to this topic. We tried to apply our lab-made apparatus, scanning microscopic light scattering (SMILS), which was specially designed for observing the nanometer-scale network structure in gel materials. In order to examine the vitreous body using SMILS method, a commercial apparatus, nano Partica (Horiba Co. Ltd.) was also customized. We analyzed vitreous body using both the SMILS and the customized nano Partica. We successfully examined the vitreous bodies of healthy pigs in non-destructive way.

  13. Problems in the Deployment of Learning Networks In Small Organizations

    NARCIS (Netherlands)

    Shankle, Dean E.; Shankle, Jeremy P.

    2006-01-01

    Please, cite this publication as: Shankle, D.E., & Shankle, J.P. (2006). Problems in the Deployment of Learning Networks In Small Organizations. Proceedings of International Workshop in Learning Networks for Lifelong Competence Development, TENCompetence Conference. March 30th-31st, Sofia, Bulgaria:

  14. Competence Building or Destruction in Small Business Networks

    DEFF Research Database (Denmark)

    Neergaard, Helle; Nielsen, Kent T.

    patterns than structural analysis. Based on both quantitative and qualitative data from a population of 104 networks and 557 firms, process analysis demonstrates a crucial move from first generation, artificial, formal networks to second generation, spontaneous, informal networks. Structural analysis...

  15. Problem-Solving Methods for the Prospective Development of Urban Power Distribution Network

    Directory of Open Access Journals (Sweden)

    A. P. Karpenko

    2014-01-01

    Full Text Available This article succeeds the former A. P. K nko’ and A. I. Kuzmina’ ubl t on titled "A mathematical model of urban distribution electro-network considering its future development" (electronic scientific and technical magazine "Science and education" No. 5, 2014.The article offers a model of urban power distribution network as a set of transformer and distribution substations and cable lines. All elements of the network and new consumers are determined owing to vectors of parameters consistent with them.A problem of the urban power distribution network design, taking into account a prospective development of the city, is presented as a problem of discrete programming. It is in deciding on the optimal option to connect new consumers to the power supply network, on the number and sites to build new substations, and on the option to include them in the power supply network.Two methods, namely a reduction method for a set the nested tasks of global minimization and a decomposition method are offered to solve the problem.In reduction method the problem of prospective development of power supply network breaks into three subtasks of smaller dimension: a subtask to define the number and sites of new transformer and distribution substations, a subtask to define the option to connect new consumers to the power supply network, and a subtask to include new substations in the power supply network. The vector of the varied parameters is broken into three subvectors consistent with the subtasks. Each subtask is solved using an area of admissible vector values of the varied parameters at the fixed components of the subvectors obtained when solving the higher subtasks.In decomposition method the task is presented as a set of three, similar to reduction method, reductions of subtasks and a problem of coordination. The problem of coordination specifies a sequence of the subtasks solution, defines the moment of calculation termination. Coordination is realized by

  16. Identifying and localizing network problems using the PuNDIT project

    International Nuclear Information System (INIS)

    Batista, Jorge; McKee, Shawn; Dovrolis, Constantine; Lee, Danny

    2015-01-01

    In today's world of distributed collaborations of scientists, there are many challenges to providing effective infrastructures to couple these groups of scientists with their shared computing and storage resources. The Pythia Network Diagnostic InfrasTructure (PuNDIT[1]) project is integrating and scaling research tools and creating robust code suitable for operational needs addressing the difficult challenge of automating the detection and location of network problems.PuNDIT is building upon the de-facto standard perfSONAR[2] network measurement infrastructure deployed in Open Science Grid(OSG)[3] and the Worldwide LHC Computing Grid(WLCG)[4]to gather and analyze complex real-world network topologies coupled with their corresponding network metrics to identify possible signatures of network problems from a set of symptoms. The PuNDIT Team is working closely with the perfSONAR developers from ESnet and Internet2 to integrate PuNDIT components as part of the perfSONAR Toolkit. A primary goal for PuNDIT is to convert complex network metrics into easily understood diagnoses in an automated way. We will report on the project progress to-date in working with the OSG and WLCG communities, describe the current implementation including some initial results and discuss future plans and the project timeline. (paper)

  17. Interacting with Users in Social Networks: The Follow-back Problem

    Science.gov (United States)

    2016-05-02

    These functions are known as network centrali- ties. They quantify how central a vertex is to the problem at hand, with the definition of centrality ...56 4.2.2 Twitter networks . . . . . . . . . . . . . . . . . . . . . . . . . 57 4.2.3 Network centrality policies...tool can hinder the free movement of alternative ideas and information and thus can be analyzed through the A2/AD paradigm. Non-state adversaries have

  18. Non-destructive Engineering

    International Nuclear Information System (INIS)

    Ko, Jin Hyeon; Ryu, Taek In; Ko, Jun Bin; Hwang, Yong Hwa

    2006-08-01

    This book gives descriptions of non-destructive engineering on outline of non-destructive test, weld defects, radiographic inspection radiography, ultrasonic inspection, magnetic particle testing, liquid penetrant testing, eddy current inspection method, strain measurement, acoustic emission inspection method, other non-destructive testing like leakage inspection method, and non-destructive mechanics for fault analysis such as Griffiths creaking theory, and stress analysis of creaking.

  19. Economic importance of non-destructive testing

    International Nuclear Information System (INIS)

    Loebert, P.

    1979-01-01

    On May 21 to 23, 1979, the annual meeting of the Deutsche Gesellschaft fuer Zerstoerungsfreie Pruefung took place in Lindau near the Bodensee lake. About 600 experts from Germany and abroad participated in the meeting, whose general subject was 'The Economic Importance of Non-Destructive Testing'. Theoretical problems and practical investigations were discussed in a number of papers on special subjects. Apart from the 33 papers, there was also a poster show with 53 stands with texts, drawings, diagrams, and figures where the authors informed those interested on the latest state of knowledge in testing. The short papers were read in six sessions under the headings of rentability of non-destructive testing, X-ray methods, electromagnetic methods, and ultrasonic methods 1 and 2. (orig.) [de

  20. An analogue of Morse theory for planar linear networks and the generalized Steiner problem

    International Nuclear Information System (INIS)

    Karpunin, G A

    2000-01-01

    A study is made of the generalized Steiner problem: the problem of finding all the locally minimal networks spanning a given boundary set (terminal set). It is proposed to solve this problem by using an analogue of Morse theory developed here for planar linear networks. The space K of all planar linear networks spanning a given boundary set is constructed. The concept of a critical point and its index is defined for the length function l of a planar linear network. It is shown that locally minimal networks are local minima of l on K and are critical points of index 1. The theorem is proved that the sum of the indices of all the critical points is equal to χ(K)=1. This theorem is used to find estimates for the number of locally minimal networks spanning a given boundary set

  1. A Branch and Cut algorithm for the container shipping network design problem

    DEFF Research Database (Denmark)

    Reinhardt, Line Blander; Pisinger, David

    2012-01-01

    The network design problem in liner shipping is of increasing importance in a strongly competitive market where potential cost reductions can influence market share and profits significantly. In this paper the network design and fleet assignment problems are combined into a mixed integer linear...... programming model minimizing the overall cost. To better reflect the real-life situation we take into account the cost of transhipment, a heterogeneous fleet, route dependant capacities, and butterfly routes. To the best of our knowledge it is the first time an exact solution method to the problem considers...

  2. DESTRUCTION OF INTERSTELLAR DUST IN EVOLVING SUPERNOVA REMNANT SHOCK WAVES

    International Nuclear Information System (INIS)

    Slavin, Jonathan D.; Dwek, Eli; Jones, Anthony P.

    2015-01-01

    Supernova generated shock waves are responsible for most of the destruction of dust grains in the interstellar medium (ISM). Calculations of the dust destruction timescale have so far been carried out using plane parallel steady shocks, however, that approximation breaks down when the destruction timescale becomes longer than that for the evolution of the supernova remnant (SNR) shock. In this paper we present new calculations of grain destruction in evolving, radiative SNRs. To facilitate comparison with the previous study by Jones et al., we adopt the same dust properties as in that paper. We find that the efficiencies of grain destruction are most divergent from those for a steady shock when the thermal history of a shocked gas parcel in the SNR differs significantly from that behind a steady shock. This occurs in shocks with velocities ≳200 km s −1 for which the remnant is just beginning to go radiative. Assuming SNRs evolve in a warm phase dominated ISM, we find dust destruction timescales are increased by a factor of ∼2 compared to those of Jones et al., who assumed a hot gas dominated ISM. Recent estimates of supernova rates and ISM mass lead to another factor of ∼3 increase in the destruction timescales, resulting in a silicate grain destruction timescale of ∼2–3 Gyr. These increases, while not able to resolve the problem of the discrepant timescales for silicate grain destruction and creation, are an important step toward understanding the origin and evolution of dust in the ISM

  3. Delineating the sequelae of destructive and constructive interparental conflict for children within an evolutionary framework.

    Science.gov (United States)

    Davies, Patrick T; Martin, Meredith J; Cicchetti, Dante

    2012-07-01

    We examined the joint role of constructive and destructive interparental conflict in predicting children's emotional insecurity and psychological problems. In Study 1, 250 early adolescents (M = 12.6 years) and their primary caregivers completed assessments of family and child functioning. In Study 2, 201 mothers and their 2-year-old children participated in a multimethod, longitudinal design with 3 annual measurement occasions. Findings from structural equation modeling in both studies revealed that children's emotional insecurity in the interparental relationship mediated associations between destructive interparental conflict and children's psychological problems even after including constructive conflict and family and child covariates as predictors. Conversely, emotional insecurity was not a mediator of associations between constructive interparental conflict and children's psychological problems when destructive interparental conflict was specified as a risk factor in the analyses. The results are consistent with the evolutionary reformulation of emotional security theory and the resulting primacy ascribed to destructive interparental conflict in accounting for individual differences in children's emotional insecurity and its pathogenic implications (Davies & Sturge-Apple, 2007).

  4. Decentralized coverage control problems for mobile robotic sensor and actuator networks

    CERN Document Server

    Savkin, A; Xi, Z; Javed, F; Matveev, A; Nguyen, H

    2015-01-01

    This book introduces various coverage control problems for mobile sensor networks including barrier, sweep and blanket. Unlike many existing algorithms, all of the robotic sensor and actuator motion algorithms developed in the book are fully decentralized or distributed, computationally efficient, easily implementable in engineering practice and based only on information on the closest neighbours of each mobile sensor and actuator and local information about the environment. Moreover, the mobile robotic sensors have no prior information about the environment in which they operation. These various types of coverage problems have never been covered before by a single book in a systematic way. Another topic of this book is the study of mobile robotic sensor and actuator networks. Many modern engineering applications include the use of sensor and actuator networks to provide efficient and effective monitoring and control of industrial and environmental processes. Such mobile sensor and actuator networks are abl...

  5. Non-destructive and micro-invasive testing techniques for characterizing materials, structures and restoration problems in mural paintings

    Science.gov (United States)

    Tortora, Mariagrazia; Sfarra, Stefano; Chiarini, Marco; Daniele, Valeria; Taglieri, Giuliana; Cerichelli, Giorgio

    2016-11-01

    In this paper, chemical and structural studies of medieval wall paintings in Ocre (L'Aquila, Italy) are presented. During the latest restoration campaign, non-destructive (Near-Infrared Reflectography and Infrared Thermography) and micro-invasive (Nuclear Magnetic Resonance, Fourier Transform Infrared Spectroscopy, μ-Raman, Scanning Electron Microscopy with X-ray Microanalysis, X-Ray Diffraction, X-Ray Fluorescence, Optical Microscopy, Mass Spectrometry, Thermogravimetry) analyses were performed in order to determine the detachments of wall surfaces and the characterization of original and restoration materials. Data integration allowed to reconstruct the conservative history, the execution techniques and the conservation problems of the artefact, as well as to assess the effectiveness of restoration activities adopted. The combined use of physical and micro-chemical techniques proved to be effective for an in-depth study of materials stratification of paintings.

  6. Cooperation enhanced by habitat destruction in Prisoner's Dilemma Games

    Science.gov (United States)

    Yang, Xiqing; Wang, Wanxiong; Zhang, Feng; Qiao, Hongqiang

    2017-11-01

    The emergence and maintenance of cooperation is a fundamental problem within groups of selfish individuals, whereby we introduce a model of replicator equations based on the Prisoner's Dilemma game. In the present work, the effect of habitat destruction on the evolution of cooperation will be taken into account. Our results show that cooperators can receive the biggest boost for a moderate value of habitat destruction, and more serious habitat destruction will lead to lower levels of cooperation until zero. Moreover, we also reach the conclusion that the cooperation level decreases monotonously with the increasing of the ratio of cooperative cost to benefit but increases monotonously with the increasing of the encounter probability. Our findings can help to further understand the evolution of cooperation under the harsh external environment.

  7. Complex network problems in physics, computer science and biology

    Science.gov (United States)

    Cojocaru, Radu Ionut

    There is a close relation between physics and mathematics and the exchange of ideas between these two sciences are well established. However until few years ago there was no such a close relation between physics and computer science. Even more, only recently biologists started to use methods and tools from statistical physics in order to study the behavior of complex system. In this thesis we concentrate on applying and analyzing several methods borrowed from computer science to biology and also we use methods from statistical physics in solving hard problems from computer science. In recent years physicists have been interested in studying the behavior of complex networks. Physics is an experimental science in which theoretical predictions are compared to experiments. In this definition, the term prediction plays a very important role: although the system is complex, it is still possible to get predictions for its behavior, but these predictions are of a probabilistic nature. Spin glasses, lattice gases or the Potts model are a few examples of complex systems in physics. Spin glasses and many frustrated antiferromagnets map exactly to computer science problems in the NP-hard class defined in Chapter 1. In Chapter 1 we discuss a common result from artificial intelligence (AI) which shows that there are some problems which are NP-complete, with the implication that these problems are difficult to solve. We introduce a few well known hard problems from computer science (Satisfiability, Coloring, Vertex Cover together with Maximum Independent Set and Number Partitioning) and then discuss their mapping to problems from physics. In Chapter 2 we provide a short review of combinatorial optimization algorithms and their applications to ground state problems in disordered systems. We discuss the cavity method initially developed for studying the Sherrington-Kirkpatrick model of spin glasses. We extend this model to the study of a specific case of spin glass on the Bethe

  8. A Branch and Cut algorithm for the container shipping network design problem

    DEFF Research Database (Denmark)

    Reinhardt, Line Blander; Kallehauge, Brian; Pisinger, David

    The network design problem in liner shipping is of increasing importance in a strongly competitive market where potential cost reductions can influence market share and profits significantly. In this paper the network design and fleet assignment problems are combined into a mixed integer linear...... programming model minimizing the overall cost. To better reflect the real-life situation we take into account the cost of transhipment, a heterogeneous fleet, route dependant capacities, and butterfly routes. To the best of our knowledge it is the first time an exact solution method to the problem considers...... transhipment cost. The problem is solved with branch-and-cut using clover and transhipment inequalities. Computational results are reported for instances with up to 15 ports....

  9. A minimum resource neural network framework for solving multiconstraint shortest path problems.

    Science.gov (United States)

    Zhang, Junying; Zhao, Xiaoxue; He, Xiaotao

    2014-08-01

    Characterized by using minimum hard (structural) and soft (computational) resources, a novel parameter-free minimal resource neural network (MRNN) framework is proposed for solving a wide range of single-source shortest path (SP) problems for various graph types. The problems are the k-shortest time path problems with any combination of three constraints: time, hop, and label constraints, and the graphs can be directed, undirected, or bidirected with symmetric and/or asymmetric traversal time, which can be real and time dependent. Isomorphic to the graph where the SP is to be sought, the network is activated by generating autowave at source neuron and the autowave travels automatically along the paths with the speed of a hop in an iteration. Properties of the network are studied, algorithms are presented, and computation complexity is analyzed. The framework guarantees globally optimal solutions of a series of problems during the iteration process of the network, which provides insight into why even the SP is still too long to be satisfied. The network facilitates very large scale integrated circuit implementation and adapt to very large scale problems due to its massively parallel processing and minimum resource utilization. When implemented in a sequentially processing computer, experiments on synthetic graphs, road maps of cities of the USA, and vehicle routing with time windows indicate that the MRNN is especially efficient for large scale sparse graphs and even dense graphs with some constraints, e.g., the CPU time taken and the iteration number used for the road maps of cities of the USA is even less than  ∼ 2% and 0.5% that of the Dijkstra's algorithm.

  10. Reactivity of lignin and problems of its oxidative destruction with peroxy reagents

    International Nuclear Information System (INIS)

    Demin, Valerii A; Shereshovets, Valerii V; Monakov, Yurii B

    1999-01-01

    Published data on reactivity and oxidation of lignin and model compounds with hydrogen peroxide, ozone and chlorine dioxide as well as on oxidative destruction of the sulfate pulp lignin with various reagents during bleaching are systematised and generalised. Concepts of lignin activation towards its selective oxidation and kinetic features of sulfate pulp oxidative delignification are considered. The bibliography includes 157 references.

  11. Elevance of PCDD/PCDF formation for the evaluation of POPs destruction technologies. PCB destruction over a TiO2-based V2O5-WO3 catalyst

    Energy Technology Data Exchange (ETDEWEB)

    Weber, R. [Tuebingen Univ. (Germany)

    2004-09-15

    PCDDs/PCDFs and PCBs in off-gas from municipal waste incinerators. At higher temperatures, the catalyst can also be used for POPs (and VOC) destruction. In this respect Hagenmaier investigated different oxidation catalysts for PCB destruction efficiency and found superior destruction properties for the TiO2-based V{sub 2}O{sub 5}-WO{sub 3} catalyst. PCB destruction exhibits a special challenge because they are PCDF precursors and n easily be oxidised into the more toxic PCDFs. Therefore, the formation of PCDDs/PCDFs during destruction of PCBs (POPs) is one important criterion for the evaluation of a PCB (POPs) destruction technology. The relevance of PCDF formation during destruction of PCBs was demonstrated e.g. for the supercritical water oxidation technology (SCWO), a technology listed in the highest rank of non-combustion technologies from the United Nations Environmental Programme (UNEP) and the United Nations Industrial Development Organization (UNIDO), where PCDFs were formed in the %-range. Therefore the present study evaluates the relevance of PCDF formation during catalytic destruction of PCBs on a TiO{sub 2}-based V{sub 2}O{sub 5}-WO{sub 3} catalyst. The study aims to give an example of how an assessment of PCDF formation as a function of operation conditions for PCB (POPs) destruction might be performed for the evaluation of a PCB (POPs) destruction technology. Further, the results demonstrate that for the catalytic oxidation over TiO{sub 2}-based V{sub 2}O{sub 5}-WO{sub 3} catalyst, the problem of PCDF formation can be overcome.

  12. Towards overcoming the Monte Carlo sign problem with tensor networks

    Directory of Open Access Journals (Sweden)

    Bañuls Mari Carmen

    2017-01-01

    Full Text Available The study of lattice gauge theories with Monte Carlo simulations is hindered by the infamous sign problem that appears under certain circumstances, in particular at non-zero chemical potential. So far, there is no universal method to overcome this problem. However, recent years brought a new class of non-perturbative Hamiltonian techniques named tensor networks, where the sign problem is absent. In previous work, we have demonstrated that this approach, in particular matrix product states in 1+1 dimensions, can be used to perform precise calculations in a lattice gauge theory, the massless and massive Schwinger model. We have computed the mass spectrum of this theory, its thermal properties and real-time dynamics. In this work, we review these results and we extend our calculations to the case of two flavours and non-zero chemical potential. We are able to reliably reproduce known analytical results for this model, thus demonstrating that tensor networks can tackle the sign problem of a lattice gauge theory at finite density.

  13. Optimizing the Treatment of Acute Duct-Destructive Pancreatitis

    Science.gov (United States)

    Zhakiev, Bazylbek S.; Karsakbayev, Uteugali G.; Kelimberdiev, Mersaid S.; ?uhamedgalieva, Bodagoz M.; K?nonenko, Aleksander F.

    2016-01-01

    The search for new methods for treating duct-destructive pancreatitis is a relevant problem. Endogenous intoxication and oxidative stress that accompany acute pancreatitis often progress even after surgery, which forces one to search for additional possibilities of preventing these severe consequences. This research studied the effect of small…

  14. Address Translation Problems in IMS Based Next Generation Networks

    Directory of Open Access Journals (Sweden)

    Balazs Godor

    2006-01-01

    Full Text Available The development of packed based multimedia networks reached a turning point when the ITU-T and the ETSIhave incorporated the IMS to the NGN. With the fast development of mobile communication more and more services andcontent are available. In contrast with fix network telephony both the services and the devices are personalized in the “mobileworld”. Services, known from the Internet - like e-mail, chat, browsing, presence, etc. – are already available via mobiledevices as well. The IMS originally wanted to exploit both the benefits of mobile networks and the fancy services of theInternet. But today it is already more than that. IMS is the core of the next generation telecommunication networks and abasis for fix-mobile convergent services. The fact however that IMS was originally a “mobile” standard, where IPv6 was notoddity generated some problems for the fix networks, where IPv4 is used. In this article I give an overview of these problemsand mention some solutions as well.

  15. miR-638 regulates gene expression networks associated with emphysematous lung destruction

    NARCIS (Netherlands)

    Christenson, Stephanie A.; Brandsma, Corry-Anke; Campbell, Joshua D.; Knight, Darryl A.; Pechkovsky, Dmitri V.; Hogg, James C.; Timens, Wim; Postma, Dirkje S.; Lenburg, Marc; Spira, Avrum

    2013-01-01

    Background: Chronic obstructive pulmonary disease (COPD) is a heterogeneous disease characterized by varying degrees of emphysematous lung destruction and small airway disease, each with distinct effects on clinical outcomes. There is little known about how microRNAs contribute specifically to the

  16. Consensus problem in directed networks of multi-agents via nonlinear protocols

    International Nuclear Information System (INIS)

    Liu Xiwei; Chen Tianping; Lu Wenlian

    2009-01-01

    In this Letter, the consensus problem via distributed nonlinear protocols for directed networks is investigated. Its dynamical behaviors are described by ordinary differential equations (ODEs). Based on graph theory, matrix theory and the Lyapunov direct method, some sufficient conditions of nonlinear protocols guaranteeing asymptotical or exponential consensus are presented and rigorously proved. The main contribution of this work is that for nonlinearly coupled networks, we generalize the results for undirected networks to directed networks. Consensus under pinning control technique is also developed here. Simulations are also given to show the validity of the theories.

  17. A non-penalty recurrent neural network for solving a class of constrained optimization problems.

    Science.gov (United States)

    Hosseini, Alireza

    2016-01-01

    In this paper, we explain a methodology to analyze convergence of some differential inclusion-based neural networks for solving nonsmooth optimization problems. For a general differential inclusion, we show that if its right hand-side set valued map satisfies some conditions, then solution trajectory of the differential inclusion converges to optimal solution set of its corresponding in optimization problem. Based on the obtained methodology, we introduce a new recurrent neural network for solving nonsmooth optimization problems. Objective function does not need to be convex on R(n) nor does the new neural network model require any penalty parameter. We compare our new method with some penalty-based and non-penalty based models. Moreover for differentiable cases, we implement circuit diagram of the new neural network. Copyright © 2015 Elsevier Ltd. All rights reserved.

  18. Nonconventional concrete hollow blocks evaluation by destructive and non-destructive testing

    Directory of Open Access Journals (Sweden)

    M.S. Rodrigues

    Full Text Available The aim of this study was to evaluate cementitious matrices properties by partial replacement of Portland cement by silica fume (SF or by rice husk ash (RHA, and their application in nonbearing hollow blocks, tested by destructive and non-destructive methods. The following mixtures were produced: reference (100% of Portland cement and Portland cement replacement (10% by mass with SF or RHA. The non-destructive testing showed that the highest values of UPV were obtained for SF-based blocks and RHA-based blocks. The destructive test showed better results for SF-based blocks, but there was no statistical difference between the RHA-based and control ones.

  19. The application of neural network techniques to magnetic and optical inverse problems

    International Nuclear Information System (INIS)

    Jones, H.V.

    2000-12-01

    The processing power of the computer has increased at unimaginable rates over the last few decades. However, even today's fastest computer can take several hours to find solutions to some mathematical problems; and there are instances where a high powered supercomputer may be impractical, with the need for near instant solutions just as important (such as in an on-line testing system). This led us to believe that such complex problems could be solved using a novel approach, whereby the system would have prior knowledge about the expected solutions through a process of learning. One method of approaching this kind of problem is through the use of machine learning. Just as a human can be trained and is able to learn from past experiences, a machine is can do just the same. This is the concept of neural networks. The research which was conducted involves the investigation of various neural network techniques, and their applicability to solve some known complex inverse problems in the field of magnetic and optical recording. In some cases a comparison is also made to more conventional methods of solving the problems, from which it was possible to outline some key advantages of using a neural network approach. We initially investigated the application of neural networks to transverse susceptibility data in order to determine anisotropy distributions. This area of research is proving to be very important, as it gives us information about the switching field distribution, which then determines the minimum transition width achievable in a medium, and affects the overwrite characteristics of the media. Secondly, we investigated a similar situation, but applied to an optical problem. This involved the determination of important compact disc parameters from the diffraction pattern of a laser from a disc. This technique was then intended for use in an on-line testing system. Finally we investigated another area of neural networks with the analysis of magnetisation maps and

  20. Asymmetric continuous-time neural networks without local traps for solving constraint satisfaction problems.

    Directory of Open Access Journals (Sweden)

    Botond Molnár

    Full Text Available There has been a long history of using neural networks for combinatorial optimization and constraint satisfaction problems. Symmetric Hopfield networks and similar approaches use steepest descent dynamics, and they always converge to the closest local minimum of the energy landscape. For finding global minima additional parameter-sensitive techniques are used, such as classical simulated annealing or the so-called chaotic simulated annealing, which induces chaotic dynamics by addition of extra terms to the energy landscape. Here we show that asymmetric continuous-time neural networks can solve constraint satisfaction problems without getting trapped in non-solution attractors. We concentrate on a model solving Boolean satisfiability (k-SAT, which is a quintessential NP-complete problem. There is a one-to-one correspondence between the stable fixed points of the neural network and the k-SAT solutions and we present numerical evidence that limit cycles may also be avoided by appropriately choosing the parameters of the model. This optimal parameter region is fairly independent of the size and hardness of instances, this way parameters can be chosen independently of the properties of problems and no tuning is required during the dynamical process. The model is similar to cellular neural networks already used in CNN computers. On an analog device solving a SAT problem would take a single operation: the connection weights are determined by the k-SAT instance and starting from any initial condition the system searches until finding a solution. In this new approach transient chaotic behavior appears as a natural consequence of optimization hardness and not as an externally induced effect.

  1. Network Analysis of Students' Use of Representations in Problem Solving

    Science.gov (United States)

    McPadden, Daryl; Brewe, Eric

    2016-03-01

    We present the preliminary results of a study on student use of representations in problem solving within the Modeling Instruction - Electricity and Magnetism (MI-E&M) course. Representational competence is a critical skill needed for students to develop a sophisticated understanding of college science topics and to succeed in their science courses. In this study, 70 students from the MI-E&M, calculus-based course were given a survey of 25 physics problem statements both pre- and post- instruction, covering both Newtonian Mechanics and Electricity and Magnetism (E&M). For each problem statement, students were asked which representations they would use in that given situation. We analyze the survey results through network analysis, identifying which representations are linked together in which contexts. We also compare the representation networks for those students who had already taken the first-semester Modeling Instruction Mechanics course and those students who had taken a non-Modeling Mechanics course.

  2. The time constrained multi-commodity network flow problem and its application to liner shipping network design

    DEFF Research Database (Denmark)

    Karsten, Christian Vad; Pisinger, David; Røpke, Stefan

    2015-01-01

    -commodity network flow problem with transit time constraints which puts limits on the duration of the transit of the commodities through the network. It is shown that for the particular application it does not increase the solution time to include the transit time constraints and that including the transit time...... is essential to offer customers a competitive product. © 2015 Elsevier Ltd. All rights reserved....

  3. Heuristic for solving capacitor allocation problems in electric energy radial distribution networks

    Directory of Open Access Journals (Sweden)

    Maria A. Biagio

    2012-04-01

    Full Text Available The goal of the capacitor allocation problem in radial distribution networks is to minimize technical losses with consequential positive impacts on economic and environmental areas. The main objective is to define the size and location of the capacitors while considering load variations in a given horizon. The mathematical formulation for this planning problem is given by an integer nonlinear mathematical programming model that demands great computational effort to be solved. With the goal of solving this problem, this paper proposes a methodology that is composed of heuristics and Tabu Search procedures. The methodology presented explores network system characteristics of the network system reactive loads for identifying regions where procedures of local and intensive searches should be performed. A description of the proposed methodology and an analysis of computational results obtained which are based on several test systems including actual systems are presented. The solutions reached are as good as or better than those indicated by well referenced methodologies. The technique proposed is simple in its use and does not require calibrating an excessive amount of parameters, making it an attractive alternative for companies involved in the planning of radial distribution networks.

  4. A polynomial time algorithm for solving the maximum flow problem in directed networks

    International Nuclear Information System (INIS)

    Tlas, M.

    2015-01-01

    An efficient polynomial time algorithm for solving maximum flow problems has been proposed in this paper. The algorithm is basically based on the binary representation of capacities; it solves the maximum flow problem as a sequence of O(m) shortest path problems on residual networks with nodes and m arcs. It runs in O(m"2r) time, where is the smallest integer greater than or equal to log B , and B is the largest arc capacity of the network. A numerical example has been illustrated using this proposed algorithm.(author)

  5. Computation of optimal transport and related hedging problems via penalization and neural networks

    OpenAIRE

    Eckstein, Stephan; Kupper, Michael

    2018-01-01

    This paper presents a widely applicable approach to solving (multi-marginal, martingale) optimal transport and related problems via neural networks. The core idea is to penalize the optimization problem in its dual formulation and reduce it to a finite dimensional one which corresponds to optimizing a neural network with smooth objective function. We present numerical examples from optimal transport, martingale optimal transport, portfolio optimization under uncertainty and generative adversa...

  6. THEORETICAL AND EXPERIMENTAL ASPECTS OF PLASTIC DEFORMATION AND DESTRUCTION OF ROCKS

    OpenAIRE

    A. V. Zhabko

    2018-01-01

    The urgency of the problem. The main process in mining is the process of destruction of rocks, so the establishment of laws and criteria for plastic deformation and destruction of rocks is the most important and fundamental object. Purpose of the work. The work is devoted to the establishment of laws of plastic deformation of rocks (solids). Methods of research. Analytical and experimental research methods are widely used in this work. Results. On the basis of the earlier studies, wh...

  7. On generalizations of network design problems with degree bounds

    NARCIS (Netherlands)

    Bansal, N.; Khandekar, R.; Könemann, J.; Nagarajan, V.; Peis, B.

    2013-01-01

    Iterative rounding and relaxation have arguably become the method of choice in dealing with unconstrained and constrained network design problems. In this paper we extend the scope of the iterative relaxation method in two directions: (1) by handling more complex degree constraints in the minimum

  8. On generalizations of network design problems with degree bounds

    NARCIS (Netherlands)

    N. Bansal (Nikhil); R. Khandekar; J. Könemann (Jochen); V. Nagarajan; B. Peis

    2013-01-01

    htmlabstractIterative rounding and relaxation have arguably become the method of choice in dealing with unconstrained and constrained network design problems. In this paper we extend the scope of the iterative relaxation method in two directions: (1) by handling more complex degree constraints in

  9. Neural Network-Based Resistance Spot Welding Control and Quality Prediction

    Energy Technology Data Exchange (ETDEWEB)

    Allen, J.D., Jr.; Ivezic, N.D.; Zacharia, T.

    1999-07-10

    This paper describes the development and evaluation of neural network-based systems for industrial resistance spot welding process control and weld quality assessment. The developed systems utilize recurrent neural networks for process control and both recurrent networks and static networks for quality prediction. The first section describes a system capable of both welding process control and real-time weld quality assessment, The second describes the development and evaluation of a static neural network-based weld quality assessment system that relied on experimental design to limit the influence of environmental variability. Relevant data analysis methods are also discussed. The weld classifier resulting from the analysis successfldly balances predictive power and simplicity of interpretation. The results presented for both systems demonstrate clearly that neural networks can be employed to address two significant problems common to the resistance spot welding industry, control of the process itself, and non-destructive determination of resulting weld quality.

  10. A hopfield-like artificial neural network for solving inverse radiation transport problems

    International Nuclear Information System (INIS)

    Lee, Sang Hoon

    1997-02-01

    In this thesis, we solve inverse radiation transport problems by an Artificial Neural Network(ANN) approach. ANNs have many interesting properties such as nonlinear, parallel, and distributed processing. Some of the promising applications of ANNs are optimization, image and signal processing, system control, etc. In some optimization problems, Hopfield Neural Network(HNN) which has one-layered and fully interconnected neurons with feed-back topology showed that it worked well with acceptable fault tolerance and efficiency. The identification of radioactive source in a medium with a limited number of external detectors is treated as an inverse radiation transport problem in this work. This kind of inverse problem is usually ill-posed and severely under-determined; however, its applications are very useful in many fields including medical diagnosis and nondestructive assay of nuclear materials. Therefore, it is desired to develop efficient and robust solution algorithms. Firstly, we study a representative ANN model which has learning ability and fault tolerance, i.e., feed-forward neural network. It has an error backpropagation learning algorithm processed by reducing error in learning patterns that are usually results of test or calculation. Although it has enough fault tolerance and efficiency, a major obstacle is 'curse of dimensionality'--required number of learning patterns and learning time increase exponentially proportional to the problem size. Therefore, in this thesis, this type of ANN is used as benchmarking the reliability of the solution. Secondly, another approach for solving inverse problems, a modified version of HNN is proposed. When diagonal elements of the interconnection matrix are not zero, HNN may become unstable. However, most problems including this identification problem contain non-zero diagonal elements when programmed on neural networks. According to Soulie et al., discrete random iterations could produce the stable minimum state

  11. Symposium Connects Government Problems with State of the Art Network Science Research

    Science.gov (United States)

    2015-10-16

    Symposium Connects Government Problems with State-of-the- Art Network Science Research By Rajmonda S. Caceres and Benjamin A. Miller Network...the US Gov- ernment, and match these with the state-of-the- art models and techniques developed in the network science research community. Since its... science has grown significantly in the last several years as a field at the intersec- tion of mathematics, computer science , social science , and engineering

  12. A note on the consensus finding problem in communication networks with switching topologies

    KAUST Repository

    Haskovec, Jan

    2014-01-01

    In this note, we discuss the problem of consensus finding in communication networks of agents with dynamically switching topologies. In particular, we consider the case of directed networks with unbalanced matrices of communication rates. We

  13. Some dynamic resource allocation problems in wireless networks

    Science.gov (United States)

    Berry, Randall

    2001-07-01

    We consider dynamic resource allocation problems that arise in wireless networking. Specifically transmission scheduling problems are studied in cases where a user can dynamically allocate communication resources such as transmission rate and power based on current channel knowledge as well as traffic variations. We assume that arriving data is stored in a transmission buffer, and investigate the trade-off between average transmission power and average buffer delay. A general characterization of this trade-off is given and the behavior of this trade-off in the regime of asymptotically large buffer delays is explored. An extension to a more general utility based quality of service definition is also discussed.

  14. Modeling and simulation of different and representative engineering problems using Network Simulation Method.

    Science.gov (United States)

    Sánchez-Pérez, J F; Marín, F; Morales, J L; Cánovas, M; Alhama, F

    2018-01-01

    Mathematical models simulating different and representative engineering problem, atomic dry friction, the moving front problems and elastic and solid mechanics are presented in the form of a set of non-linear, coupled or not coupled differential equations. For different parameters values that influence the solution, the problem is numerically solved by the network method, which provides all the variables of the problems. Although the model is extremely sensitive to the above parameters, no assumptions are considered as regards the linearization of the variables. The design of the models, which are run on standard electrical circuit simulation software, is explained in detail. The network model results are compared with common numerical methods or experimental data, published in the scientific literature, to show the reliability of the model.

  15. Reduction of the dimension of neural network models in problems of pattern recognition and forecasting

    Science.gov (United States)

    Nasertdinova, A. D.; Bochkarev, V. V.

    2017-11-01

    Deep neural networks with a large number of parameters are a powerful tool for solving problems of pattern recognition, prediction and classification. Nevertheless, overfitting remains a serious problem in the use of such networks. A method of solving the problem of overfitting is proposed in this article. This method is based on reducing the number of independent parameters of a neural network model using the principal component analysis, and can be implemented using existing libraries of neural computing. The algorithm was tested on the problem of recognition of handwritten symbols from the MNIST database, as well as on the task of predicting time series (rows of the average monthly number of sunspots and series of the Lorentz system were used). It is shown that the application of the principal component analysis enables reducing the number of parameters of the neural network model when the results are good. The average error rate for the recognition of handwritten figures from the MNIST database was 1.12% (which is comparable to the results obtained using the "Deep training" methods), while the number of parameters of the neural network can be reduced to 130 times.

  16. 9 CFR 51.6 - Destruction of animals; time limit for destruction of animals.

    Science.gov (United States)

    2010-01-01

    ... 9 Animals and Animal Products 1 2010-01-01 2010-01-01 false Destruction of animals; time limit for destruction of animals. 51.6 Section 51.6 Animals and Animal Products ANIMAL AND PLANT HEALTH INSPECTION... ANIMALS DESTROYED BECAUSE OF BRUCELLOSIS Indemnity for Cattle, Bison, and Swine § 51.6 Destruction of...

  17. A problem of finding an acceptable variant in generalized project networks

    Directory of Open Access Journals (Sweden)

    David Blokh

    2005-01-01

    Full Text Available A project network often has some activities or groups of activities which can be performed at different stages of the project. Then, the problem of finding an optimal/acceptable time or/and optimal/acceptable order of such an activity or a group of activities arises. Such a problem emerges, in particular, in house-building management when the beginnings of some activities may vary in time or/and order. We consider a mathematical formulation of the problem, show its computational complexity, and describe an algorithm for solving the problem.

  18. Post-conflict struggles as networks of problems: A network analysis of trauma, daily stressors and psychological distress among Sri Lankan war survivors.

    Science.gov (United States)

    Jayawickreme, Nuwan; Mootoo, Candace; Fountain, Christine; Rasmussen, Andrew; Jayawickreme, Eranda; Bertuccio, Rebecca F

    2017-10-01

    A growing body of literature indicates that the mental distress experienced by survivors of war is a function of both experienced trauma and stressful life events. However, the majority of these studies are limited in that they 1) employ models of psychological distress that emphasize underlying latent constructs and do not allow researchers to examine the unique associations between particular symptoms and various stressors; and 2) use one or more measures that were not developed for that particular context and thus may exclude key traumas, stressful life events and symptoms of psychopathology. The current study addresses both these limitations by 1) using a novel conceptual model, network analysis, which assumes that symptoms covary with each other not because they stem from a latent construct, but rather because they represent meaningful relationships between the symptoms; and 2) employing a locally developed measure of experienced trauma, stressful life problems and symptoms of psychopathology. Over the course of 2009-2011, 337 survivors of the Sri Lankan civil war were administered the Penn-RESIST-Peradeniya War Problems Questionnaire (PRPWPQ). Network analysis revealed that symptoms of psychopathology, problems pertaining to lack of basic needs, and social problems were central to the network relative to experienced trauma and other types of problems. After controlling for shared associations, social problems in particular were the most central, significantly more so than traumatic events and family problems. Several particular traumatic events, stressful life events and symptoms of psychopathology that were central to the network were also identified. Discussion emphasizes the utility of such network models to researchers and practitioners determining how to spend limited resources in the most impactful way possible. Copyright © 2017 Elsevier Ltd. All rights reserved.

  19. Combined Mechanical Destruction and Alkaline Pretreatment of Wheat Straw for Enhanced Enzymatic Saccharification

    Directory of Open Access Journals (Sweden)

    Qianqian Wang

    2014-09-01

    Full Text Available Wheat straw was pretreated by combined mechanical destruction and alkaline pretreatments to enhance enzymatic saccharification. Four strategies were employed to evaluate the potential of wheat straw as a feedstock for fermentable sugar production. The effects of the pretreatments on the substrate morphology, size distribution, chemical composition, and cellulose crystallinity, along with the subsequent enzymatic digestibility, were investigated. Optical microscope images showed that mechanical pretreatment alone resulted in poor fiber defibrillation, wherein samples mostly consisted of rigid fiber bundles, while integrated mechanical destruction and alkaline pretreatment led to relatively good fiber defibrillation. Low temperature NaOH/urea pretreatment can fibrillate the rigid fiber bundles into a relatively loose network and alter the structure of the treated substrate to make cellulose more accessible. The glucan conversion rates were 77% and 95% for integrated mechanical destruction and alkaline pretreatments and mechanical destruction followed by low temperature NaOH/urea and ammonium/urea pretreatments, respectively, after 72 h of enzymatic hydrolysis with enzyme loadings of 10 FPU cellulase per g of oven-dry substrate.

  20. Modeling and simulation of different and representative engineering problems using Network Simulation Method

    Science.gov (United States)

    2018-01-01

    Mathematical models simulating different and representative engineering problem, atomic dry friction, the moving front problems and elastic and solid mechanics are presented in the form of a set of non-linear, coupled or not coupled differential equations. For different parameters values that influence the solution, the problem is numerically solved by the network method, which provides all the variables of the problems. Although the model is extremely sensitive to the above parameters, no assumptions are considered as regards the linearization of the variables. The design of the models, which are run on standard electrical circuit simulation software, is explained in detail. The network model results are compared with common numerical methods or experimental data, published in the scientific literature, to show the reliability of the model. PMID:29518121

  1. Nurses' perceptions of conflict as constructive or destructive.

    Science.gov (United States)

    Kim, Wonsun Sunny; Nicotera, Anne M; McNulty, Julie

    2015-09-01

    The aim of this study was to examine nurses' perceptions of constructive and destructive conflicts and their management among nurses. Conflict among nurses is common and has been associated with lack of collaboration, lack of communication and disruptive behaviour, with the potential to have negative impact teamwork. However, unlike the broader social science literature, positive views of conflict are scarce in the nursing literature. Given the various functions of conflict and the high stakes of ineffective conflict management in nursing, it is necessary to examine how nurses understand both sides of conflict: constructive and destructive. A qualitative descriptive design. Data were collected from 34 full time nurses as part of a conflict skills training course offered over 6 months beginning in October 2009. Each participant was asked to write a weekly journal about conflicts in his/her work place. Data yielded 163 entries (82 classified as constructive and 81 as destructive). Results showed that quality patient care and cooperative communication contributed to the perception that conflict is constructive in nature. The central underlying themes in nurses' perceptions of destructive conflict were time constraints, role conflict and power differences that are not managed through communication. This article helps to identify nursing perceptions of constructive and destructive conflict and to understand complexities nurses face during their interactions with other nurses, physicians and patients. The insight that constructive views are related to constructive processes provides an excellent opportunity for an educational intervention, so that we can educate nurses to analyse problems and learn how to manage conflict with effective collaborative processes. © 2015 John Wiley & Sons Ltd.

  2. A network approach to predict pathogenic genes for Fusarium graminearum.

    Science.gov (United States)

    Liu, Xiaoping; Tang, Wei-Hua; Zhao, Xing-Ming; Chen, Luonan

    2010-10-04

    Fusarium graminearum is the pathogenic agent of Fusarium head blight (FHB), which is a destructive disease on wheat and barley, thereby causing huge economic loss and health problems to human by contaminating foods. Identifying pathogenic genes can shed light on pathogenesis underlying the interaction between F. graminearum and its plant host. However, it is difficult to detect pathogenic genes for this destructive pathogen by time-consuming and expensive molecular biological experiments in lab. On the other hand, computational methods provide an alternative way to solve this problem. Since pathogenesis is a complicated procedure that involves complex regulations and interactions, the molecular interaction network of F. graminearum can give clues to potential pathogenic genes. Furthermore, the gene expression data of F. graminearum before and after its invasion into plant host can also provide useful information. In this paper, a novel systems biology approach is presented to predict pathogenic genes of F. graminearum based on molecular interaction network and gene expression data. With a small number of known pathogenic genes as seed genes, a subnetwork that consists of potential pathogenic genes is identified from the protein-protein interaction network (PPIN) of F. graminearum, where the genes in the subnetwork are further required to be differentially expressed before and after the invasion of the pathogenic fungus. Therefore, the candidate genes in the subnetwork are expected to be involved in the same biological processes as seed genes, which imply that they are potential pathogenic genes. The prediction results show that most of the pathogenic genes of F. graminearum are enriched in two important signal transduction pathways, including G protein coupled receptor pathway and MAPK signaling pathway, which are known related to pathogenesis in other fungi. In addition, several pathogenic genes predicted by our method are verified in other pathogenic fungi, which

  3. A network approach to predict pathogenic genes for Fusarium graminearum.

    Directory of Open Access Journals (Sweden)

    Xiaoping Liu

    Full Text Available Fusarium graminearum is the pathogenic agent of Fusarium head blight (FHB, which is a destructive disease on wheat and barley, thereby causing huge economic loss and health problems to human by contaminating foods. Identifying pathogenic genes can shed light on pathogenesis underlying the interaction between F. graminearum and its plant host. However, it is difficult to detect pathogenic genes for this destructive pathogen by time-consuming and expensive molecular biological experiments in lab. On the other hand, computational methods provide an alternative way to solve this problem. Since pathogenesis is a complicated procedure that involves complex regulations and interactions, the molecular interaction network of F. graminearum can give clues to potential pathogenic genes. Furthermore, the gene expression data of F. graminearum before and after its invasion into plant host can also provide useful information. In this paper, a novel systems biology approach is presented to predict pathogenic genes of F. graminearum based on molecular interaction network and gene expression data. With a small number of known pathogenic genes as seed genes, a subnetwork that consists of potential pathogenic genes is identified from the protein-protein interaction network (PPIN of F. graminearum, where the genes in the subnetwork are further required to be differentially expressed before and after the invasion of the pathogenic fungus. Therefore, the candidate genes in the subnetwork are expected to be involved in the same biological processes as seed genes, which imply that they are potential pathogenic genes. The prediction results show that most of the pathogenic genes of F. graminearum are enriched in two important signal transduction pathways, including G protein coupled receptor pathway and MAPK signaling pathway, which are known related to pathogenesis in other fungi. In addition, several pathogenic genes predicted by our method are verified in other

  4. PROACTIVE APPROACH TO THE INCIDENT AND PROBLEM MANAGEMENT IN COMMUNICATION NETWORKS

    Directory of Open Access Journals (Sweden)

    Vjeran Strahonja

    2007-06-01

    Full Text Available Proactive approach to communication network maintenance has the capability of enhancing the integrity and reliability of communication networks, as well as of reducing maintenance costs and overall number of incidents. This paper presents approaches to problem and incident prevention with the help of root-cause analysis, aligning that with the goal to foresee software performance. Implementation of proactive approach requires recognition of enterprise's current level of maintenance better insights into available approaches and tools, as well as their comparison, interoperability, integration and further development. The approach we are proposing and elaborating in this paper lies on the construction of a metamodel of the problem management of information technology, particularly the proactive problem management. The metamodel is derived from the original ITIL specification and presented in an object-oriented fashion by using structure (class diagrams conform to UML notation. Based on current research, appropriate metrics based on the concept of Key Performance Indicators is suggested.

  5. Destructiveness in Political Discourse

    Directory of Open Access Journals (Sweden)

    Яна Александровна Волкова

    2016-12-01

    Full Text Available Destructiveness is among the fundamental discourse categories that play a significant role in the organization of communicative interaction and define the pragmatics of discourse; its study helps to understand some mechanisms and principles of communication, identify strategies and tactics used by a destructive communicative personality. The relevance of this study is determined by the increasing aggressiveness in various types of discourse, and, accordingly, by the need to extend the knowledge of destructive behavior of a communicative personality. The study is based on the theory of discourse-analysis and theory of destructiveness (Z. Harris, T. van Dijk, A. Buss, E. Fromm, D. Ponton, K. Hacker, R. Wodak. N. Arutyunova, V. Karasik, M. Makarov, E. Sheigal et al. Developing the theory of destructiveness and relying on Erich Fromm’s research (1973, we specify the concept of “destructiveness” in relation to the political discourse and compare it with the related concept of aggressiveness. The paper analyses the category of destructiveness in modern US political discourse, using excerpts from the speeches of the candidates for presidency of 2016. Particular attention is paid to the dominant destructive intention - to harm the reputation of the opponent and reduce his political chances, as well as to the functions of verbal aggression: on the one hand - to discredit the opponent, bring accusations, on the other hand - to poison the audience mind against him/her and arouse the feeling of danger posed by a political opponent. The analysis of verbal and nonverbal means of destructiveness in the US political discourse is carried out. The article concludes that abusive remarks of politicians do not result from spontaneous emotional outburst, but from an elaborated destructive strategy where the agonistic nature of political discourse stipulates the use of instrumental aggression (Buss, 1971 for the sake of the conquest of power, lowering the

  6. Route Selection Problem Based on Hopfield Neural Network

    Directory of Open Access Journals (Sweden)

    N. Kojic

    2013-12-01

    Full Text Available Transport network is a key factor of economic, social and every other form of development in the region and the state itself. One of the main conditions for transport network development is the construction of new routes. Often, the construction of regional roads is dominant, since the design and construction in urban areas is quite limited. The process of analysis and planning the new roads is a complex process that depends on many factors (the physical characteristics of the terrain, the economic situation, political decisions, environmental impact, etc. and can take several months. These factors directly or indirectly affect the final solution, and in combination with project limitations and requirements, sometimes can be mutually opposed. In this paper, we present one software solution that aims to find Pareto optimal path for preliminary design of the new roadway. The proposed algorithm is based on many different factors (physical and social with the ability of their increase. This solution is implemented using Hopfield's neural network, as a kind of artificial intelligence, which has shown very good results for solving complex optimization problems.

  7. Solving the Weighted Constraint Satisfaction Problems Via the Neural Network Approach

    Directory of Open Access Journals (Sweden)

    Khalid Haddouch

    2016-09-01

    Full Text Available A wide variety of real world optimization problems can be modelled as Weighted Constraint Satisfaction Problems (WCSPs. In this paper, we model this problem in terms of in original 0-1 quadratic programming subject to leaner constraints. View it performance, we use the continuous Hopfield network to solve the obtained model basing on original energy function. To validate our model, we solve several instance of benchmarking WCSP. In this regard, our approach recognizes the optimal solution of the said instances.

  8. A Coral Reef Algorithm Based on Learning Automata for the Coverage Control Problem of Heterogeneous Directional Sensor Networks.

    Science.gov (United States)

    Li, Ming; Miao, Chunyan; Leung, Cyril

    2015-12-04

    Coverage control is one of the most fundamental issues in directional sensor networks. In this paper, the coverage optimization problem in a directional sensor network is formulated as a multi-objective optimization problem. It takes into account the coverage rate of the network, the number of working sensor nodes and the connectivity of the network. The coverage problem considered in this paper is characterized by the geographical irregularity of the sensed events and heterogeneity of the sensor nodes in terms of sensing radius, field of angle and communication radius. To solve this multi-objective problem, we introduce a learning automata-based coral reef algorithm for adaptive parameter selection and use a novel Tchebycheff decomposition method to decompose the multi-objective problem into a single-objective problem. Simulation results show the consistent superiority of the proposed algorithm over alternative approaches.

  9. The simplest problem in the collective dynamics of neural networks: is synchrony stable?

    International Nuclear Information System (INIS)

    Timme, Marc; Wolf, Fred

    2008-01-01

    For spiking neural networks we consider the stability problem of global synchrony, arguably the simplest non-trivial collective dynamics in such networks. We find that even this simplest dynamical problem—local stability of synchrony—is non-trivial to solve and requires novel methods for its solution. In particular, the discrete mode of pulsed communication together with the complicated connectivity of neural interaction networks requires a non-standard approach. The dynamics in the vicinity of the synchronous state is determined by a multitude of linear operators, in contrast to a single stability matrix in conventional linear stability theory. This unusual property qualitatively depends on network topology and may be neglected for globally coupled homogeneous networks. For generic networks, however, the number of operators increases exponentially with the size of the network. We present methods to treat this multi-operator problem exactly. First, based on the Gershgorin and Perron–Frobenius theorems, we derive bounds on the eigenvalues that provide important information about the synchronization process but are not sufficient to establish the asymptotic stability or instability of the synchronous state. We then present a complete analysis of asymptotic stability for topologically strongly connected networks using simple graph-theoretical considerations. For inhibitory interactions between dissipative (leaky) oscillatory neurons the synchronous state is stable, independent of the parameters and the network connectivity. These results indicate that pulse-like interactions play a profound role in network dynamical systems, and in particular in the dynamics of biological synchronization, unless the coupling is homogeneous and all-to-all. The concepts introduced here are expected to also facilitate the exact analysis of more complicated dynamical network states, for instance the irregular balanced activity in cortical neural networks

  10. Post-destructive eye surgery, associated depression at Sekuru Kaguvi Hospital Eye Unit, Zimbabwe: Pilot Study

    Directory of Open Access Journals (Sweden)

    M. M. Kawome

    2013-12-01

    Full Text Available Destructive eye surgery is associated with more complications than just loss of visual functions of the eye and aesthetics. Currently there is very little published literature on post-destructive eye surgery associated depression. Zimbabwe has been experiencing a surge in the rate of destructive eye surgery done at the National Tertiary Eye Unit. This situation could be churning out lots of unrecognized depressed clients into the community who require assistance in one form or another. Objectives: To determine the prevalence of post-destructive eye surgery associated depression among patients attending Sekuru Kaguvi Hospital Eye Unit and assess if the current management protocol of patients undergoing destructive eye surgery at the Eye Unit addresses the problem adequately. Methods: A cross-sectional study of 28 randomly selected patients who had destructive eye surgeries at Sekuru Kaguvi Hospital was conducted over five months from 1st March 2012 to end of July 2012. A structured questionnaire containing 15 questions on the following items: gender, age, diagnosis, surgical procedure done, expectations before and after surgery, adequacy of counseling given and involvement of family was used to collect data. Nine questions to assess depression were adapted from the Patient Health Questionnaire (PHQ-9. Setting:  The study was conducted at SekuruKaguvi Hospital Eye Unit, Parirenyatwa Group of Hospitals in Harare. Results:  Twenty-eight patients who underwent destructive eye surgery during the study period were selected using systematic random sampling. The gender ratio was 1:1 and the mean age was 38.7 years with a range from 24 to 65 years. Fifty percent of the patients in the study had orbital exenteration while the rest had enucleation (14% and evisceration (36%. Twenty-eight percent of the study population had depression. Conclusion: Destructive eye surgery is frequently associated with depression and our current management protocol of

  11. A Formal Model and Verification Problems for Software Defined Networks

    Directory of Open Access Journals (Sweden)

    V. A. Zakharov

    2013-01-01

    Full Text Available Software-defined networking (SDN is an approach to building computer networks that separate and abstract data planes and control planes of these systems. In a SDN a centralized controller manages a distributed set of switches. A set of open commands for packet forwarding and flow-table updating was defined in the form of a protocol known as OpenFlow. In this paper we describe an abstract formal model of SDN, introduce a tentative language for specification of SDN forwarding policies, and set up formally model-checking problems for SDN.

  12. Storage Solutions for Power Quality Problems in Cyprus Electricity Distribution Network

    Directory of Open Access Journals (Sweden)

    Andreas Poullikkas

    2014-01-01

    Full Text Available In this work, a prediction of the effects of introducing energy storage systems on the network stability of the distribution network of Cyprus and a comparison in terms of cost with a traditional solution is carried out. In particular, for solving possible overvoltage problems, several scenarios of storage units' installation are used and compared with the alternative solution of extra cable connection between the node with the lowest voltage and the node with the highest voltage of the distribution network. For the comparison, a case study of a typical LV distribution feeder in the power system of Cyprus is used. The results indicated that the performance indicator of each solution depends on the type, the size and the position of installation of the storage unit. Also, as more storage units are installed the better the performance indicator and the more attractive is the investment in storage units to solve power quality problems in the distribution network. In the case where the technical requirements in voltage limitations according to distribution regulations are satisfied with one storage unit, the installation of an additional storage unit will only increase the final cost. The best solution, however, still remains the alternative solution of extra cable connection between the node with the lowest voltage and the node with the highest voltage of the distribution network, due to the lower investment costs compared to that of the storage units.

  13. Bi and tri-objective optimization in the deterministic network interdiction problem

    International Nuclear Information System (INIS)

    Rocco S, Claudio M.; Emmanuel Ramirez-Marquez, Jose; Salazar A, Daniel E.

    2010-01-01

    Solution approaches to the deterministic network interdiction problem have previously been developed for optimizing a single figure-of-merit of the network configuration (i.e. flow that can be transmitted between a source node and a sink node for a fixed network design) under constraints related to limited amount of resources available to interdict network links. These approaches work under the assumption that: (1) nominal capacity of each link is completely reduced when interdicted and (2) there is a single criterion to optimize. This paper presents a newly developed evolutionary algorithm that for the first time allows solving multi-objective optimization models for the design of network interdiction strategies that take into account a variety of figures-of-merit. The algorithm provides an approximation to the optimal Pareto frontier using: (a) techniques in Monte Carlo simulation to generate potential network interdiction strategies, (b) graph theory to analyze strategies' maximum source-sink flow and (c) an evolutionary search that is driven by the probability that a link will belong to the optimal Pareto set. Examples for different sizes of networks and network behavior are used throughout the paper to illustrate and validate the approach.

  14. A simulated annealing approach for redesigning a warehouse network problem

    Science.gov (United States)

    Khairuddin, Rozieana; Marlizawati Zainuddin, Zaitul; Jiun, Gan Jia

    2017-09-01

    Now a day, several companies consider downsizing their distribution networks in ways that involve consolidation or phase-out of some of their current warehousing facilities due to the increasing competition, mounting cost pressure and taking advantage on the economies of scale. Consequently, the changes on economic situation after a certain period of time require an adjustment on the network model in order to get the optimal cost under the current economic conditions. This paper aimed to develop a mixed-integer linear programming model for a two-echelon warehouse network redesign problem with capacitated plant and uncapacitated warehouses. The main contribution of this study is considering capacity constraint for existing warehouses. A Simulated Annealing algorithm is proposed to tackle with the proposed model. The numerical solution showed the model and method of solution proposed was practical.

  15. Indirect Self-Destructiveness and Emotional Intelligence.

    Science.gov (United States)

    Tsirigotis, Konstantinos

    2016-06-01

    While emotional intelligence may have a favourable influence on the life and psychological and social functioning of the individual, indirect self-destructiveness exerts a rather negative influence. The aim of this study has been to explore possible relations between indirect self-destructiveness and emotional intelligence. A population of 260 individuals (130 females and 130 males) aged 20-30 (mean age of 24.5) was studied by using the Polish version of the chronic self-destructiveness scale and INTE, i.e., the Polish version of the assessing emotions scale. Indirect self-destructiveness has significant correlations with all variables of INTE (overall score, factor I, factor II), and these correlations are negative. The intensity of indirect self-destructiveness differentiates significantly the height of the emotional intelligence and vice versa: the height of the emotional intelligence differentiates significantly the intensity of indirect self-destructiveness. Indirect self-destructiveness has negative correlations with emotional intelligence as well as its components: the ability to recognize emotions and the ability to utilize emotions. The height of emotional intelligence differentiates the intensity of indirect self-destructiveness, and vice versa: the intensity of indirect self-destructiveness differentiates the height of emotional intelligence. It seems advisable to use emotional intelligence in the prophylactic and therapeutic work with persons with various types of disorders, especially with the syndrome of indirect self-destructiveness.

  16. Study on personnel qualification for non-destructive tests in the field of reactor safety

    International Nuclear Information System (INIS)

    Trusch, K.; Wuestenberg, H.

    1977-01-01

    The training system for non-destructive testing is described, and the available and necessary personnel is analyzed; the personnel required for reactor safety problems is treated separately. On this basis, the subjects discussed in the study - available personnel, personnel requirements, training, training requirements, and suggestions for realisation - are treated in a general manner to begin with and afterwards with a view to specific problems of reactor safety. The methods employed are adapted to this situation. To obtain the necessary empirical data, questionnaires were set up and distributed, and experts in selected business companies and institutions were interviewed who work in the field of reactor safety or do same training in non-destructive testing. (orig.) [de

  17. An Effective Recommender Algorithm for Cold-Start Problem in Academic Social Networks

    Directory of Open Access Journals (Sweden)

    Vala Ali Rohani

    2014-01-01

    Full Text Available Abundance of information in recent years has become a serious challenge for web users. Recommender systems (RSs have been often utilized to alleviate this issue. RSs prune large information spaces to recommend the most relevant items to users by considering their preferences. Nonetheless, in situations where users or items have few opinions, the recommendations cannot be made properly. This notable shortcoming in practical RSs is called cold-start problem. In the present study, we propose a novel approach to address this problem by incorporating social networking features. Coined as enhanced content-based algorithm using social networking (ECSN, the proposed algorithm considers the submitted ratings of faculty mates and friends besides user’s own preferences. The effectiveness of ECSN algorithm was evaluated by implementing it in MyExpert, a newly designed academic social network (ASN for academics in Malaysia. Real feedbacks from live interactions of MyExpert users with the recommended items are recorded for 12 consecutive weeks in which four different algorithms, namely, random, collaborative, content-based, and ECSN were applied every three weeks. The empirical results show significant performance of ECSN in mitigating the cold-start problem besides improving the prediction accuracy of recommendations when compared with other studied recommender algorithms.

  18. The Information Aspect of Extremism and Terrorism and the Destructive Trends in the Mass Media

    Directory of Open Access Journals (Sweden)

    E V Nekrasova

    2013-12-01

    Full Text Available The article is devoted to the problem of destructive trends in modern Russian mass media as well as to the information component in the activities of extremist and terrorist organizations. The destructive trends in the mass media manifest themselves in the escalation of animosity, aggression, creation of the cult of violence and xenophobia moods. Terrorist organizations use the mass media for their own purposes: they create the atmosphere of fear and tension in society, recruit new followers, mainly among the youth, which is a serious problem. It is important to use the positive potential of the mass media to counteract extremism and terrorism.

  19. A Novel Linear Programming Formulation of Maximum Lifetime Routing Problem in Wireless Sensor Networks

    DEFF Research Database (Denmark)

    Cetin, Bilge Kartal; Prasad, Neeli R.; Prasad, Ramjee

    2011-01-01

    In wireless sensor networks, one of the key challenge is to achieve minimum energy consumption in order to maximize network lifetime. In fact, lifetime depends on many parameters: the topology of the sensor network, the data aggregation regime in the network, the channel access schemes, the routing...... protocols, and the energy model for transmission. In this paper, we tackle the routing challenge for maximum lifetime of the sensor network. We introduce a novel linear programming approach to the maximum lifetime routing problem. To the best of our knowledge, this is the first mathematical programming...

  20. Statistical learning problem of artificial neural network to control roofing process

    Directory of Open Access Journals (Sweden)

    Lapidus Azariy

    2017-01-01

    Full Text Available Now software developed on the basis of artificial neural networks (ANN has been actively implemented in construction companies to support decision-making in organization and management of construction processes. ANN learning is the main stage of its development. A key question for supervised learning is how many number of training examples we need to approximate the true relationship between network inputs and output with the desired accuracy. Also designing of ANN architecture is related to learning problem known as “curse of dimensionality”. This problem is important for the study of construction process management because of the difficulty to get training data from construction sites. In previous studies the authors have designed a 4-layer feedforward ANN with a unit model of 12-5-4-1 to approximate estimation and prediction of roofing process. This paper presented the statistical learning side of created ANN with simple-error-minimization algorithm. The sample size to efficient training and the confidence interval of network outputs defined. In conclusion the authors predicted successful ANN learning in a large construction business company within a short space of time.

  1. Distance learning, problem based learning and dynamic knowledge networks.

    Science.gov (United States)

    Giani, U; Martone, P

    1998-06-01

    This paper is an attempt to develop a distance learning model grounded upon a strict integration of problem based learning (PBL), dynamic knowledge networks (DKN) and web tools, such as hypermedia documents, synchronous and asynchronous communication facilities, etc. The main objective is to develop a theory of distance learning based upon the idea that learning is a highly dynamic cognitive process aimed at connecting different concepts in a network of mutually supporting concepts. Moreover, this process is supposed to be the result of a social interaction that has to be facilitated by the web. The model was tested by creating a virtual classroom of medical and nursing students and activating a learning session on the concept of knowledge representation in health sciences.

  2. A neural network approach to breast cancer diagnosis as a constraint satisfaction problem

    International Nuclear Information System (INIS)

    Tourassi, Georgia D.; Markey, Mia K.; Lo, Joseph Y.; Floyd, Carey E. Jr.

    2001-01-01

    A constraint satisfaction neural network (CSNN) approach is proposed for breast cancer diagnosis using mammographic and patient history findings. Initially, the diagnostic decision to biopsy was formulated as a constraint satisfaction problem. Then, an associative memory type neural network was applied to solve the problem. The proposed network has a flexible, nonhierarchical architecture that allows it to operate not only as a predictive tool but also as an analysis tool for knowledge discovery of association rules. The CSNN was developed and evaluated using a database of 500 nonpalpable breast lesions with definitive histopathological diagnosis. The CSNN diagnostic performance was evaluated using receiver operating characteristic analysis (ROC). The results of the study showed that the CSNN ROC area index was 0.84±0.02. The CSNN predictive performance is competitive with that achieved by experienced radiologists and backpropagation artificial neural networks (BP-ANNs) presented before. Furthermore, the study illustrates how CSNN can be used as a knowledge discovery tool overcoming some of the well-known limitations of BP-ANNs

  3. Non destructive testing of green parts in powder metallurgy

    International Nuclear Information System (INIS)

    Accary, A.

    1979-01-01

    The non destructive testing of green parts is potentially advantageous by making possible a lowering of the material and energy consumption as well as the production of parts with a 100% reliability. After a survey of the possible methods and of the defects to be detected it is shown that the goal can be achieved using a 'blind detection' method and that the difficulty of the problem depends on the size and shape of the part to be controled. The gravimetric, dimensional, γ absorption and thermal diffusivity methods are then examined. It is concluded that a unit control is paying only if it allows to enter the high reliability part market. Used statisticaly the non destructive testing of green parts can possibly lead to savings on materials and energy [fr

  4. Proceedings of the national workshop on non destructive evaluation of structures

    International Nuclear Information System (INIS)

    2013-01-01

    In spite of the care and best efforts to improve the quality of structures, problems do occur, raising alarm. This makes doubtful about the understanding. Distresses in the structures start immediately after construction and these are often concealed under the external finishes. A defect takes time to manifest itself. To add further, structures remain unattended for several years. As it is uneconomical to replace the assets before the intended service life by another capital investment, it is essential to periodically monitor the health of structures throughout its life. Success of both, the construction and restoration work depends on right diagnosis of the problem thorough proper testing techniques. Non destructive evaluation is one of the reliable methods for the scientific assessment of health and prediction of residual service life of structure. The workshop shall provide a platform to students, engineers and professionals for acquaintance with the current state of art technology of non-destructive evaluation techniques. Papers relevant to INIS are indexed separately

  5. Mediated electrochemical hazardous waste destruction

    International Nuclear Information System (INIS)

    Hickman, R.G.; Farmer, J.C.; Wang, F.T.

    1992-03-01

    There are few permitted processes for mixed waste (radioactive plus chemically hazardous) treatment. We are developing an electrochemical process, based upon mediated electrochemical oxidation (MEO), that converts toxic organic components of mixed waste to water, carbon dioxide, and chloride or chloride precipitates. Aggressive oxidizer ions such as Ag 2+ , Co 3+ , or Fe 3+ are produced at an anode. These can attack organic molecules directly, and may also produce hydroxyl free radicals that promote destruction. Solid and liquid radioactive waste streams containing only inorganic radionuclide forms may be treated with existing technology and prepared for final disposal. The coulombic efficiency of the process has been determined, as well as the destruction efficiency for ethylene glycol, a surrogate waste. In addition, hazardous organic materials are becoming very expensive to dispose of and when they are combined with transuranic radioactive elements no processes are presently permitted. Mediated electrochemical oxidation is an ambient- temperature aqueous-phase process that can be used to oxidize organic components of mixed wastes. Problems associated with incineration, such as high-temperature volatilization of radionuclides, are avoided. Historically, Ag(II) has been used as a mediator in this process. Fe(III) and Co(III) are attractive alternatives to Ag(II) since they form soluble chlorides during the destruction of chlorinated solvents. Furthermore, silver itself is toxic heavy metal. Quantitative data have been obtained for the complete oxidation of ethylene glycol by Fe(III) and Co(III). Though ethylene glycol is a nonhalogenated organic, these data have enabled us to make direct comparisons of activities of Fe(III) and Co(III) with Ag(II). Very good quantitative data for the oxidation of ethylene glycol by Ag(II) had already been collected

  6. Networks in Social Policy Problems

    Science.gov (United States)

    Vedres, Balázs; Scotti, Marco

    2012-08-01

    1. Introduction M. Scotti and B. Vedres; Part I. Information, Collaboration, Innovation: The Creative Power of Networks: 2. Dissemination of health information within social networks C. Dhanjal, S. Blanchemanche, S. Clemençon, A. Rona-Tas and F. Rossi; 3. Scientific teams and networks change the face of knowledge creation S. Wuchty, J. Spiro, B. F. Jones and B. Uzzi; 4. Structural folds: the innovative potential of overlapping groups B. Vedres and D. Stark; 5. Team formation and performance on nanoHub: a network selection challenge in scientific communities D. Margolin, K. Ognyanova, M. Huang, Y. Huang and N. Contractor; Part II. Influence, Capture, Corruption: Networks Perspectives on Policy Institutions: 6. Modes of coordination of collective action: what actors in policy making? M. Diani; 7. Why skewed distributions of pay for executives is the cause of much grief: puzzles and few answers so far B. Kogut and J.-S. Yang; 8. Networks of institutional capture: a case of business in the State apparatus E. Lazega and L. Mounier; 9. The social and institutional structure of corruption: some typical network configurations of corruption transactions in Hungary Z. Szántó, I. J. Tóth and S. Varga; Part III. Crisis, Extinction, World System Change: Network Dynamics on a Large Scale: 10. How creative elements help the recovery of networks after crisis: lessons from biology A. Mihalik, A. S. Kaposi, I. A. Kovács, T. Nánási, R. Palotai, Á. Rák, M. S. Szalay-Beko and P. Csermely; 11. Networks and globalization policies D. R. White; 12. Network science in ecology: the structure of ecological communities and the biodiversity question A. Bodini, S. Allesina and C. Bondavalli; 13. Supply security in the European natural gas pipeline network M. Scotti and B. Vedres; 14. Conclusions and outlook A.-L. Barabási; Index.

  7. Quadratic head loss approximations for optimisation problems in water supply networks

    NARCIS (Netherlands)

    Pecci, Filippo; Abraham, E.; I, Stoianov

    2017-01-01

    This paper presents a novel analysis of the accuracy of quadratic approximations for the Hazen–Williams (HW) head loss formula, which enables the control of constraint violations in optimisation problems for water supply networks. The two smooth polynomial approximations considered here minimise the

  8. Non-destructive inservice inspections

    International Nuclear Information System (INIS)

    Kauppinen, P.; Sarkimo, M.; Lahdenperae, K.

    1998-01-01

    In order to assess the possible damages occurring in the components and structures of operating nuclear power plants during service the main components and structures are periodically inspected by non-destructive testing techniques. The reliability of non-destructive testing techniques applied in these inservice inspections is of major importance because the decisions concerning the needs for repair of components are mainly based on the results of inspections. One of the targets of this research program has been to improve the reliability of non-destructive testing. This has been addressed in the sub-projects which are briefly summarised here. (author)

  9. Destruction of organochlorated compounds and CFCs by catalytic hydrodechloration; Destruccion de compuestos organoclorados y CFCs mediante hidrodecloracion catalitica

    Energy Technology Data Exchange (ETDEWEB)

    Ordonez Garcia, S.; Sastre Andres, H.; Diez Sanz, F. V.

    1998-12-01

    The destruction of organohalogenated compounds ( for example chlorinated solvents, PCBs and CFCs) is a very serious environmental problems. Catalytic hydrodechlorination has shown to be potentially efficient method for the destruction of these compounds. In this technique the halogenated compound reacts with hydrogen, tielding a non-chlorinated compound (environmentally harmless) and hydrogen-chloride. In this article, different set-ups and catalysts employed in the catalytic hydrogechlorination were described. Finally, some applications of this technique to the treatment of industrial effluents, such as the destruction of chlorinated solvents (as trichloroethylene o tetrachloromethane), conversion of CFCs into HCFCs, destruction of PCBs and treatment of water polluted with chlorinated pesticides. (Author) 28 refs.

  10. Method of Geometric Connected Disk Cover Problem for UAV realy network deployment

    Directory of Open Access Journals (Sweden)

    Chuang Liu

    2017-01-01

    Full Text Available Aiming at the problem of the effective connectivity of a large number of mobile combat units in the future aeronautic swarm operation, this paper proposes an idea of using UAV(Unmanned Aerial Vehicle to build, and studies the deployment of the network. User coverage and network connectivity are important for a relay network planning which are studied separately in traditional ways. In order to effectively combine these two factors while the network’s survivability is taken into account. Firstly, the concept of node aggregation degree is proposed. Secondly, a performance evaluation parameter for UAV relay network is proposed based on node aggregation degree, then analyzes the lack of deterministic deployment and presents one a PSO (VFA-PSO deployment algorithm based on virtual force. Finally, compared with the existing algorithms, the validity and stability of the algorithm are verified. The experimental results show that the VFA-PSO algorithm can effectively improve the network coverage and the survivability of the network under the premise of ensuring the network connectivity, and has better deployment effect.

  11. Photolytic AND Catalytic Destruction of Organic Waste Water Pollutants

    Science.gov (United States)

    Torosyan, V. F.; Torosyan, E. S.; Kryuchkova, S. O.; Gromov, V. E.

    2017-01-01

    The system: water supply source - potable and industrial water - wastewater - sewage treatment - water supply source is necessary for water supply and efficient utilization of water resources. Up-to-date technologies of waste water biological treatment require for special microorganisms, which are technologically complex and expensive but unable to solve all the problems. Application of photolytic and catalytically-oxidizing destruction is quite promising. However, the most reagents are strong oxidizers in catalytic oxidation of organic substances and can initiate toxic substance generation. Methodic and scientific approaches to assess bread making industry influence on the environment have been developed in this paper in order to support forecasting and taking technological decisions concerning reduction of this influence. Destructive methods have been tested: ultra violet irradiation and catalytic oxidation for extraction of organic compounds from waste water by natural reagents.

  12. Towards a Versatile Problem Diagnosis Infrastructure for LargeWireless Sensor Networks

    NARCIS (Netherlands)

    Iwanicki, Konrad; Steen, van Maarten

    2007-01-01

    In this position paper, we address the issue of durable maintenance of a wireless sensor network, which will be crucial if the vision of large, long-lived sensornets is to become reality. Durable maintenance requires tools for diagnosing and fixing occurring problems, which can range from

  13. An Improved Routing Optimization Algorithm Based on Travelling Salesman Problem for Social Networks

    Directory of Open Access Journals (Sweden)

    Naixue Xiong

    2017-06-01

    Full Text Available A social network is a social structure, which is organized by the relationships or interactions between individuals or groups. Humans link the physical network with social network, and the services in the social world are based on data and analysis, which directly influence decision making in the physical network. In this paper, we focus on a routing optimization algorithm, which solves a well-known and popular problem. Ant colony algorithm is proposed to solve this problem effectively, but random selection strategy of the traditional algorithm causes evolution speed to be slow. Meanwhile, positive feedback and distributed computing model make the algorithm quickly converge. Therefore, how to improve convergence speed and search ability of algorithm is the focus of the current research. The paper proposes the improved scheme. Considering the difficulty about searching for next better city, new parameters are introduced to improve probability of selection, and delay convergence speed of algorithm. To avoid the shortest path being submerged, and improve sensitive speed of finding the shortest path, it updates pheromone regulation formula. The results show that the improved algorithm can effectively improve convergence speed and search ability for achieving higher accuracy and optimal results.

  14. A Bayesian network approach to the database search problem in criminal proceedings

    Science.gov (United States)

    2012-01-01

    Background The ‘database search problem’, that is, the strengthening of a case - in terms of probative value - against an individual who is found as a result of a database search, has been approached during the last two decades with substantial mathematical analyses, accompanied by lively debate and centrally opposing conclusions. This represents a challenging obstacle in teaching but also hinders a balanced and coherent discussion of the topic within the wider scientific and legal community. This paper revisits and tracks the associated mathematical analyses in terms of Bayesian networks. Their derivation and discussion for capturing probabilistic arguments that explain the database search problem are outlined in detail. The resulting Bayesian networks offer a distinct view on the main debated issues, along with further clarity. Methods As a general framework for representing and analyzing formal arguments in probabilistic reasoning about uncertain target propositions (that is, whether or not a given individual is the source of a crime stain), this paper relies on graphical probability models, in particular, Bayesian networks. This graphical probability modeling approach is used to capture, within a single model, a series of key variables, such as the number of individuals in a database, the size of the population of potential crime stain sources, and the rarity of the corresponding analytical characteristics in a relevant population. Results This paper demonstrates the feasibility of deriving Bayesian network structures for analyzing, representing, and tracking the database search problem. The output of the proposed models can be shown to agree with existing but exclusively formulaic approaches. Conclusions The proposed Bayesian networks allow one to capture and analyze the currently most well-supported but reputedly counter-intuitive and difficult solution to the database search problem in a way that goes beyond the traditional, purely formulaic expressions

  15. Empirical confirmation of creative destruction from world trade data.

    Directory of Open Access Journals (Sweden)

    Peter Klimek

    Full Text Available We show that world trade network datasets contain empirical evidence that the dynamics of innovation in the world economy indeed follows the concept of creative destruction, as proposed by J.A. Schumpeter more than half a century ago. National economies can be viewed as complex, evolving systems, driven by a stream of appearance and disappearance of goods and services. Products appear in bursts of creative cascades. We find that products systematically tend to co-appear, and that product appearances lead to massive disappearance events of existing products in the following years. The opposite-disappearances followed by periods of appearances-is not observed. This is an empirical validation of the dominance of cascading competitive replacement events on the scale of national economies, i.e., creative destruction. We find a tendency that more complex products drive out less complex ones, i.e., progress has a direction. Finally we show that the growth trajectory of a country's product output diversity can be understood by a recently proposed evolutionary model of Schumpeterian economic dynamics.

  16. Empirical confirmation of creative destruction from world trade data.

    Science.gov (United States)

    Klimek, Peter; Hausmann, Ricardo; Thurner, Stefan

    2012-01-01

    We show that world trade network datasets contain empirical evidence that the dynamics of innovation in the world economy indeed follows the concept of creative destruction, as proposed by J.A. Schumpeter more than half a century ago. National economies can be viewed as complex, evolving systems, driven by a stream of appearance and disappearance of goods and services. Products appear in bursts of creative cascades. We find that products systematically tend to co-appear, and that product appearances lead to massive disappearance events of existing products in the following years. The opposite-disappearances followed by periods of appearances-is not observed. This is an empirical validation of the dominance of cascading competitive replacement events on the scale of national economies, i.e., creative destruction. We find a tendency that more complex products drive out less complex ones, i.e., progress has a direction. Finally we show that the growth trajectory of a country's product output diversity can be understood by a recently proposed evolutionary model of Schumpeterian economic dynamics.

  17. Weapons of mass destruction - current security threat

    International Nuclear Information System (INIS)

    Durdiak, J.; Gafrik, A.; Pulis, P.; Susko, M.

    2005-01-01

    between chemical and biological weapons of mass destruction and environment substances used to destroy fores and agriculture. The biological weapons destructive requirements are defined here along with characteristics of individual diseases and properties of the most important toxins. Attention is paid to the problems of biological weapons' proliferation, efficient control as well as the risks resulting from the advances in gene engineering and biotechnology. The opportunities that biological mass destruction devices present to potential terrorists are consequently analyzed along with the possibilities of protection against attacks using biological agents. The analysis focuses on the protection in the armed forces setting and dealing with the consequences of an eventual biological attack. The conclusion deals with the questions of biological disarmament and the risks the democratic states would have. to face in case of a terrorist attack using biological weapons. (Authors)

  18. A Branch-and-Price Approach to the Feeder Network Design Problem

    DEFF Research Database (Denmark)

    Santini, Alberto; Plum, Christian Edinger Munk; Røpke, Stefan

    2017-01-01

    In this paper we consider the problem of designing a container liner shipping feeder network. The designer has to choose which port to serve during many rotations that start and end at a central hub. Many operational characteristics are considered, such as variable leg-by-leg speeds and cargo...

  19. The need to qualify Non Destructive Tests (NDT) has been recognized for many years in the European countries engaged in nuclear power generation

    International Nuclear Information System (INIS)

    Walczak, M.; Wojas, M.

    2008-01-01

    The European Network for Inspection Qualification, ENIQ, which groups the major part of the nuclear power plant operators in the European Union and in the Applicant Countries, has developed the European methodology for Qualification of Non Destructive Tests. As qualification of NDT is nowadays a standard method in the nuclear industry and in other industries. CEN (European Committee for Standardization) Technical Committee 138 '' Non Destructive Testing '' has established a Working Group, which is responsible for developing a Standard document detailing the CEN Methodology for the qualification of Non Destructive Tests applicable to all industries carrying out Non-Destructive Tests. This Standard document sets out basic principles and provides recommendations and general guidelines for carrying out qualification of NDT. It describes a methodology for qualification of Non-Destructive Tests, applicable to all NDT methods and considers qualification of equipment, procedure and personnel training. This paper presents a short background of the European Methodology for Qualification of Non-Destructive Tests and the Standard document CEN/TR 14748 '' Non-destructive testing - Methodology for qualification of non-destructive tests ''. (author)

  20. A service flow model for the liner shipping network design problem

    DEFF Research Database (Denmark)

    Plum, Christian Edinger Munk; Pisinger, David; Sigurd, Mikkel M.

    2014-01-01

    . The formulation alleviates issues faced by arc flow formulations with regards to handling multiple calls to the same port. A problem which has not been fully dealt with earlier by LSNDP formulations. Multiple calls are handled by introducing service nodes, together with port nodes in a graph representation...... of the network and a penalty for not flowed cargo. The model can be used to design liner shipping networks to utilize a container carrier’s assets efficiently and to investigate possible scenarios of changed market conditions. The model is solved as a Mixed Integer Program. Results are presented for the two...

  1. Tight bounds on the size of neural networks for classification problems

    Energy Technology Data Exchange (ETDEWEB)

    Beiu, V. [Los Alamos National Lab., NM (United States); Pauw, T. de [Universite Catholique de Louvain, Louvain-la-Neuve (Belgium). Dept. de Mathematique

    1997-06-01

    This paper relies on the entropy of a data-set (i.e., number-of-bits) to prove tight bounds on the size of neural networks solving a classification problem. First, based on a sequence of geometrical steps, the authors constructively compute an upper bound of O(mn) on the number-of-bits for a given data-set - here m is the number of examples and n is the number of dimensions (i.e., R{sup n}). This result is used further in a nonconstructive way to bound the size of neural networks which correctly classify that data-set.

  2. On the Role of Situational Stressors in the Disruption of Global Neural Network Stability during Problem Solving.

    Science.gov (United States)

    Liu, Mengting; Amey, Rachel C; Forbes, Chad E

    2017-12-01

    When individuals are placed in stressful situations, they are likely to exhibit deficits in cognitive capacity over and above situational demands. Despite this, individuals may still persevere and ultimately succeed in these situations. Little is known, however, about neural network properties that instantiate success or failure in both neutral and stressful situations, particularly with respect to regions integral for problem-solving processes that are necessary for optimal performance on more complex tasks. In this study, we outline how hidden Markov modeling based on multivoxel pattern analysis can be used to quantify unique brain states underlying complex network interactions that yield either successful or unsuccessful problem solving in more neutral or stressful situations. We provide evidence that brain network stability and states underlying synchronous interactions in regions integral for problem-solving processes are key predictors of whether individuals succeed or fail in stressful situations. Findings also suggested that individuals utilize discriminate neural patterns in successfully solving problems in stressful or neutral situations. Findings overall highlight how hidden Markov modeling can provide myriad possibilities for quantifying and better understanding the role of global network interactions in the problem-solving process and how the said interactions predict success or failure in different contexts.

  3. Feasibility Study of Non-Destructive Techniques to Measure Corrosion in SAVY Containers

    Energy Technology Data Exchange (ETDEWEB)

    Davenport, Matthew Nicholas [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2016-07-15

    Stainless Steel SAVY containers are used to transport and store nuclear material. They are prone to interior corrosion in the presence of certain chemicals and a low-oxygen environment. SAVY containers also have relatively thin walls to reduce their weight, making their structural integrity more vulnerable to the effects of corrosion. A nondestructive evaluation system that finds and monitors corrosion within containers in use would improve safety conditions and preclude hazards. Non-destructive testing can determine whether oxidation or corrosion is occurring inside the SAVY containers, and there are a variety of non-destructive testing methods that may be viable. The feasibility study described will objectively decide which method best fits the requirements of the facility and the problem. To improve efficiency, the containers cannot be opened during the non-destructive examination. The chosen technique should also be user-friendly and relatively quick to apply. It must also meet facility requirements regarding wireless technology and maintenance. A feasibility study is an objective search for a new technology or product to solve a particular problem. First, the design, technical, and facility feasibility requirements are chosen and ranked in order of importance. Then each technology considered is given a score based upon a standard ranking system. The technology with the highest total score is deemed the best fit for a certain application.

  4. Performance of a genetic algorithm for solving the multi-objective, multimodel transportation network design problem

    NARCIS (Netherlands)

    Brands, Ties; van Berkum, Eric C.

    2014-01-01

    The optimization of infrastructure planning in a multimodal network is defined as a multi-objective network design problem, with accessibility, use of urban space by parking, operating deficit and climate impact as objectives. Decision variables are the location of park and ride facilities, train

  5. Shortest path problem on a grid network with unordered intermediate points

    Science.gov (United States)

    Saw, Veekeong; Rahman, Amirah; Eng Ong, Wen

    2017-10-01

    We consider a shortest path problem with single cost factor on a grid network with unordered intermediate points. A two stage heuristic algorithm is proposed to find a feasible solution path within a reasonable amount of time. To evaluate the performance of the proposed algorithm, computational experiments are performed on grid maps of varying size and number of intermediate points. Preliminary results for the problem are reported. Numerical comparisons against brute forcing show that the proposed algorithm consistently yields solutions that are within 10% of the optimal solution and uses significantly less computation time.

  6. The Effect of Localized Damage on the Electrical Conductivity of Bare Carbon Fiber Tow and its Use as a Non-Destructive Evaluation Tool for Composite Overwrapped Pressure Vessels

    Science.gov (United States)

    Wentzel, Daniel

    2015-01-01

    Composite materials are beneficial because of their high specific strength and low weight. Safety, Destructive testing and destructive testing, Non-Destructive Testing (NDT) and Non-Destructive Evaluation (NDE). Problem: Neither NDT nor NDE can provide sufficient data to determine life expectancy or quantify the damage state of a composite material.

  7. Non-Destructive Testing for Concrete Structure

    International Nuclear Information System (INIS)

    Tengku Sarah Tengku Amran; Noor Azreen Masenwat; Mohamad Pauzi Ismail

    2015-01-01

    Nondestructive testing (NDT) is a technique to determine the integrity of a material, component or structure. It is essential in the inspection of alteration, repair and new construction in the building industry. There are a number of non-destructive testing techniques that can be applied to determine the integrity of concrete in a completed structure. Each has its own advantages and limitations. For concrete, these problems relate to strength, cracking, dimensions, delamination, and inhomogeneities. NDT is reasonably good and reliable tool to measure the property of concrete which also gives the fair indication of the compressive strength development. This paper discussed the concrete inspection using combined methods of NDT. (author)

  8. Vibration Based Damage Assessment of a Cantilever using a Neural Network

    DEFF Research Database (Denmark)

    Kirkegaard, Poul Henning; Rytter, A.

    In this paper the possibility of using a Multilayer Perceptron (MLP) network trained with with the Backpropagation Algorithm as a non-destructive damage assessment technique to locate and quantify a damage in structures is investigated.......In this paper the possibility of using a Multilayer Perceptron (MLP) network trained with with the Backpropagation Algorithm as a non-destructive damage assessment technique to locate and quantify a damage in structures is investigated....

  9. Problems With Deployment of Multi-Domained, Multi-Homed Mobile Networks

    Science.gov (United States)

    Ivancic, William D.

    2008-01-01

    This document describes numerous problems associated with deployment of multi-homed mobile platforms consisting of multiple networks and traversing large geographical areas. The purpose of this document is to provide insight to real-world deployment issues and provide information to groups that are addressing many issues related to multi-homing, policy-base routing, route optimization and mobile security - particularly those groups within the Internet Engineering Task Force.

  10. A comparison between destructive and non-destructive techniques in determining coating thickness

    Science.gov (United States)

    Haider, F. I.; Suryanto; Ani, M. H.; Mahmood, M. H.

    2018-01-01

    Measuring coating thickness is an important part in research works related to coating applications. In general, techniques for measuring coating thickness may be divided into destructive and non-destructive methods which are commonly used depending on the applications. The objective of this study is to compare two methods measuring the coating thickness of electroplating copper coating on the austenitic stainless-steel substrate. The electroplating was carried out in a solution containing 200 g/L CuSO4, 100 g/L H2SO4 at room temperature and current of 40mA/cm2 during 20, 40, 60, 80 and 100 mins as coating periods. And the coating thickness was measured by two methods, cross sectional analysis as a destructive technique and weight gain as a non-destructive technique. The results show that at 20 mins coating time interval, the thickness measured by cross sectional method was 16.67 μm and by weight gain method was 17.37 μm, with difference of 0.7 μm and percentage error of 4.11%. This error increased to 5.27% at 100mins time interval, where the values of the thickness measured by cross sectional and weight gain were 86.33 μm and 81.9 μm respectively, and the difference was 4.43 μm. Moreover, though the weight gain method is fast and gives the indication for the termination of a coating process, information regarding the uniformity, porosity and the presence of cracks cannot be obtained. On the other hand, determining the coating thickness using destructive method will damage the sample.

  11. Reliability of lifeline networks under seismic hazard

    International Nuclear Information System (INIS)

    Selcuk, A. Sevtap; Yuecemen, M. Semih

    1999-01-01

    Lifelines, such as pipelines, transportation, communication and power transmission systems, are networks which extend spatially over large geographical regions. The quantification of the reliability (survival probability) of a lifeline under seismic threat requires attention, as the proper functioning of these systems during or after a destructive earthquake is vital. In this study, a lifeline is idealized as an equivalent network with the capacity of its elements being random and spatially correlated and a comprehensive probabilistic model for the assessment of the reliability of lifelines under earthquake loads is developed. The seismic hazard that the network is exposed to is described by a probability distribution derived by using the past earthquake occurrence data. The seismic hazard analysis is based on the 'classical' seismic hazard analysis model with some modifications. An efficient algorithm developed by Yoo and Deo (Yoo YB, Deo N. A comparison of algorithms for terminal pair reliability. IEEE Transactions on Reliability 1988; 37: 210-215) is utilized for the evaluation of the network reliability. This algorithm eliminates the CPU time and memory capacity problems for large networks. A comprehensive computer program, called LIFEPACK is coded in Fortran language in order to carry out the numerical computations. Two detailed case studies are presented to show the implementation of the proposed model

  12. Simplified neural networks for solving linear least squares and total least squares problems in real time.

    Science.gov (United States)

    Cichocki, A; Unbehauen, R

    1994-01-01

    In this paper a new class of simplified low-cost analog artificial neural networks with on chip adaptive learning algorithms are proposed for solving linear systems of algebraic equations in real time. The proposed learning algorithms for linear least squares (LS), total least squares (TLS) and data least squares (DLS) problems can be considered as modifications and extensions of well known algorithms: the row-action projection-Kaczmarz algorithm and/or the LMS (Adaline) Widrow-Hoff algorithms. The algorithms can be applied to any problem which can be formulated as a linear regression problem. The correctness and high performance of the proposed neural networks are illustrated by extensive computer simulation results.

  13. Using Metaheuristic Algorithms for Solving a Hub Location Problem: Application in Passive Optical Network Planning

    Directory of Open Access Journals (Sweden)

    Masoud Rabbani

    2017-02-01

    Full Text Available Nowadays, fiber-optic due to having greater bandwidth and being more efficient compared with other similar technologies, are counted as one the most important tools for data transfer. In this article, an integrated mathematical model for a three-level fiber-optic distribution network with consideration of simultaneous backbone and local access networks is presented in which the backbone network is a ring and the access networks has a star-star topology. The aim of the model is to determine the location of the central offices and splitters, how connections are made between central offices, and allocation of each demand node to a splitter or central office in a way that the wiring cost of fiber optical and concentrator installation are minimized. Moreover, each user’s desired bandwidth should be provided efficiently. Then, the proposed model is validated by GAMS software in small-sized problems, afterwards the model is solved by two meta-heuristic methods including differential evolution (DE and genetic algorithm (GA in large-scaled problems and the results of two algorithms are compared with respect to computational time and objective function obtained value. Finally, a sensitivity analysis is provided. Keyword: Fiber-optic, telecommunication network, hub-location, passive splitter, three-level network.

  14. The Inverse Contagion Problem (ICP) vs.. Predicting site contagion in real time, when network links are not observable

    Science.gov (United States)

    Mushkin, I.; Solomon, S.

    2017-10-01

    We study the inverse contagion problem (ICP). As opposed to the direct contagion problem, in which the network structure is known and the question is when each node will be contaminated, in the inverse problem the links of the network are unknown but a sequence of contagion histories (the times when each node was contaminated) is observed. We consider two versions of the ICP: The strong problem (SICP), which is the reconstruction of the network and has been studied before, and the weak problem (WICP), which requires "only" the prediction (at each time step) of the nodes that will be contaminated at the next time step (this is often the real life situation in which a contagion is observed and predictions are made in real time). Moreover, our focus is on analyzing the increasing accuracy of the solution, as a function of the number of contagion histories already observed. For simplicity, we discuss the simplest (deterministic and synchronous) contagion dynamics and the simplest solution algorithm, which we have applied to different network types. The main result of this paper is that the complex problem of the convergence of the ICP for a network can be reduced to an individual property of pairs of nodes: the "false link difficulty". By definition, given a pair of unlinked nodes i and j, the difficulty of the false link (i,j) is the probability that in a random contagion history, the nodes i and j are not contaminated at the same time step (or at consecutive time steps). In other words, the "false link difficulty" of a non-existing network link is the probability that the observations during a random contagion history would not rule out that link. This probability is relatively straightforward to calculate, and in most instances relies only on the relative positions of the two nodes (i,j) and not on the entire network structure. We have observed the distribution of false link difficulty for various network types, estimated it theoretically and confronted it

  15. PEROXIDE DESTRUCTION TESTING FOR THE 200 AREA EFFLUENT TREATMENT FACILITY

    International Nuclear Information System (INIS)

    Halgren, D.L.

    2010-01-01

    The hydrogen peroxide decomposer columns at the 200 Area Effluent Treatment Facility (ETF) have been taken out of service due to ongoing problems with particulate fines and poor destruction performance from the granular activated carbon (GAC) used in the columns. An alternative search was initiated and led to bench scale testing and then pilot scale testing. Based on the bench scale testing three manganese dioxide based catalysts were evaluated in the peroxide destruction pilot column installed at the 300 Area Treated Effluent Disposal Facility. The ten inch diameter, nine foot tall, clear polyvinyl chloride (PVC) column allowed for the same six foot catalyst bed depth as is in the existing ETF system. The flow rate to the column was controlled to evaluate the performance at the same superficial velocity (gpm/ft 2 ) as the full scale design flow and normal process flow. Each catalyst was evaluated on peroxide destruction performance and particulate fines capacity and carryover. Peroxide destruction was measured by hydrogen peroxide concentration analysis of samples taken before and after the column. The presence of fines in the column headspace and the discharge from carryover was generally assessed by visual observation. All three catalysts met the peroxide destruction criteria by achieving hydrogen peroxide discharge concentrations of less than 0.5 mg/L at the design flow with inlet peroxide concentrations greater than 100 mg/L. The Sud-Chemie T-2525 catalyst was markedly better in the minimization of fines and particle carryover. It is anticipated the T-2525 can be installed as a direct replacement for the GAC in the peroxide decomposer columns. Based on the results of the peroxide method development work the recommendation is to purchase the T-2525 catalyst and initially load one of the ETF decomposer columns for full scale testing.

  16. Options for the destruction of chemical weapons and management of the associated risks.

    Science.gov (United States)

    Manley, Ron G

    2006-09-01

    The destruction of chemical weapons is a hazardous operation. The degree of hazard posed, however, is not uniform and is dependent on the specific chemical agent and the configuration of the weapon or bulk storage vessel in which it is contained. For example, a highly volatile nerve agent in an explosively configured munition, such as a rocket, poses a very different hazard from that of a bulk storage container of viscous mustard gas. Equally the handling of recovered, often highly corroded, World War (WW)I or WWII chemical munitions will pose a very different hazard from that associated with dealing with modern chemical weapons stored under the appropriate conditions. Over the years, a number of technologies have been developed for the destruction of chemical weapons. Each has its advantages and disadvantages. None of them provide a universal solution to the problem. When assessing options for the destruction of these weapons and the management of the associated risks, therefore, it is important to give due consideration and weight to these differences. To ensure that the destruction technology selected takes due account of them and that the resulting overall risk assessment accurately reflects the actual risks involved.

  17. Destructive distillation

    Energy Technology Data Exchange (ETDEWEB)

    Cosden, S; Cosden, J S

    1937-09-08

    A means and process are described for the destructive distillation of solid carbonaceous materials in which the process comprises charging the material, in a finely divided condition into a stream of hot combustion gases, and allows the hot gases to act pyrolytically on the organic compounds contained in the material, separating the volatile liberated constituents from residuary constituents. Hot reaction gases are generated by fuel ignition means in a generator and are immediately intermingled with comminuted carbonaceous material from a hopper, in a narrow conduit. The mixture of material and reaction fluid is then passed through an elongated confined path, which is exteriorly heated by the combustion chamber of the furnace, where the destructive distillation is effected. Volatile and solid constituents are separated in the chamber, and the volatile constituents are fractionated and condensed.

  18. A Multi-Stage Reverse Logistics Network Problem by Using Hybrid Priority-Based Genetic Algorithm

    Science.gov (United States)

    Lee, Jeong-Eun; Gen, Mitsuo; Rhee, Kyong-Gu

    Today remanufacturing problem is one of the most important problems regarding to the environmental aspects of the recovery of used products and materials. Therefore, the reverse logistics is gaining become power and great potential for winning consumers in a more competitive context in the future. This paper considers the multi-stage reverse Logistics Network Problem (m-rLNP) while minimizing the total cost, which involves reverse logistics shipping cost and fixed cost of opening the disassembly centers and processing centers. In this study, we first formulate the m-rLNP model as a three-stage logistics network model. Following for solving this problem, we propose a Genetic Algorithm pri (GA) with priority-based encoding method consisting of two stages, and introduce a new crossover operator called Weight Mapping Crossover (WMX). Additionally also a heuristic approach is applied in the 3rd stage to ship of materials from processing center to manufacturer. Finally numerical experiments with various scales of the m-rLNP models demonstrate the effectiveness and efficiency of our approach by comparing with the recent researches.

  19. An L∞/L1-Constrained Quadratic Optimization Problem with Applications to Neural Networks

    International Nuclear Information System (INIS)

    Leizarowitz, Arie; Rubinstein, Jacob

    2003-01-01

    Pattern formation in associative neural networks is related to a quadratic optimization problem. Biological considerations imply that the functional is constrained in the L ∞ norm and in the L 1 norm. We consider such optimization problems. We derive the Euler-Lagrange equations, and construct basic properties of the maximizers. We study in some detail the case where the kernel of the quadratic functional is finite-dimensional. In this case the optimization problem can be fully characterized by the geometry of a certain convex and compact finite-dimensional set

  20. Non-destructive and micro-invasive testing techniques for characterizing materials, structures and restoration problems in mural paintings

    Energy Technology Data Exchange (ETDEWEB)

    Tortora, Mariagrazia, E-mail: Mariagrazia.Tortora@univaq.it [University of L’Aquila, Department of Physical and Chemical Sciences, Via Vetoio (Coppito 1), I-67100, Loc. Coppito, L’Aquila, AQ (Italy); Sfarra, Stefano, E-mail: Stefano.Sfarra@univaq.it [Las.E.R. Laboratory, University of L’Aquila, Department of Industrial and Information Engineering and Economics, Piazzale E. Pontieri 1, I-67100, Loc. Monteluco di Roio, Roio Poggio, L’Aquila, AQ, Italy, (Italy); Chiarini, Marco, E-mail: mchiarini@unite.it [University of Teramo, Department of Bioscience and Technology for Food Agriculture and Environment, Via Carlo Lerici 1, I-64023, Mosciano Sant’Angelo, Teramo, TE, Italy, (Italy); Daniele, Valeria, E-mail: Valeria.Daniele@univaq.it [University of L’Aquila, Department of Industrial and Information Engineering and Economics, Piazzale E. Pontieri 1, I-67100, Loc. Monteluco di Roio, Roio Poggio, L’Aquila, AQ (Italy); Taglieri, Giuliana, E-mail: Giuliana.Taglieri@univaq.it [University of L’Aquila, Department of Industrial and Information Engineering and Economics, Piazzale E. Pontieri 1, I-67100, Loc. Monteluco di Roio, Roio Poggio, L’Aquila, AQ (Italy); Cerichelli, Giorgio, E-mail: Giorgio.Cerichelli@univaq.it [University of L’Aquila, Department of Physical and Chemical Sciences, Via Vetoio (Coppito 1), I-67100, Loc. Coppito, L’Aquila, AQ (Italy)

    2016-11-30

    Highlights: • Infrared thermography allowed to identify structural damage and rising damp effect. • The present approach provided insights on the used pigments and painting techniques. • FT-IR, XRF and XRD analyses of the mortar sample showed the peculiar composition. • 1D, 2D NMR analyses were useful for the identification of the restoration polymer. • NMR technique also allowed to characterize the plasticizing agents. - Abstract: In this paper, chemical and structural studies of medieval wall paintings in Ocre (L’Aquila, Italy) are presented. During the latest restoration campaign, non-destructive (Near-Infrared Reflectography and Infrared Thermography) and micro-invasive (Nuclear Magnetic Resonance, Fourier Transform Infrared Spectroscopy, μ-Raman, Scanning Electron Microscopy with X-ray Microanalysis, X-Ray Diffraction, X-Ray Fluorescence, Optical Microscopy, Mass Spectrometry, Thermogravimetry) analyses were performed in order to determine the detachments of wall surfaces and the characterization of original and restoration materials. Data integration allowed to reconstruct the conservative history, the execution techniques and the conservation problems of the artefact, as well as to assess the effectiveness of restoration activities adopted. The combined use of physical and micro-chemical techniques proved to be effective for an in-depth study of materials stratification of paintings.

  1. Non-destructive and micro-invasive testing techniques for characterizing materials, structures and restoration problems in mural paintings

    International Nuclear Information System (INIS)

    Tortora, Mariagrazia; Sfarra, Stefano; Chiarini, Marco; Daniele, Valeria; Taglieri, Giuliana; Cerichelli, Giorgio

    2016-01-01

    Highlights: • Infrared thermography allowed to identify structural damage and rising damp effect. • The present approach provided insights on the used pigments and painting techniques. • FT-IR, XRF and XRD analyses of the mortar sample showed the peculiar composition. • 1D, 2D NMR analyses were useful for the identification of the restoration polymer. • NMR technique also allowed to characterize the plasticizing agents. - Abstract: In this paper, chemical and structural studies of medieval wall paintings in Ocre (L’Aquila, Italy) are presented. During the latest restoration campaign, non-destructive (Near-Infrared Reflectography and Infrared Thermography) and micro-invasive (Nuclear Magnetic Resonance, Fourier Transform Infrared Spectroscopy, μ-Raman, Scanning Electron Microscopy with X-ray Microanalysis, X-Ray Diffraction, X-Ray Fluorescence, Optical Microscopy, Mass Spectrometry, Thermogravimetry) analyses were performed in order to determine the detachments of wall surfaces and the characterization of original and restoration materials. Data integration allowed to reconstruct the conservative history, the execution techniques and the conservation problems of the artefact, as well as to assess the effectiveness of restoration activities adopted. The combined use of physical and micro-chemical techniques proved to be effective for an in-depth study of materials stratification of paintings.

  2. Genetic Algorithm for Solving Location Problem in a Supply Chain Network with Inbound and Outbound Product Flows

    Directory of Open Access Journals (Sweden)

    Suprayogi Suprayogi

    2016-12-01

    Full Text Available This paper considers a location problem in a supply chain network. The problem addressed in this paper is motivated by an initiative to develop an efficient supply chain network for supporting the agricultural activities. The supply chain network consists of regions, warehouses, distribution centers, plants, and markets. The products include a set of inbound products and a set of outbound products. In this paper, definitions of the inbound and outbound products are seen from the region’s point of view.  The inbound product is the product demanded by regions and produced by plants which flows on a sequence of the following entities: plants, distribution centers, warehouses, and regions. The outbound product is the product demanded by markets and produced by regions and it flows on a sequence of the following entities: regions, warehouses, and markets. The problem deals with determining locations of the warehouses and the distribution centers to be opened and shipment quantities associated with all links on the network that minimizes the total cost. The problem can be considered as a strategic supply chain network problem. A solution approach based on genetic algorithm (GA is proposed. The proposed GA is examined using hypothetical instances and its results are compared to the solution obtained by solving the mixed integer linear programming (MILP model. The comparison shows that there is a small gap (0.23%, on average between the proposed GA and MILP model in terms of the total cost. The proposed GA consistently provides solutions with least total cost. In terms of total cost, based on the experiment, it is demonstrated that coefficients of variation are closed to 0.

  3. Algorithm for solving multicriteria problem of appointments on the networks

    Directory of Open Access Journals (Sweden)

    Yu. V. Bugaeev

    2017-01-01

    Full Text Available To describe complex projects or various jobs that make up a set of interrelated activities, use the network schedule. Several variants of network models are used. 1. For practical use, the Gantt chart is the most widely used - it is a graphical representation of consecutive intervals of time and the use of resources. 2. The network graph is represented as a graph, where the vertices are an event (or its state at a certain point in time, and the connecting arcs (or edges are works. The graph model is used in the work. In this case, the events (the fact of the completion or the beginning of the work correspond to the vertices of the graph, and the work to the arcs, the orientation of which corresponds to the technology of this process. An important role in the project management model is played by the optimal assignment of performers to the existing list of works. With this formulation of the problem, the total implementation time or the length of the critical path on the graph can be used as a criterion. In this case, the criterion is imposed a restriction on the deadline for the execution of work (or the project as a whole. Thus, the total time spent on the project and the length of the critical path are represented by equally important characteristics of the project implementation, and they should be considered as two equivalent criteria for the multicriteria project management task. We have proposed an algorithm, in general, an approximate determination of the set of Pareto-optimal solutions of a given problem.

  4. High-speed image processing systems in non-destructive testing

    Science.gov (United States)

    Shashev, D. V.; Shidlovskiy, S. V.

    2017-08-01

    Digital imaging systems are using in most of both industrial and scientific industries. Such systems effectively solve a wide range of tasks in the field of non-destructive testing. There are problems in digital image processing for decades associated with the speed of the operation of such systems, sufficient to efficiently process and analyze video streams in real time, ideally in mobile small-sized devices. In this paper, we consider the use of parallel-pipeline computing architectures in image processing problems using the example of an algorithm for calculating the area of an object on a binary image. The approach used allows us to achieve high-speed performance in the tasks of digital image processing.

  5. An improved superconducting neural circuit and its application for a neural network solving a combinatorial optimization problem

    International Nuclear Information System (INIS)

    Onomi, T; Nakajima, K

    2014-01-01

    We have proposed a superconducting Hopfield-type neural network for solving the N-Queens problem which is one of combinatorial optimization problems. The sigmoid-shape function of a neuron output is represented by the output of coupled SQUIDs gate consisting of a single-junction and a double-junction SQUIDs. One of the important factors for an improvement of the network performance is an improvement of a threshold characteristic of a neuron circuit. In this paper, we report an improved design of coupled SQUID gates for a superconducting neural network. A step-like function with a steep threshold at a rising edge is desirable for a neuron circuit to solve a combinatorial optimization problem. A neuron circuit is composed of two coupled SQUIDs gates with a cascade connection in order to obtain such characteristics. The designed neuron circuit is fabricated by a 2.5 kA/cm 2 Nb/AlOx/Nb process. The operation of a fabricated neuron circuit is experimentally demonstrated. Moreover, we discuss about the performance of the neural network using the improved neuron circuits and delayed negative self-connections.

  6. Independent and Interactive Effects of Neighborhood Disadvantage and Social Network Characteristics on Problem Drinking after Treatment.

    Science.gov (United States)

    Mericle, Amy A; Kaskutas, Lee A; Polcin, Doug L; Karriker-Jaffe, Katherine J

    2018-01-01

    Socioecological approaches to public health problems like addiction emphasize the importance of person-environment interactions. Neighborhood and social network characteristics may influence the likelihood of relapse among individuals in recovery, but these factors have been understudied, particularly with respect to conceptualizing social network characteristics as moderators of neighborhood disadvantage. Drawing from a larger prospective study of individuals recruited from outpatient treatment (N=451) and interviewed 1, 3, 5, and 7 years later, the aim of this study was to examine the independent and interactive effects of neighborhood and social network characteristics on continued problem drinking after treatment. Models using generalized estimating equations controlling for demographic and other risk factors found the number of heavy drinkers in one's network increases risk of relapse, with the effects being significantly stronger among those living in disadvantaged neighborhoods than among those in non-disadvantaged neighborhoods. No independent effects were found for neighborhood disadvantage or for the number of network members supporting reduced drinking. Future research is needed to examine potential protective factors in neighborhoods which may offset socioeconomic disadvantage as well as to investigate the functions that network members serve in helping to improve long-term treatment outcomes.

  7. Optimizing decentralized production-distribution planning problem in a multi-period supply chain network under uncertainty

    Science.gov (United States)

    Nourifar, Raheleh; Mahdavi, Iraj; Mahdavi-Amiri, Nezam; Paydar, Mohammad Mahdi

    2017-09-01

    Decentralized supply chain management is found to be significantly relevant in today's competitive markets. Production and distribution planning is posed as an important optimization problem in supply chain networks. Here, we propose a multi-period decentralized supply chain network model with uncertainty. The imprecision related to uncertain parameters like demand and price of the final product is appropriated with stochastic and fuzzy numbers. We provide mathematical formulation of the problem as a bi-level mixed integer linear programming model. Due to problem's convolution, a structure to solve is developed that incorporates a novel heuristic algorithm based on Kth-best algorithm, fuzzy approach and chance constraint approach. Ultimately, a numerical example is constructed and worked through to demonstrate applicability of the optimization model. A sensitivity analysis is also made.

  8. Quality evaluation of soil-cement-plant residue bricks by the combination of destructive and non-destructive tests

    Directory of Open Access Journals (Sweden)

    Regis de C. Ferreira

    Full Text Available ABSTRACT Residues from agricultural activity can be used to improve the quality of soil-based bricks, constituting an interesting alternative for their destination. The technical quality of soil-cement-plant residue bricks was evaluated by the combination of non-destructive and destructive methods. A predominant clayey soil, Portland cement and residues of husks of both rice and Brachiaria brizantha cv. Marandu (0, 10, 20, 30 and 40%, in mass, in substitution to the 10% cement content were used. The bricks were submitted to destructive (water absorption and compressive strength and nondestructive (ultrasound tests for their physical and mechanical characterization. Results from both destructive and non-destructive tests were combined to determine the quantitative parameter named “anisotropic resistance” in order to evaluate the quality of the bricks. The addition that promoted best technical quality was 10% residue content, regardless of the residue type. The anisotropic resistance proved to be adequate for the technical quality evaluation of the bricks.

  9. The Bilevel Design Problem for Communication Networks on Trains: Model, Algorithm, and Verification

    Directory of Open Access Journals (Sweden)

    Yin Tian

    2014-01-01

    Full Text Available This paper proposes a novel method to solve the problem of train communication network design. Firstly, we put forward a general description of such problem. Then, taking advantage of the bilevel programming theory, we created the cost-reliability-delay model (CRD model that consisted of two parts: the physical topology part aimed at obtaining the networks with the maximum reliability under constrained cost, while the logical topology part focused on the communication paths yielding minimum delay based on the physical topology delivered from upper level. We also suggested a method to solve the CRD model, which combined the genetic algorithm and the Floyd-Warshall algorithm. Finally, we used a practical example to verify the accuracy and the effectiveness of the CRD model and further applied the novel method on a train with six carriages.

  10. Optimizing Supply Chain Collaboration Based on Agreement Buyer-Supplier Relationship with Network Design Problem

    Directory of Open Access Journals (Sweden)

    Wahyudi Sutopo

    2016-12-01

    Full Text Available In recent years, the rising competitive environment with shorter product life cycles and high customization forces industries to increase their flexibility, speed up their response, and enhance concurrent engineering designs. To integrate these prospects, supply chain collaboration becomes a pertinent strategy for industries to strengthen their competitiveness. The network design problem is used to implement supply chain collaboration. In the buying and selling process, sharing information between buyer and supplier are important to obtain a transaction decision. The optimimum supply chain profit can be identified by mathematical model of network design problem. The Mathematical Model takes into consideration the uncertainity in negotiation of supply chain, transportation problems, and locationallocation of products from supplier to buyer in the planning based on the time value of money. The results show that the model can be used to optimize the supply chain profit. The supplier gets a profit because income were received in the initial contract, while the buyer profit comes from lower pay.

  11. Innovation in Non Destructive Testing

    NARCIS (Netherlands)

    Wassink, C.H.P.

    2012-01-01

    In many established companies the pace of innovation is low. The Non-Destructive Testing sector is an example of a sector where the pace of innovation is very slow. Non-Destructive Testing (NDT) refers to the set of non-invasive activities used to determine the condition of objects or installations

  12. Alert with destruction of stratospheric ozone: 95 Nobel Prize Winners

    International Nuclear Information System (INIS)

    Santamaria, J.; Zurita, E.

    1995-01-01

    After briefly summarizing the discoveries of the 95 Nobel Prize Winners in Chemistry related to the threats to the ozone layer by chemical pollutants, we make a soft presentation of the overall problem of stratospheric ozone, starting with the destructive catalytic cycles of the pollutant-based free radicals, following with the diffusion mathematical models in Atmospheric Chemistry, and ending with the increasing annual drama of the ozone hole in the Antarctica. (Author)

  13. Evaluation of corrosion of prestressing steel in concrete using non-destructive techniques

    International Nuclear Information System (INIS)

    Ali, M.G.; Maddocks, A.R.

    2003-01-01

    Use of high strength steel in pre-stressed concrete structures has been in use in Australia for many decades. Highway bridges, among other structures, have extensively used pre-stress-ing and post-tensioning techniques. Although prestressing offers many competitive edges to it's traditional rival reinforced concrete, the consequence of damage to prestressing tendons could be catastrophic. Periodic visual inspections of prestressed concrete bridges throughout the world have demonstrated the growing problem of deterioration of prestressing steel as a result of corrosion. Early detection of damage to prestressing steel therefore is of paramount importance. Unfortunately no reliable and practical non-destructive evaluation technique has been available for assessing the condition of prestressing steel within concrete although a number of techniques appear promising. The following inspection methods have been highlighted in recent literature for their use as non-destructive inspection methods for prestressed concrete structures. In addition to the techniques discussed, a number of destructive, or invasive techniques also exist for determination of the corrosion status of prestressing tendons in prestressed structures. The following non-destructive techniques are discussed in some detail: Radiography; Computed Tomography; Surface Penetrating Radar; Impact Echo; Acoustic Emission Monitoring; Magnetic Field Disturbance Technique; Remnant Magnetism Method; Linear Polarisation Method; Electrical Resistance and Surface Potential Survey. The portability, limitations and use in Australia of these techniques are summarised in a table

  14. Money Creation and Destruction

    OpenAIRE

    Faure, Salomon; Gersbach, Hans

    2017-01-01

    We study money creation and destruction in today’s monetary architecture and examine the impact of monetary policy and capital regulation in a general equilibrium setting. There are two types of money created and destructed: bank deposits, when banks grant loans to firms or to other banks and central bank money, when the central bank grants loans to private banks. We show that equilibria yield the first-best level of money creation and lending when prices are flexible, regardless of the monet...

  15. Non-destructive and destructive examination of the retired North Anna 2 Reactor Pressure Vessel Head

    International Nuclear Information System (INIS)

    Ahluwalia, Kawaljit; Barnes, Robert; Rao, Gutti; Cattant, Francois; Peat, Noel

    2006-09-01

    Stress corrosion cracking of Alloy 600 and nickel-based weld materials has been the single biggest challenge facing the PWR industry. A fundamental and thorough knowledge was needed to properly explain this phenomenon and develop appropriate mitigation strategies. Non Destructive Examination (NDE) of the North Anna Unit 2 Reactor Vessel Head (RVH) during the 2002 fall outage identified widespread crack indications in the Alloy 600 CRDM penetrations and associated Alloy 182 and 82 J-groove attachment welds. When the Utility decided to replace the RVH, a rare opportunity was provided to the industry to undertake in-depth studies of representative defective CRDM penetrations from a retired RVH. Accordingly, the Materials Reliability Program, undertook a two-phase program on the retired North Anna 2 Alloy 600 RVH. The first phase involved selection and removal of six penetrations from the RVH and penetration decontamination, replication and laboratory NDE. The second phase consisted of a detailed destructive examination of penetration number 54. This paper provides a summary of work undertaken during this program. Criteria for selection of penetrations for removal and procedures used in removal of the penetrations are described. Extreme care was undertaken in decontamination of the penetrations to facilitate laboratory NDE. Penetration number 54 was then subjected to destructive examination to establish a correlation between NDE findings (from both field and laboratory inspections) and actual flaws. Additional objectives of the destructive examination included mechanistic assessment of defect formation and investigation of the annulus environment and wastage characterization. Data obtained from these studies is invaluable in validating safety assessment statements by developing the correlation between field NDE and actual defects. In addition, information gathered from non-destructive and destructive examinations is used to assess accuracy of the NDE techniques

  16. Destructive analytical services to safeguards: Activity report 1984-1987

    International Nuclear Information System (INIS)

    Bagliano, G.

    1987-08-01

    The report gives an evaluation of the volume, delays and quality of destructive analytical services provided in 84/01/01-87/06/30 in support of Agency Safeguards. General observations are also made. Problems and improvements are identified and trends indicated. The main features of the considered period are as follows: a) About 4,100 inspections samples were received and analyzed in the period 84/01/01-87/06/30 by SAL and NWAL. The samples represented 20 different types of materials issued from different nuclear fuel cycles. b) 496 out of 895 spent fuel samples analyzed in this period were distributed to NWAL. c) The chemical and isotopic analyses of Uranium, Thorium and Plutonium requested by the Inspectors (Americium also but occasionally) resulted in the report of a total of about 14,200 analytical results. d) The calibration of on-site measurements, the certification of Working Reference Materials for Destructive Analysis and the maintenance and improvement of Destructive Analysis required additional analytical services which were provided. e) At present, compared to 1983, the total verification delays by DA were shortened by 16%, 57% and 55% respectively for Uranium, Plutonium and spent fuel materials. f) Timely detection of abrupt diversion is achievable for the low enriched Uranium samples and are close to be achievable for the Plutonium and Spent Fuel Samples. g) Concepts, Procedures, and Materials for Analytical Quality Control Programmes of the measurements performed at SAL and NWAL were prepared. The analysis performed can be adequately accurate. h) Problems continue however to be encountered in the quality of the overall DA verification system. i) Major upgrading of equipment and procedures was undertaken at SAL. j) Other selective chemical assays were being tested and Isotope Dilution Mass Spec assays have been successfully set up for the analysis of 3 mg-sized Plutonium product samples. k) Close contacts have been kept with NWAL via Consultants

  17. Challenges of Non-Destructive Assay Waste Measurement

    International Nuclear Information System (INIS)

    Shull, A.H.

    2003-01-01

    Historically, the Savannah River Site (SRS) routinely produced special nuclear material (SNM), which provided stable measurement conditions for the non-destructive assay (NDA) methods. However, the main mission of SRS has changed from the production of SNM to the processing of waste and material stabilization. Currently, the purpose of processing is to recover the SNM from the waste and stabilization materials, much of which is from other DOE facilities. These missions are usually of a short duration, but require non-destructive assay (NDA) accountability measurements on materials of varying composition and geometric configuration. These missions usually have cost and time constraints, which sometimes require re-application of existing NDA methods to waste measurements. Usually, each new material or re-application of the NDA method to a different SNM campaign requires new standards and timely re-calibration of the method. These constraints provide numerous challenges for the NDA methods, particularly in the area of measurement uncertainty. This paper will discuss the challenges of these situations, mainly from a measurement and statistical point of view and provide some possible solutions to the problems encountered. Specific examples will be discussed for the segmented gamma scanner (SGS), neutron multiplicity counter (NMC) and passive neutron coincidence counter (PNCC), which are some of the most common NDA instruments at SRS

  18. A note on the consensus finding problem in communication networks with switching topologies

    KAUST Repository

    Haskovec, Jan

    2014-05-07

    In this note, we discuss the problem of consensus finding in communication networks of agents with dynamically switching topologies. In particular, we consider the case of directed networks with unbalanced matrices of communication rates. We formulate sufficient conditions for consensus finding in terms of strong connectivity of the underlying directed graphs and prove that, given these conditions, consensus is found asymptotically. Moreover, we show that this consensus is an emergent property of the system, being encoded in its dynamics and not just an invariant of its initial configuration. © 2014 © 2014 Taylor & Francis.

  19. Detecting and Preventing Sybil Attacks in Wireless Sensor Networks Using Message Authentication and Passing Method.

    Science.gov (United States)

    Dhamodharan, Udaya Suriya Raj Kumar; Vayanaperumal, Rajamani

    2015-01-01

    Wireless sensor networks are highly indispensable for securing network protection. Highly critical attacks of various kinds have been documented in wireless sensor network till now by many researchers. The Sybil attack is a massive destructive attack against the sensor network where numerous genuine identities with forged identities are used for getting an illegal entry into a network. Discerning the Sybil attack, sinkhole, and wormhole attack while multicasting is a tremendous job in wireless sensor network. Basically a Sybil attack means a node which pretends its identity to other nodes. Communication to an illegal node results in data loss and becomes dangerous in the network. The existing method Random Password Comparison has only a scheme which just verifies the node identities by analyzing the neighbors. A survey was done on a Sybil attack with the objective of resolving this problem. The survey has proposed a combined CAM-PVM (compare and match-position verification method) with MAP (message authentication and passing) for detecting, eliminating, and eventually preventing the entry of Sybil nodes in the network. We propose a scheme of assuring security for wireless sensor network, to deal with attacks of these kinds in unicasting and multicasting.

  20. Detecting and Preventing Sybil Attacks in Wireless Sensor Networks Using Message Authentication and Passing Method

    Directory of Open Access Journals (Sweden)

    Udaya Suriya Raj Kumar Dhamodharan

    2015-01-01

    Full Text Available Wireless sensor networks are highly indispensable for securing network protection. Highly critical attacks of various kinds have been documented in wireless sensor network till now by many researchers. The Sybil attack is a massive destructive attack against the sensor network where numerous genuine identities with forged identities are used for getting an illegal entry into a network. Discerning the Sybil attack, sinkhole, and wormhole attack while multicasting is a tremendous job in wireless sensor network. Basically a Sybil attack means a node which pretends its identity to other nodes. Communication to an illegal node results in data loss and becomes dangerous in the network. The existing method Random Password Comparison has only a scheme which just verifies the node identities by analyzing the neighbors. A survey was done on a Sybil attack with the objective of resolving this problem. The survey has proposed a combined CAM-PVM (compare and match-position verification method with MAP (message authentication and passing for detecting, eliminating, and eventually preventing the entry of Sybil nodes in the network. We propose a scheme of assuring security for wireless sensor network, to deal with attacks of these kinds in unicasting and multicasting.

  1. Modeling Multilevel Supplier Selection Problem Based on Weighted-Directed Network and Its Solution

    Directory of Open Access Journals (Sweden)

    Chia-Te Wei

    2017-01-01

    Full Text Available With the rapid development of economy, the supplier network is becoming more and more complicated. It is important to choose the right suppliers for improving the efficiency of the supply chain, so how to choose the right ones is one of the important research directions of supply chain management. This paper studies the partner selection problem from the perspective of supplier network global optimization. Firstly, this paper discusses and forms the evaluation system to estimate the supplier from the two indicators of risk and greenness and then applies the value as the weight of the network between two nodes to build a weighted-directed supplier network; secondly, the study establishes the optimal combination model of supplier selection based on the global network perspective and solves the model by the dynamic programming-tabu search algorithm and the improved ant colony algorithm, respectively; finally, different scale simulation examples are given to testify the efficiency of the two algorithms. The results show that the ant colony algorithm is superior to the tabu search one as a whole, but the latter is slightly better than the former when network scale is small.

  2. INVESTIGATION OF THE MODEL FOR DYNAMICS OF DESTRUCTIVE INFORMATION AND PSYCHOLOGICAL INFLUENCE ON MASS CONSCIOUSNESS

    Directory of Open Access Journals (Sweden)

    V. A. Minaev

    2016-12-01

    Full Text Available The article examines a mathematical model of destructive information-psychological influence (IPI dynamics on mass consciousness. It is shown that a model taking into account three main processes - informational influence on mass consciousness of interpersonal communication, mass media, effect of influence forgetting - has solution in the form of a generalized logistic curve. Given a statistical distribution over time of society individuals, who share ideas of IPI, which qualitatively confirms a formal decision model, presented in the form of nonlinear differential equations describing of innovation diffusion. Investigated special cases of the model, which in all cases confirmed existence of asymptotic stationary solutions. To use the model in practice to analyze and predict characteristics of IPI on society, and, ultimately, to control this effect, estimation of its parameters based on statistical data. Accented that the development of the model is essential in modern conditions complicate the problem of ensuring cyber security of the state, society and every individual member of society, including considering the development of social networks.

  3. A Network Traffic Control Enhancement Approach over Bluetooth Networks

    DEFF Research Database (Denmark)

    Son, L.T.; Schiøler, Henrik; Madsen, Ole Brun

    2003-01-01

    This paper analyzes network traffic control issues in Bluetooth data networks as convex optimization problem. We formulate the problem of maximizing of total network flows and minimizing the costs of flows. An adaptive distributed network traffic control scheme is proposed as an approximated solu...... as capacity limitations and flow requirements in the network. Simulation shows that the performance of Bluetooth networks could be improved by applying the adaptive distributed network traffic control scheme...... solution of the stated optimization problem that satisfies quality of service requirements and topologically induced constraints in Bluetooth networks, such as link capacity and node resource limitations. The proposed scheme is decentralized and complies with frequent changes of topology as well......This paper analyzes network traffic control issues in Bluetooth data networks as convex optimization problem. We formulate the problem of maximizing of total network flows and minimizing the costs of flows. An adaptive distributed network traffic control scheme is proposed as an approximated...

  4. Childhood Physical and Sexual Abuse and Social Network Patterns on Social Media: Associations With Alcohol Use and Problems Among Young Adult Women.

    Science.gov (United States)

    Oshri, Assaf; Himelboim, Itai; Kwon, Josephine A; Sutton, Tara E; Mackillop, James

    2015-11-01

    The aim of the present study was to examine the links between severities of child abuse (physical vs. sexual), and alcohol use versus problems via social media (Facebook) peer connection structures. A total of 318 undergraduate female students at a public university in the United States reported severity of child abuse experiences and current alcohol use and problems. Social network data were obtained directly from the individuals' Facebook network. Severity of childhood physical abuse was positively linked to alcohol use and problems via eigenvector centrality, whereas severity of childhood sexual abuse was negatively linked to alcohol use and problems via clustering coefficient. Childhood physical and sexual abuse were linked positively and negatively, respectively, to online social network patterns associated with alcohol use and problems. The study suggests the potential utility of these online network patterns as risk indices and ultimately using social media as a platform for targeted preventive interventions.

  5. Collision-induced destructive quantum interference

    International Nuclear Information System (INIS)

    Yang Xihua; Sun Zhenrong; Zhang Shi'an; Ding Liang'en; Wang Zugeng

    2005-01-01

    We conduct theoretical studies on the collision-induced destructive quantum interference of two-colour two-photon transitions in an open rhomb-type five-level system with a widely separated doublet by the density matrix approach. The effects of the collision-induced decay rates, the ratio of the transition dipole moments and the energy separation of the doublet on the interference are analysed. It is shown that a narrow dip appears in the excitation spectrum due to the collision-induced destructive interference, and that the narrow interference dip still exists even when the collision broadening is comparable to the energy separation of the doublet. The physical origin of the collision-induced destructive quantum interference is analysed in the dressed-atom picture

  6. Multi-energy radiography for non-destructive testing of materials and structures for civil engineering

    International Nuclear Information System (INIS)

    Naydenov, S.V.; Ryzhikov, V.

    2003-01-01

    Development of the technological base of modern non-destructive testing require new methods allowing determination of specified properties of materials and structures under study. A traditional direction of works is determination of internal spatial structure of the materials and other constructions. Restoration of this geometrical information is of qualitative character, though provides for determination of technical parameters affecting physical properties of the system. Reconstruction of the chemical composition, density and atomic structure (effective atomic number) is an inverse problem of direct quantitative determination of properties starting from data obtained by means of non-destructive testing. In the present work, we propose the use of multi-energy radiography for reconstruction of the substantial structure of materials. In framework of simple theoretical model it is shown that, using multi-channel absorption of X-rays, important substantial characteristics of materials and multi-compound structures can be readily reconstructed. The results obtained show high efficiency of 2-energy radiography for non-destructive testing in civil engineering

  7. Collisional destruction of fast hydrogen Rydberg atoms

    International Nuclear Information System (INIS)

    King, M.R.

    1984-01-01

    A new modulated electric field technique was developed to study Rydberg atom destruction processes in a fast beam. The process of destruction of a band of Rydberg atom destruction of a band of Rydberg atoms through the combined processes of ionization, excitation, and deexcitation was studied for collisions with gas targets. Rydberg atoms of hydrogen were formed by electron capture, and detected by field ionization. The modulated field technique described proved to be an effective technique for producing a large signal for accurate cross section measurements. The independent particle model for Rydberg atom destruction processes was found to hold well for collisions with molecular nitrogen, argon, and carbon dioxide. The resonances in the cross sections for the free electron scattering with these targets were found to also occur in Rydberg destruction. Suggestions for future investigations of Rydberg atom collision processes in the fast beam regime are given

  8. Cerebellum-inspired neural network solution of the inverse kinematics problem.

    Science.gov (United States)

    Asadi-Eydivand, Mitra; Ebadzadeh, Mohammad Mehdi; Solati-Hashjin, Mehran; Darlot, Christian; Abu Osman, Noor Azuan

    2015-12-01

    The demand today for more complex robots that have manipulators with higher degrees of freedom is increasing because of technological advances. Obtaining the precise movement for a desired trajectory or a sequence of arm and positions requires the computation of the inverse kinematic (IK) function, which is a major problem in robotics. The solution of the IK problem leads robots to the precise position and orientation of their end-effector. We developed a bioinspired solution comparable with the cerebellar anatomy and function to solve the said problem. The proposed model is stable under all conditions merely by parameter determination, in contrast to recursive model-based solutions, which remain stable only under certain conditions. We modified the proposed model for the simple two-segmented arm to prove the feasibility of the model under a basic condition. A fuzzy neural network through its learning method was used to compute the parameters of the system. Simulation results show the practical feasibility and efficiency of the proposed model in robotics. The main advantage of the proposed model is its generalizability and potential use in any robot.

  9. GWO-LPWSN: Grey Wolf Optimization Algorithm for Node Localization Problem in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    R. Rajakumar

    2017-01-01

    Full Text Available Seyedali Mirjalili et al. (2014 introduced a completely unique metaheuristic technique particularly grey wolf optimization (GWO. This algorithm mimics the social behavior of grey wolves whereas it follows the leadership hierarchy and attacking strategy. The rising issue in wireless sensor network (WSN is localization problem. The objective of this problem is to search out the geographical position of unknown nodes with the help of anchor nodes in WSN. In this work, GWO algorithm is incorporated to spot the correct position of unknown nodes, so as to handle the node localization problem. The proposed work is implemented using MATLAB 8.2 whereas nodes are deployed in a random location within the desired network area. The parameters like computation time, percentage of localized node, and minimum localization error measures are utilized to analyse the potency of GWO rule with other variants of metaheuristics algorithms such as particle swarm optimization (PSO and modified bat algorithm (MBA. The observed results convey that the GWO provides promising results compared to the PSO and MBA in terms of the quick convergence rate and success rate.

  10. Destructive distillation

    Energy Technology Data Exchange (ETDEWEB)

    Allison, C A

    1906-05-22

    The invention relates to an apparatus in which the destructive distillation or coking of coal, peat, shale, etc., is carried out by means of a current of hot gases at a temperature of 700--800/sup 0/F., as described in Specification No. 11,925, A.D. 1906.

  11. On Unrooted and Root-Uncertain Variants of Several Well-Known Phylogenetic Network Problems

    NARCIS (Netherlands)

    van Iersel, L.J.J.; Kelk, Steven; Stougie, Leen; Boes, Olivier

    2017-01-01

    The hybridization number problem requires us to embed a set of binary rooted phylogenetic trees into a binary rooted phylogenetic network such that the number of nodes with indegree two is minimized. However, from a biological point of view accurately inferring the root location in a phylogenetic

  12. The Problem of Neutralization of Reactionary Masses in the Russian Technologies of CWD

    International Nuclear Information System (INIS)

    Petrov, V.

    2007-01-01

    11, 2006 at Conference of OPCW terms of destruction of the chemical weapon for Russia and USA were prolonged to 5 years, till April, 29, 2012. At all intentions to achieve these terms in the Russian technologies are available a number of technical problems which can complicate works on the CWD. One of them concerns the problems connected to neutralization of reactionary masses of the CWD. In the Russian Federation it is not constructed yet any enterprise for destruction with a full cycle. The question of neutralization of reactionary masses yet does not find the full decision. In this connection there is a threat of that the problem of reactionary masses can appear outside of works on destruction is direct of CW and beyond the framework of 2012. The technical analysis of possible technologies and directions of neutralization of reactionary masses of destruction of lewisite and POS in the Russian technologies of the CWD is carried out. (author)

  13. The Problem of Neutralization of Reactionary Masses in the Russian Technologies of CWD

    Energy Technology Data Exchange (ETDEWEB)

    Petrov, V [Institute of Applied Mechanics UrB of the Russian Academy of Science, Izhevsk (Russian Federation)

    2007-07-01

    11, 2006 at Conference of OPCW terms of destruction of the chemical weapon for Russia and USA were prolonged to 5 years, till April, 29, 2012. At all intentions to achieve these terms in the Russian technologies are available a number of technical problems which can complicate works on the CWD. One of them concerns the problems connected to neutralization of reactionary masses of the CWD. In the Russian Federation it is not constructed yet any enterprise for destruction with a full cycle. The question of neutralization of reactionary masses yet does not find the full decision. In this connection there is a threat of that the problem of reactionary masses can appear outside of works on destruction is direct of CW and beyond the framework of 2012. The technical analysis of possible technologies and directions of neutralization of reactionary masses of destruction of lewisite and POS in the Russian technologies of the CWD is carried out. (author)

  14. Destruction kinetic of PCDDs/Fs in MSWI fly ash using microwave peroxide oxidation.

    Science.gov (United States)

    Chang, Yu-Min; Fang, Wen-Bin; Tsai, Kuo-Sheng; Kao, Jimmy C M; Lin, Kae-Long; Chen, Ching-Ho

    2015-01-01

    Microwave peroxide oxidation is a less greenhouse gas emission and energy-efficient technology to destroy toxic organic compounds in hazardous waste. The research novelty is to adopt the innovative microwave peroxide oxidation in H2SO4/HNO3 solution to efficiently destroy the polychlorinated dibenzo-p-dioxins (PCDDs)/Fs in municipal solid waste incineration fly ash. The major objective of this paper is to study dynamic destruction of PCDDs/Fs using the microwave peroxide oxidation. Almost all PCDDs/Fs in the raw fly ash can be destructed in 120 min at a temperature of 423 K using the microwave peroxide oxidation treatment. It was found that the microwave peroxide oxidation provides the potential to destruct the PCDDs/Fs content in municipal solid waste incinerator (MSWI) fly ash to a low level as a function of treatment time. A useful kinetic correlation between destruction efficiency and treatment conditions is proposed on the basis of the experimental data obtained in this study. The significance of this work in terms of practical engineering applications is that the necessary minimum treatment time can be solved using a proposed graphic illustration method, by which the minimum treatment time is obtained if the desired destruction efficiency and treatment temperature are known. Because of inorganic salt dissolution, the temperature would be a critical factor facilitating the parts of fly ash dissolution. Material loss problem caused by the microwave peroxide oxidation and the effects of treatment time and temperature are also discussed in this paper.

  15. Verification of Chemical Weapons Destruction

    International Nuclear Information System (INIS)

    Lodding, J.

    2010-01-01

    The Chemical Weapons Convention is the only multilateral treaty that bans completely an entire category of weapons of mass destruction under international verification arrangements. Possessor States, i.e. those that have chemical weapons stockpiles at the time of becoming party to the CWC, commit to destroying these. All States undertake never to acquire chemical weapons and not to help other States acquire such weapons. The CWC foresees time-bound chemical disarmament. The deadlines for destruction for early entrants to the CWC are provided in the treaty. For late entrants, the Conference of States Parties intervenes to set destruction deadlines. One of the unique features of the CWC is thus the regime for verifying destruction of chemical weapons. But how can you design a system for verification at military sites, while protecting military restricted information? What degree of assurance is considered sufficient in such circumstances? How do you divide the verification costs? How do you deal with production capability and initial declarations of existing stockpiles? The founders of the CWC had to address these and other challenges in designing the treaty. Further refinement of the verification system has followed since the treaty opened for signature in 1993 and since inspection work was initiated following entry-into-force of the treaty in 1997. Most of this work concerns destruction at the two large possessor States, Russia and the United States. Perhaps some of the lessons learned from the OPCW experience may be instructive in a future verification regime for nuclear weapons. (author)

  16. Trace aluminium determination and sampling problems of archeological bone employing destructive neutron activation analysis

    International Nuclear Information System (INIS)

    Blotcky, A.J.; Rack, E.P.; Recker, R.R.; Leffler, J.A.; Teitelbaum, S.

    1978-01-01

    A destructive neutron activation analysis procedure was developed for determining trace aluminium content in bone. The method is based on a carefully planned sample preparation, irradiation at a neutron flux for 3.1x10 11 nxcm -2 xs -1 for 5 minutes, and chemical separation based on ion exchange. It was found that bone samples soaked in aluminium containing soil gave highly elevated aluminium values as a result of the aluminium adsorption into the bone matrix. The maximum aluminium content values for prehistoric bones are larger than those of modern bones and comparable to aluminium levels present in bone from renal patients. (T.G.)

  17. Non-destructive controls

    International Nuclear Information System (INIS)

    Nouvet, A.

    1978-01-01

    The non-destructive controls permit, while respecting their integrity, the direct and individual examination of parts or complete objects as they are manufactured, as well as to follow the evolution of their eventual defects while in operation. The choice of control methods depends on the manufacturing process and shapes of parts, on the physical properties of their components as well as the nature, position and size of the defects which are likely to be detected. Whether it is a question of controls by means of ionizing radiation, flux of neutrons, ultrasons, acoustic source, sweating, magnetoscopy. Foucault currents, thermography, detection of leaks or non-destructive metallography, each has a limited field of application such that they are less competitive than complementary [fr

  18. The forms of destructive behavior in the workplace

    Directory of Open Access Journals (Sweden)

    D A Narozhnaia

    2015-12-01

    Full Text Available Personnel have become a key resource of organizations in the contemporary society for the way personnel fulfills its work functions can provide important advantages in the competitive market. However, despite the fact that organizations’ management pays great attention to the development of the constructive forms of work behavior, various forms of destructive behavior in the workplace are quite widespread nowadays. The author uses the concept “destructive labor behavior” to denote such observable actions of employees that hinder achieving organizations’ aims and entail negative consequences. The article analyzes relationships between concepts “destructive labor behavior”, “social behavior” and “organizational behavior”; identifies the most common types of destructive labor behavior, such as absenteeism, theft, sabotage, lowered labor activity, and their key features; considers their negative consequences, such as decreased production, decline in the quality of products or services, conflicts in the team, tensions between workers and employers; analyzes different classifications of the destructive forms of labor behavior. The author concludes that we need a general classification of the destructive forms of labor behavior based on their grouping on three grounds: the essence of the negative consequences of the destructive behavior; the violated legal norms; the causes of the destructive behavior. Moreover, the article identifies three groups of organizational factors that can generate destructive forms of labor behavior - production factors (content, organization and conditions of work, social factors (group relations and psychological (personal characteristics of employees - and provides recommendations to reduce their impact on the organization.

  19. Definition of new 3D invariants. Applications to pattern recognition problems with neural networks

    International Nuclear Information System (INIS)

    Proriol, J.

    1996-01-01

    We propose a definition of new 3D invariants. Usual pattern recognition methods use 2D descriptions of 3D objects, we propose a 2D approximation of the defined 3D invariants which can be used with neural networks to solve pattern recognition problems. We describe some methods to use the 2 D approximants. This work is an extension of previous 3D invariants used to solve some high energy physics problems. (author)

  20. 7 CFR 160.9 - Destructively distilled wood turpentine.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 3 2010-01-01 2010-01-01 false Destructively distilled wood turpentine. 160.9 Section... REGULATIONS AND STANDARDS FOR NAVAL STORES General § 160.9 Destructively distilled wood turpentine. The designation “destructively distilled wood turpentine” shall refer to the kind of spirits of turpentine...

  1. Evolutionary algorithm for the problem of oil products distributions on oil pipeline network; Algoritmo evolucionario para distribuicao de produtos de petroleo por redes de polidutos

    Energy Technology Data Exchange (ETDEWEB)

    Marcondes, Eduardo; Goldbarg, Elizabeth; Goldbarg, Marco; Cunha, Thatiana [Universidade Federal do Rio Grande do Norte (UFRN), Natal, RN (Brazil)

    2008-07-01

    A major problem about the planning of production in refinery is the determination of what should be done in each stage of production as a horizon of time. Among such problems, distribution of oil products through networks of pipelines is a very significant problem because of its economic importance. In this work, a problem of distribution of oil through a network of pipelines is modeled. The network studied is a simplification of a real network. There are several restrictions to be met, such as limits of storage, transmission or receipt of limits and limitations of transport. The model is adopted bi-goal where you want to minimize the fragmentation and the time of transmission, given the restrictions of demand and storage capacity. Whereas the occupancy rate of networks is increasingly high, is of great importance optimize its use. In this work, the technique of optimization by Cloud of particles is applied to the problem of distribution of oil products by networks of pipelines. (author)

  2. DESTRUCTION OF THE LITHOSPHERE: FAULTBLOCK DIVISIBILITY AND ITS TECTONOPHYSICAL REGULARITIES

    Directory of Open Access Journals (Sweden)

    Semen I. Sherman

    2012-01-01

    influenced the metastable state of the faultblock medium of the lithosphere.At the second scale-time level, the lithosphere is destructed in accordance with the laws of destruction of elastic and brittle bodies; at all hierarchical levels, the lithospheric destruction complies with the similarity patterns; the lithospheric destruction processes are characterized by fractality and take place synchronously with other destruction processes.Equations of the fault (7 and block divisibility (8 of the lithosphere and the generalized equation (9 of the faultblock divisibility of lithosphere are proposed.By the present stage of the geodynamic evolution of the Earth, the horizontally-layered zonal pattern of destruction of the Earth has been established (Fig. 15. The next step would be obtaining the knowledge of the law that governs the evolution of the lithospheric destruction as a whole. The subjects for discussions hold be variations of the rheological properties of the vertical profile of the lithosphere, impacts of the time factor on the rheological and mechanical properties, and, lastly, the initial heterogeneity of the lithospheric medium in combination with modern geodynamic processes. This problem is solvable, and its importance for practical applications is undubitable.

  3. Report on the bill project related to the struggle against proliferation of weapons of mass destruction and their delivery systems

    International Nuclear Information System (INIS)

    2010-01-01

    In a first part presenting the various forms of proliferations, the author first gives a quantitative overview of illegal activities concerning nuclear materials, and then discusses the existence and activities of proliferation networks, explaining how international trade liberalization creates a favourable context for proliferations of any kind, and describing how a typical network is organised. He also discusses the example of Iraq and the case of the network created by the Pakistani scientist Abdul Q. Khan. The risk created by the hypothetical relationship between terrorism and nuclear weapon of mass destruction is also questioned. Then, after having recalled the existing international texts and the present national legislation, the author comments the contribution on the bill project and outlines aspects which are not dealt with by this bill project: radiological devices and cybernetic attacks. Then he reports the comments made by the commission on the bill project articles which define interdictions, sanctions and sentences, or procedures against people or organisations involved in the financing or the use of weapons of mass destruction (biological and chemical). A table gives a comparison between the bill project text and the commission's propositions

  4. Electron microscopy study of a vascular prosthesis destructed in vivo reveals fractures in Dacron fibers.

    Science.gov (United States)

    Woźniak, Witold; Olszewski, Wojciech; Górski, Grzegorz

    2016-02-01

    The genuine destruction of a synthetic prosthesis wall, as a late complication of vascular surgery, is extremely rare. We report a case of a 64-year-old male who had his 12-year-old femoropopliteal synthetic graft explanted due to two large pseudoaneurysms in the middle section of the graft. Microscopic evaluation demonstrated the areas of focal thinning along the entire prosthesis wall, with "foreign body" type reaction in the adjacent connective tissue. Transmission electron microscopy showed longitudinal fractures of Dacron fibers interposed with cellular structures, suggesting that destruction must have taken place significantly earlier. The problems of limited graft durability and graft surveillance are discussed. © The Author(s) 2015.

  5. Electrochemical destruction of nitrosamines

    Energy Technology Data Exchange (ETDEWEB)

    Lejen, T; Volchek, K; Ladanowski, C; Velicogna, D; Whittaker, H [Environment Canada, Ottawa, ON (Canada). Emergencies Engineering Div.

    1996-09-01

    Treatment conditions for the electrolytic destruction of nitrosamines were studied. The joint investigation between Canada and the Ukraine was part of an assessment of hazardous contaminants at former Soviet ICBM missile sites. The electrochemical destruction of N-dimethylnitrosamines (NDMA) on carbon/platinum electrodes was studied under basic and acidic conditions by UV spectroscopy, gas chromatography, mass spectroscopy, and colorimetry. Experiments with a 100 ppm NDMA solution showed that electrolytic-reduction was pH sensitive within a range of pH 0.5 to 4.0. Electrolysis was effective for the reduction of NDMA in strong acidic conditions. 30 refs., 1 tab., 4 figs.

  6. MATHEMATICAL MODEL FOR CALCULATION OF MINIMUM PRESSURE PERTAINING TO DESTRUCTION OF SURFACE CORROSION LAYER DUE TO IMPACT OF WORKING LIQUID REVERSIVE STREAM

    Directory of Open Access Journals (Sweden)

    I. V. Kachanov

    2014-01-01

    Full Text Available Due to balance of external and internal force capacities a variation quasistatic problem has been solved in the paper. The problem allows to determine optimum values of α and β angles in the accepted field of sliding lines when destruction pressure takes on a minimum value pmin. It has been ascertained that the minimum pressure pmin which is necessary for destruction of a corrosion layer is registered at stream compression coefficient λ = 0,063 and the pressure is equal to 8-17 MPa for the investigated speed range v = 80-140 m/s.

  7. Network models for solving the problem of multicriterial adaptive optimization of investment projects control with several acceptable technologies

    Science.gov (United States)

    Shorikov, A. F.; Butsenko, E. V.

    2017-10-01

    This paper discusses the problem of multicriterial adaptive optimization the control of investment projects in the presence of several technologies. On the basis of network modeling proposed a new economic and mathematical model and a method for solving the problem of multicriterial adaptive optimization the control of investment projects in the presence of several technologies. Network economic and mathematical modeling allows you to determine the optimal time and calendar schedule for the implementation of the investment project and serves as an instrument to increase the economic potential and competitiveness of the enterprise. On a meaningful practical example, the processes of forming network models are shown, including the definition of the sequence of actions of a particular investment projecting process, the network-based work schedules are constructed. The calculation of the parameters of network models is carried out. Optimal (critical) paths have been formed and the optimal time for implementing the chosen technologies of the investment project has been calculated. It also shows the selection of the optimal technology from a set of possible technologies for project implementation, taking into account the time and cost of the work. The proposed model and method for solving the problem of managing investment projects can serve as a basis for the development, creation and application of appropriate computer information systems to support the adoption of managerial decisions by business people.

  8. Facing towards or Turning away from Destructive Narcissism

    Science.gov (United States)

    Flynn, Denis; Skogstad, Helga

    2006-01-01

    This paper presents a detailed theoretical discussion of destructive narcissism in relation to Freud and Rosenfeld and later theorists. In destructive narcissism, the destructiveness is itself idealised and overrides "the vital functions which serve the purpose of self-preservation" (Freud, S., 1914, "On narcissism" S.E. 14: 87)--a feature which…

  9. PRIVACY PROTECTION PROBLEMS IN SOCIAL NETWORKS

    OpenAIRE

    OKUR, M. Cudi

    2011-01-01

    Protecting privacy has become a major concern for most social network users because of increased difficulties of controlling the online data. This article presents an assessment of the common privacy related risks of social networking sites. Open and hidden privacy risks of active and passive online profiles are examined and increasing share of social networking in these phenomena is discussed. Inadequacy of available legal and institutional protection is demonstrated and the effectiveness of...

  10. Can non-destructive inspection be reliable

    International Nuclear Information System (INIS)

    Silk, M.G.; Stoneham, A.M.; Temple, J.A.G.

    1988-01-01

    The paper on inspection is based on the book ''The reliability of non-destructive inspection: assessing the assessment of structures under stress'' by the present authors (published by Adam Hilger 1987). Emphasis is placed on the reliability of inspection and whether cracks in welds or flaws in components can be detected. The need for non-destructive testing and the historical attitudes to non-destructive testing are outlined, along with the case of failure. Factors influencing reliable inspection are discussed, and defect detection trials involving round robin tests are described. The development of reliable inspection techniques and the costs of reliability and unreliability are also examined. (U.K.)

  11. EFFLUENT TREATMENT FACILITY PEROXIDE DESTRUCTION CATALYST TESTING

    International Nuclear Information System (INIS)

    HALGREN DL

    2008-01-01

    The 200 Area Effluent Treatment Facility (ETF) main treatment train includes the peroxide destruction module (PDM) where the hydrogen peroxide residual from the upstream ultraviolet light/hydrogen peroxide oxidation unit is destroyed. Removal of the residual peroxide is necessary to protect downstream membranes from the strong oxidizer. The main component of the PDM is two reaction vessels utilizing granular activated carbon (GAC) as the reaction media. The PDM experienced a number of operability problems, including frequent plugging, and has not been utilized since the ETF changed to groundwater as the predominant feed. The unit seemed to be underperforming in regards to peroxide removal during the early periods of operation as well. It is anticipated that a functional PDM will be required for wastewater from the vitrification plant and other future streams. An alternate media or methodology needs to be identified to replace the GAC in the PDMs. This series of bench scale tests is to develop information to support an engineering study on the options for replacement of the existing GAC method for peroxide destruction at the ETF. A number of different catalysts will be compared as well as other potential methods such as strong reducing agents. The testing should lead to general conclusions on the viability of different catalysts and identify candidates for further study and evaluation

  12. A neural-network approach to the problem of photon-pair combinatorics

    International Nuclear Information System (INIS)

    Awes, T.C.

    1990-06-01

    A recursive neural-network algorithm is applied to the problem of correctly pairing photons from π 0 , η, and higher resonance decays in the presence of a large background of photons resulting from many simultaneous decays. The method uses the full information of the multi-photon final state to suppress the selection of false photon pairs which arise from the many combinatorial possibilities. The method is demonstrated for simulated photon events under semirealistic experimental conditions. 3 refs., 3 figs

  13. Destruction as a Step in Heidegger's Phenomenology

    Directory of Open Access Journals (Sweden)

    M.J Safian

    2014-08-01

    Full Text Available One of the most controversial issues in Heidegger’s philosophy is his claim that western philosophy tradition has overlooked the issue of Being. Heidegger’s attempt is to reveal the origins of this negligence by means of destruction. However, it seems that through such claim Heidegger aims to destroy and disvalue this tradition. In addition to defining and explaining destruction, our purpose in this article is to show that Heidegger’s goal is not to destroy the tradition of philosophy but the term destruction refers to a process which is a step in Heidegger’s phenomenology by means of which one can conceive and perceive Being better because only through such destruction ontology can fully assure itself in a phenomenological way of the genuine character of its concepts. The necessity of doing destruction in Heidegger’s thought has also been discussed and his persistence on it has been shown in two of his works, one belongs to early and another to later Heidegger.

  14. A PSO based Artificial Neural Network approach for short term unit commitment problem

    Directory of Open Access Journals (Sweden)

    AFTAB AHMAD

    2010-10-01

    Full Text Available Unit commitment (UC is a non-linear, large scale, complex, mixed-integer combinatorial constrained optimization problem. This paper proposes, a new hybrid approach for generating unit commitment schedules using swarm intelligence learning rule based neural network. The training data has been generated using dynamic programming for machines without valve point effects and using genetic algorithm for machines with valve point effects. A set of load patterns as inputs and the corresponding unit generation schedules as outputs are used to train the network. The neural network fine tunes the best results to the desired targets. The proposed approach has been validated for three thermal machines with valve point effects and without valve point effects. The results are compared with the approaches available in the literature. The PSO-ANN trained model gives better results which show the promise of the proposed methodology.

  15. How do people with long-term mental health problems negotiate relationships with network members at times of crisis?

    Science.gov (United States)

    Walker, Sandra; Kennedy, Anne; Vassilev, Ivaylo; Rogers, Anne

    2018-02-01

    Social network processes impact on the genesis and management of mental health problems. There is currently less understanding of the way people negotiate networked relationships in times of crisis compared to how they manage at other times. This paper explores the patterns and nature of personal network involvement at times of crises and how these may differ from day-to-day networks of recovery and maintenance. Semi-structured interviews with 25 participants with a diagnosis of long-term mental health (MH) problems drawn from recovery settings in the south of England. Interviews centred on personal network mapping of members and resources providing support. The mapping interviews explored the work of network members and changes in times of crisis. Interviews were recorded, transcribed and analysed using a framework analysis. Three key themes were identified: the fluidity of network relationality between crisis and recovery; isolation as a means of crises management; leaning towards peer support. Personal network input retreated at times of crisis often as result of "ejection" from the network by participants who used self-isolation as a personal management strategy in an attempt to deal with crises. Peer support is considered useful during a crisis, whilst the role of services was viewed with some ambiguity. Social networks membership, and type and depth of involvement, is subject to change between times of crisis and everyday support. This has implications for managing mental health in terms of engaging with network support differently in times of crises versus recovery and everyday living. © 2017 The Authors Health Expectations Published by John Wiley & Sons Ltd.

  16. The Destructive/Non-Destructive Identification of Enameled Pottery, Glass Artifacts and Associated Pigments—A Brief Overview

    Directory of Open Access Journals (Sweden)

    Philippe Colomban

    2013-07-01

    Full Text Available The birth of Chemistry can be found in two main practices: (i the Arts du feu (ceramic and glass, metallurgy, i.e., inorganic and solid state chemistry and (ii the preparation of remedies, alcohols and perfumes, dyes, i.e., organic and liquid state chemistry. After a brief survey of the history of (glazed pottery and (enameled glass artifacts, the development of destructive and non-destructive analytical techniques during the last few centuries is reviewed. Emphasis is put on mobile non-destructive Raman microspectroscopy of pigments and their glass/glaze host matrices for chronological/technological expertise. The techniques of white opacification, blue, yellow, green, red, and black coloring, are used as examples to point out the interest of pigments as chronological/technological markers.

  17. A dual exterior point simplex type algorithm for the minimum cost network flow problem

    Directory of Open Access Journals (Sweden)

    Geranis George

    2009-01-01

    Full Text Available A new dual simplex type algorithm for the Minimum Cost Network Flow Problem (MCNFP is presented. The proposed algorithm belongs to a special 'exterior- point simplex type' category. Similarly to the classical network dual simplex algorithm (NDSA, this algorithm starts with a dual feasible tree-solution and reduces the primal infeasibility, iteration by iteration. However, contrary to the NDSA, the new algorithm does not always maintain a dual feasible solution. Instead, the new algorithm might reach a basic point (tree-solution outside the dual feasible area (exterior point - dual infeasible tree.

  18. INTERCONNECTING NETWORKS WITH DIFFERENT LEVELS OF SECURITY – A PRESENT NATO PROBLEM

    Directory of Open Access Journals (Sweden)

    LIVIU TATOMIR

    2016-07-01

    Full Text Available A situation often met in the Romanian Armed Forces in recent years is the need for interconnecting two networks (domains with different levels of classification. Considering that the Romanian armed troops are involved in numerous missions with NATO partners, solutions, already implemented across the organization, are considered to be applied in domestic systems, also. This paper presents the solutions adopted by NATO in order to solve the problem of cross -domains interconnections. We present the maturity level reached by these solutions and the possibility of implementing these solutions in the Romanian Armed Forces, with or without specific adaptation to our own rules and regulations. The goal is to use a NATO already proved solution to our national classified networks.

  19. A Path-Based Gradient Projection Algorithm for the Cost-Based System Optimum Problem in Networks with Continuously Distributed Value of Time

    Directory of Open Access Journals (Sweden)

    Wen-Xiang Wu

    2014-01-01

    Full Text Available The cost-based system optimum problem in networks with continuously distributed value of time is formulated as a path-based form, which cannot be solved by the Frank-Wolfe algorithm. In light of magnitude improvement in the availability of computer memory in recent years, path-based algorithms have been regarded as a viable approach for traffic assignment problems with reasonably large network sizes. We develop a path-based gradient projection algorithm for solving the cost-based system optimum model, based on Goldstein-Levitin-Polyak method which has been successfully applied to solve standard user equilibrium and system optimum problems. The Sioux Falls network tested is used to verify the effectiveness of the algorithm.

  20. Delineating the Sequelae of Destructive and Constructive Interparental Conflict for Children within an Evolutionary Framework

    Science.gov (United States)

    Davies, Patrick T.; Martin, Meredith J.; Cicchetti, Dante

    2012-01-01

    We examined the joint role of constructive and destructive interparental conflict in predicting children's emotional insecurity and psychological problems. In Study 1, 250 early adolescents (M = 12.6 years) and their primary caregivers completed assessments of family and child functioning. In Study 2, 201 mothers and their 2-year-old children…

  1. Neural network monitoring of resistive welding

    International Nuclear Information System (INIS)

    Quero, J.M.; Millan, R.L.; Franquelo, L.G.; Canas, J.

    1994-01-01

    Supervision of welding processes is one of the most important and complicated tasks in production lines. Artificial Neural Networks have been applied for modeling and control of ph physical processes. In our paper we propose the use of a neural network classifier for on-line non-destructive testing. This system has been developed and installed in a resistive welding station. Results confirm the validity of this novel approach. (Author) 6 refs

  2. Numerical Simulation of the Layer-Bylayer Destruction of Cylindrical Shells Under Explosive Loading

    Science.gov (United States)

    Abrosimov, N. A.; Novoseltseva, N. A.

    2015-09-01

    A technique of numerical analysis of the influence of reinforcement structure on the nature of the dynamic response and the process of layer-by-layer destruction of layered fiberglass cylindrical shells under an axisymmetric internal explosive loading is elaborated. The kinematic model of deformation of the laminate package is based on a nonclassical theory of shells. The geometric dependences are based on simple quadratic relations of the nonlinear theory of elasticity. The relationship between the stress and strain tensors are established by using Hooke's law for orthotropic bodies with account of degradation of stiffness characteristics of the multilayer composite due to the local destruction of some its elementary layers. An energetically consistent system of dynamic equations for composite cylindrical shells is obtained by minimizing the functional of total energy of the shell as a three-dimensional body. The numerical method for solving the formulated initial boundary-value problem is based on an explicit variational-difference scheme. Results confirming the reliability of the method used to analyze the influence of reinforcement structure on the character of destruction and the bearing capacity of pulse-loaded cylindrical shells are presented.

  3. A recurrent neural network for solving bilevel linear programming problem.

    Science.gov (United States)

    He, Xing; Li, Chuandong; Huang, Tingwen; Li, Chaojie; Huang, Junjian

    2014-04-01

    In this brief, based on the method of penalty functions, a recurrent neural network (NN) modeled by means of a differential inclusion is proposed for solving the bilevel linear programming problem (BLPP). Compared with the existing NNs for BLPP, the model has the least number of state variables and simple structure. Using nonsmooth analysis, the theory of differential inclusions, and Lyapunov-like method, the equilibrium point sequence of the proposed NNs can approximately converge to an optimal solution of BLPP under certain conditions. Finally, the numerical simulations of a supply chain distribution model have shown excellent performance of the proposed recurrent NNs.

  4. A parallel algorithm for solving linear equations arising from one-dimensional network problems

    International Nuclear Information System (INIS)

    Mesina, G.L.

    1991-01-01

    One-dimensional (1-D) network problems, such as those arising from 1- D fluid simulations and electrical circuitry, produce systems of sparse linear equations which are nearly tridiagonal and contain a few non-zero entries outside the tridiagonal. Most direct solution techniques for such problems either do not take advantage of the special structure of the matrix or do not fully utilize parallel computer architectures. We describe a new parallel direct linear equation solution algorithm, called TRBR, which is especially designed to take advantage of this structure on MIMD shared memory machines. The new method belongs to a family of methods which split the coefficient matrix into the sum of a tridiagonal matrix T and a matrix comprised of the remaining coefficients R. Efficient tridiagonal methods are used to algebraically simplify the linear system. A smaller auxiliary subsystem is created and solved and its solution is used to calculate the solution of the original system. The newly devised BR method solves the subsystem. The serial and parallel operation counts are given for the new method and related earlier methods. TRBR is shown to have the smallest operation count in this class of direct methods. Numerical results are given. Although the algorithm is designed for one-dimensional networks, it has been applied successfully to three-dimensional problems as well. 20 refs., 2 figs., 4 tabs

  5. 27 CFR 25.223 - Destruction of beer off brewery premises.

    Science.gov (United States)

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 1 2010-04-01 2010-04-01 false Destruction of beer off... TRADE BUREAU, DEPARTMENT OF THE TREASURY LIQUORS BEER Voluntary Destruction § 25.223 Destruction of beer off brewery premises. (a) Destruction without supervision. A brewer may destroy beer without...

  6. Indirect self-destructiveness in individuals with schizophrenia

    Directory of Open Access Journals (Sweden)

    Konstantinos Tsirigotis

    2017-06-01

    Full Text Available Objective: To explore the indirect self-destructiveness syndrome in patients with schizophrenia. Methods: Two hundred individuals with paranoid schizophrenia (117 men and 83 women, mean age 37.15 years, all in remission, were examined using the Polish version of the Chronic Self-Destructiveness Scale. Two hundred well-matched healthy individuals served as a control group. Results: The intensity of indirect self-destructiveness was greater in the schizophrenia group than in controls. The intensity of each manifestation was as follows (in decreasing order: helplessness and passiveness in the face of difficulties (A5, personal and social neglects (A3, lack of planfulness (A4, poor health maintenance (A2, transgression and risk (A1. Conclusion: Patients with schizophrenia displayed more behaviors that were indirectly self-destructive than healthy controls; they scored better than healthy controls only on caring for their own health. The patients showed the lowest intensity of behaviors connected with the active form of indirect self-destructiveness, and the highest intensity of behaviors connected with the passive form. These findings may enable delivery of more effective forms of pharmacological and psychosocial help to patients with schizophrenia.

  7. Sensitivity versus accuracy in multiclass problems using memetic Pareto evolutionary neural networks.

    Science.gov (United States)

    Fernández Caballero, Juan Carlos; Martínez, Francisco José; Hervás, César; Gutiérrez, Pedro Antonio

    2010-05-01

    This paper proposes a multiclassification algorithm using multilayer perceptron neural network models. It tries to boost two conflicting main objectives of multiclassifiers: a high correct classification rate level and a high classification rate for each class. This last objective is not usually optimized in classification, but is considered here given the need to obtain high precision in each class in real problems. To solve this machine learning problem, we use a Pareto-based multiobjective optimization methodology based on a memetic evolutionary algorithm. We consider a memetic Pareto evolutionary approach based on the NSGA2 evolutionary algorithm (MPENSGA2). Once the Pareto front is built, two strategies or automatic individual selection are used: the best model in accuracy and the best model in sensitivity (extremes in the Pareto front). These methodologies are applied to solve 17 classification benchmark problems obtained from the University of California at Irvine (UCI) repository and one complex real classification problem. The models obtained show high accuracy and a high classification rate for each class.

  8. A Location-Inventory-Routing Problem in Forward and Reverse Logistics Network Design

    Directory of Open Access Journals (Sweden)

    Qunli Yuchi

    2016-01-01

    Full Text Available We study a new problem of location-inventory-routing in forward and reverse logistic (LIRP-FRL network design, which simultaneously integrates the location decisions of distribution centers (DCs, the inventory policies of opened DCs, and the vehicle routing decision in serving customers, in which new goods are produced and damaged goods are repaired by a manufacturer and then returned to the market to satisfy customers’ demands as new ones. Our objective is to minimize the total costs of manufacturing and remanufacturing goods, building DCs, shipping goods (new or recovered between the manufacturer and opened DCs, and distributing new or recovered goods to customers and ordering and storage costs of goods. A nonlinear integer programming model is proposed to formulate the LIRP-FRL. A new tabu search (NTS algorithm is developed to achieve near optimal solution of the problem. Numerical experiments on the benchmark instances of a simplified version of the LIRP-FRL, the capacitated location routing problem, and the randomly generated LIRP-FRL instances demonstrate the effectiveness and efficiency of the proposed NTS algorithm in problem resolution.

  9. Mediated electrochemical hazardous waste destruction

    International Nuclear Information System (INIS)

    Hickman, R.G.; Farmer, J.C.; Wang, F.T.

    1991-08-01

    There are few permitted processes for mixed waste (radioactive plus chemically hazardous) treatment. We are developing electrochemical processes that convert the toxic organic components of mixed waste to water, carbon dioxide, an innocuous anions such as chloride. Aggressive oxidizer ions such as Ag 2+ or Ce +4 are produced at an anode. These can attack the organic molecules directly. They can also attack water which yields hydroxyl free radicals that in turn attack the organic molecules. The condensed (i.e., solid and/or liquid) effluent streams contain the inorganic radionuclide forms. These may be treated with existing technology and prepared for final disposal. Kinetics and the extent of destruction of some toxic organics have been measured. Depending on how the process is operated, coulombic efficiency can be nearly 100%. In addition, hazardous organic materials are becoming very expensive to dispose of and when they are combined with transuranic radioactive elements no processes are presently permitted. Mediated electrochemical oxidation is an ambient-temperature aqueous-phase process that can be used to oxidize organic components of mixed wastes. Problems associated with incineration, such as high-temperature volatilization of radionuclides, are avoided. Historically, Ag (2) has been used as a mediator in this process. Fe(6) and Co(3) are attractive alternatives to Ag(2) since they form soluble chlorides during the destruction of chlorinated solvents. Furthermore, silver itself is a toxic heavy metal. Quantitative data has been obtained for the complete oxidation of ethylene glycol by Fe(6) and Co(3). Though ethylene glycol is a nonhalogenated organic, this data has enabled us to make direct comparisons of activities of Fe(6) and Co(3) with Ag(2). Very good quantitative data for the oxidation of ethylene glycol by Ag(2) had already been collected. 4 refs., 6 figs

  10. The destruction of organic matter

    CERN Document Server

    Gorsuch, T T

    1970-01-01

    International Series of Monographs in Analytical Chemistry, Volume 39: The Destruction of Organic Matter focuses on the identification of trace elements in organic compounds. The monograph first offers information on the processes involved in the determination of trace elements in organic matters, as well as the methods not involving complete destruction of these elements. The text surveys the sources of errors in the processes responsible in pinpointing elements in organic compounds. These processes include sampling, disruption of the samples, manipulation, and measurements. The book

  11. Secure Wireless Sensor Networks: Problems and Solutions

    Directory of Open Access Journals (Sweden)

    Fei Hu

    2003-08-01

    Full Text Available As sensor networks edge closer towards wide-spread deployment, security issues become a central concern. So far, the main research focus has been on making sensor networks feasible and useful, and less emphasis was placed on security. This paper analyzes security challenges in wireless sensor networks and summarizes key issues that should be solved for achieving the ad hoc security. It gives an overview of the current state of solutions on such key issues as secure routing, prevention of denial-of-service and key management service. We also present some secure methods to achieve security in wireless sensor networks. Finally we present our integrated approach to securing sensor networks.

  12. Application of Artificial Neural Networks to Complex Groundwater Management Problems

    International Nuclear Information System (INIS)

    Coppola, Emery; Poulton, Mary; Charles, Emmanuel; Dustman, John; Szidarovszky, Ferenc

    2003-01-01

    As water quantity and quality problems become increasingly severe, accurate prediction and effective management of scarcer water resources will become critical. In this paper, the successful application of artificial neural network (ANN) technology is described for three types of groundwater prediction and management problems. In the first example, an ANN was trained with simulation data from a physically based numerical model to predict head (groundwater elevation) at locations of interest under variable pumping and climate conditions. The ANN achieved a high degree of predictive accuracy, and its derived state-transition equations were embedded into a multiobjective optimization formulation and solved to generate a trade-off curve depicting water supply in relation to contamination risk. In the second and third examples, ANNs were developed with real-world hydrologic and climate data for different hydrogeologic environments. For the second problem, an ANN was developed using data collected for a 5-year, 8-month period to predict heads in a multilayered surficial and limestone aquifer system under variable pumping, state, and climate conditions. Using weekly stress periods, the ANN substantially outperformed a well-calibrated numerical flow model for the 71-day validation period, and provided insights into the effects of climate and pumping on water levels. For the third problem, an ANN was developed with data collected automatically over a 6-week period to predict hourly heads in 11 high-capacity public supply wells tapping a semiconfined bedrock aquifer and subject to large well-interference effects. Using hourly stress periods, the ANN accurately predicted heads for 24-hour periods in all public supply wells. These test cases demonstrate that the ANN technology can solve a variety of complex groundwater management problems and overcome many of the problems and limitations associated with traditional physically based flow models

  13. Systematic network synthesis and design: Problem formulation, superstructure generation, data management and solution

    DEFF Research Database (Denmark)

    Quaglia, Alberto; Gargalo, Carina L.; Chairakwongsa, Siwanat

    2015-01-01

    when large problems are considered. In an earlier work, we proposed a computer-aided framework for synthesis and design of process networks. In this contribution, we expand the framework by including methods and tools developed to structure, automate and simplify the mathematical formulation......The developments obtained in recent years in the field of mathematical programming considerably reduced the computational time and resources needed to solve large and complex Mixed Integer Non Linear Programming (MINLP) problems. Nevertheless, the application of these methods in industrial practice...... is still limited by the complexity associated with the mathematical formulation of some problems. In particular, the tasks of design space definition and representation as superstructure, as well as the data collection, validation and handling may become too complex and cumbersome to execute, especially...

  14. Destruction as a Step in Heidegger\\'s Phenomenology

    Directory of Open Access Journals (Sweden)

    M.J Safian

    2014-09-01

    Full Text Available One of the most controversial issues in Heidegger’s philosophy is his claim that western philosophy tradition has overlooked the issue of Being. Heidegger’s attempt is to reveal the origins of this negligence by means of destruction. However, it seems that through such claim Heidegger aims to destroy and disvalue this tradition. In addition to defining and explaining destruction, our purpose in this article is to show that Heidegger’s goal is not to destroy the tradition of philosophy but the term destruction refers to a process which is a step in Heidegger’s phenomenology by means of which one can conceive and perceive Being better because only through such destruction ontology can fully assure itself in a phenomenological way of the genuine character of its concepts. The necessity of doing destruction in Heidegger’s thought has also been discussed and his persistence on it has been shown in two of his works, one belongs to early and another to later Heidegger.

  15. Unsupervised neural networks for solving Troesch's problem

    International Nuclear Information System (INIS)

    Raja Muhammad Asif Zahoor

    2014-01-01

    In this study, stochastic computational intelligence techniques are presented for the solution of Troesch's boundary value problem. The proposed stochastic solvers use the competency of a feed-forward artificial neural network for mathematical modeling of the problem in an unsupervised manner, whereas the learning of unknown parameters is made with local and global optimization methods as well as their combinations. Genetic algorithm (GA) and pattern search (PS) techniques are used as the global search methods and the interior point method (IPM) is used for an efficient local search. The combination of techniques like GA hybridized with IPM (GA-IPM) and PS hybridized with IPM (PS-IPM) are also applied to solve different forms of the equation. A comparison of the proposed results obtained from GA, PS, IPM, PS-IPM and GA-IPM has been made with the standard solutions including well known analytic techniques of the Adomian decomposition method, the variational iterational method and the homotopy perturbation method. The reliability and effectiveness of the proposed schemes, in term of accuracy and convergence, are evaluated from the results of statistical analysis based on sufficiently large independent runs. (interdisciplinary physics and related areas of science and technology)

  16. Aesthetics of destruction in contemporary science fiction cinema

    OpenAIRE

    Warton, John Phillips

    2015-01-01

    Mass destruction imagery within the science fiction film genre is not a new cinematic development. However, a swell of destruction-centred films has emerged since the proliferation of digital technologies and computer-generated imagery that reflect concerns that extend beyond notions of spectacle. Through illusionistic realism techniques, the aesthetics of mass destruction imagery within science fiction cinema can be seen as appropriating the implied veracity of other film trad...

  17. PROBLEMS OF ROUTE NETWORK AND AIRCRAFT FLEET OPTIMIZATION AS A SPECIFIC TASK OF AIRLINE STRATEGIC PLANNING

    Directory of Open Access Journals (Sweden)

    M. A. Karakuts

    2015-01-01

    Full Text Available The basic problems of route network and aircraft fleet optimization and its role in airline strategic planning are considered. Measures to improve the methods of its implementation are proposed.

  18. Destructive electronics from electrochemical-mechanically triggered chemical dissolution

    International Nuclear Information System (INIS)

    Sim, Kyoseung; Wang, Xu; Yu, Cunjiang; Li, Yuhang; Linghu, Changhong; Song, Jizhou; Gao, Yang

    2017-01-01

    The considerable need to enhance data and hardware security suggest one possible future for electronics where it is possible to destroy them and even make them disappear physically. This paper reports a type of destructive electronics which features fast transience from chemical dissolution on-demand triggered in an electrochemical-mechanical manner. The detailed materials, mechanics, and device construction of the destructive electronics are presented. Experiment and analysis of the triggered releasing and transience study of electronic materials, resistors and metal-oxide-semiconductor field effect transistors illustrate the key aspects of the destructive electronics. The reported destructive electronics is useful in a wide range of areas from security and defense, to medical applications (paper)

  19. AN EVOLUTIONARY ALGORITHM FOR CHANNEL ASSIGNMENT PROBLEM IN WIRELESS MOBILE NETWORKS

    Directory of Open Access Journals (Sweden)

    Yee Shin Chia

    2012-12-01

    Full Text Available The channel assignment problem in wireless mobile network is the assignment of appropriate frequency spectrum to incoming calls while maintaining a satisfactory level of electromagnetic compatibility (EMC constraints. An effective channel assignment strategy is important due to the limited capacity of frequency spectrum in wireless mobile network. Most of the existing channel assignment strategies are based on deterministic methods. In this paper, an adaptive genetic algorithm (GA based channel assignment strategy is introduced for resource management and to reduce the effect of EMC interferences. The most significant advantage of the proposed optimization method is its capability to handle both the reassignment of channels for existing calls as well as the allocation of channel to a new incoming call in an adaptive process to maximize the utility of the limited resources. It is capable to adapt the population size to the number of eligible channels for a particular cell upon new call arrivals to achieve reasonable convergence speed. The MATLAB simulation on a 49-cells network model for both uniform and nonuniform call traffic distributions showed that the proposed channel optimization method can always achieve a lower average new incoming call blocking probability compared to the deterministic based channel assignment strategy.

  20. Cooperative VET in Training Networks: Analysing the Free-Rider Problem in a Sociology-of-Conventions Perspective

    Directory of Open Access Journals (Sweden)

    Regula Julia Leemann

    2015-12-01

    Full Text Available In training networks, particularly small and medium-sized enterprises pool their resources to train apprentices within the framework of the dual VET system, while an intermediary organisation is tasked with managing operations. Over the course of their apprenticeship, the apprentices switch from one training company to another on a (half- yearly basis. Drawing on a case study of four training networks in Switzerland and the theoretical framework of the sociology of conventions, this paper aims to understand the reasons for the slow dissemination and reluctant adoption of this promising form of organising VET in Switzerland. The results of the study show that the system of moving from one company to another creages a variety of free-rider constellations in the distribution of the collectively generated corporative benefits. This explains why companies are reluctant to participate in this model. For the network to be sustainable, the intermediary organisation has to address discontent arising from free-rider problems while taking into account that the solutions found are always tentative and will often result in new free-rider problems.

  1. [Problem-solving strategies and marital satisfaction].

    Science.gov (United States)

    Kriegelewicz, Olga

    2006-01-01

    This study investigated the relation between problem-solving strategies in the marital conflict and marital satisfaction. Four problem-solving strategies (Dialogue, Loyalty, Escalation of conflict and Withdrawal) were measured by the Problem-Solving Strategies Inventory, in two versions: self-report and report of partners' perceived behaviour. This measure refers to the concept of Rusbult, Johnson and Morrow, and meets high standards of reliability (alpha Cronbach from alpha = 0.78 to alpha = 0.94) and validity. Marital satisfaction was measured by Marriage Success Scale. The sample was composed of 147 marital couples. The study revealed that satisfied couples, in comparison with non-satisfied couples, tend to use constructive problem-solving strategies (Dialogue and Loyalty). They rarely use destructive strategies like Escalation of conflict or Withdrawal. Dialogue is the strategy connected with satisfaction in a most positive manner. These might be very important guidelines to couples' psychotherapy. Loyalty to oneself is a significant positive predictor of male satisfaction is also own Loyalty. The study shows that constructive attitudes are the most significant predictors of marriage satisfaction. It is therefore worth concentrating mostly on them in the psychotherapeutic process instead of eliminating destructive attitudes.

  2. Non-destructive testing. V. 2

    International Nuclear Information System (INIS)

    Farley, J.M.; Nichols, R.W.

    1988-01-01

    The book entitled 'Non-destructive Testing' Volume 2, contains the proceedings of the fourth European Conference, organized by the British Institute of Non-Destructive Testing and held in London, September 1987. The volume contains seven chapters which examine the reliability of NDT, the economics of NDT and the use of NDT in:- civil engineering; oil, gas, coal and petrochemical industries; iron and steel industries; aerospace industry; and the nuclear and electricity supply industries. The seven chapters contain 78 papers, of which 19 are selected for INIS and indexed separately. (U.K.)

  3. Software Design Challenges in Time Series Prediction Systems Using Parallel Implementation of Artificial Neural Networks

    Directory of Open Access Journals (Sweden)

    Narayanan Manikandan

    2016-01-01

    Full Text Available Software development life cycle has been characterized by destructive disconnects between activities like planning, analysis, design, and programming. Particularly software developed with prediction based results is always a big challenge for designers. Time series data forecasting like currency exchange, stock prices, and weather report are some of the areas where an extensive research is going on for the last three decades. In the initial days, the problems with financial analysis and prediction were solved by statistical models and methods. For the last two decades, a large number of Artificial Neural Networks based learning models have been proposed to solve the problems of financial data and get accurate results in prediction of the future trends and prices. This paper addressed some architectural design related issues for performance improvement through vectorising the strengths of multivariate econometric time series models and Artificial Neural Networks. It provides an adaptive approach for predicting exchange rates and it can be called hybrid methodology for predicting exchange rates. This framework is tested for finding the accuracy and performance of parallel algorithms used.

  4. An MPCC Formulation and Its Smooth Solution Algorithm for Continuous Network Design Problem

    Directory of Open Access Journals (Sweden)

    Guangmin Wang

    2017-12-01

    Full Text Available Continuous network design problem (CNDP is searching for a transportation network configuration to minimize the sum of the total system travel time and the investment cost of link capacity expansions by considering that the travellers follow a traditional Wardrop user equilibrium (UE to choose their routes. In this paper, the CNDP model can be formulated as mathematical programs with complementarity constraints (MPCC by describing UE as a non-linear complementarity problem (NCP. To address the difficulty resulting from complementarity constraints in MPCC, they are substituted by the Fischer-Burmeister (FB function, which can be smoothed by the introduction of the smoothing parameter. Therefore, the MPCC can be transformed into a well-behaved non-linear program (NLP by replacing the complementarity constraints with a smooth equation. Consequently, the solver such as LINDOGLOBAL in GAMS can be used to solve the smooth approximate NLP to obtain the solution to MPCC for modelling CNDP. The numerical experiments on the example from the literature demonstrate that the proposed algorithm is feasible.

  5. Responding to Destructive Interpersonal Interactions: A way forward ...

    African Journals Online (AJOL)

    Responding to Destructive Interpersonal Interactions: A way forward for ... cultural intolerance and other destructive interpersonal interactions and relationships clearly ... This work is licensed under a Creative Commons Attribution 3.0 License.

  6. The Average Network Flow Problem: Shortest Path and Minimum Cost Flow Formulations, Algorithms, Heuristics, and Complexity

    Science.gov (United States)

    2012-09-13

    46, 1989. [75] S. Melkote and M.S. Daskin . An integrated model of facility location and transportation network design. Transportation Research Part A ... a work of the U.S. Government and is not subject to copyright protection in the United States. AFIT/DS/ENS/12-09 THE AVERAGE NETWORK FLOW PROBLEM...focused thinking (VFT) are used sparingly, as is the case across the entirety of the supply chain literature. We provide a VFT tutorial for supply chain

  7. Network Monitoring as a Streaming Analytics Problem

    KAUST Repository

    Gupta, Arpit

    2016-11-02

    Programmable switches make it easier to perform flexible network monitoring queries at line rate, and scalable stream processors make it possible to fuse data streams to answer more sophisticated queries about the network in real-time. Unfortunately, processing such network monitoring queries at high traffic rates requires both the switches and the stream processors to filter the traffic iteratively and adaptively so as to extract only that traffic that is of interest to the query at hand. Others have network monitoring in the context of streaming; yet, previous work has not closed the loop in a way that allows network operators to perform streaming analytics for network monitoring applications at scale. To achieve this objective, Sonata allows operators to express a network monitoring query by considering each packet as a tuple and efficiently partitioning each query between the switches and the stream processor through iterative refinement. Sonata extracts only the traffic that pertains to each query, ensuring that the stream processor can scale traffic rates of several terabits per second. We show with a simple example query involving DNS reflection attacks and traffic traces from one of the world\\'s largest IXPs that Sonata can capture 95% of all traffic pertaining to the query, while reducing the overall data rate by a factor of about 400 and the number of required counters by four orders of magnitude. Copyright 2016 ACM.

  8. Peer influences on internalizing and externalizing problems among adolescents: a longitudinal social network analysis.

    Science.gov (United States)

    Fortuin, Janna; van Geel, Mitch; Vedder, Paul

    2015-04-01

    Adolescents who like each other may become more similar to each other with regard to internalizing and externalizing problems, though it is not yet clear which social mechanisms explain these similarities. In this longitudinal study, we analyzed four mechanisms that may explain similarity in adolescent peer networks with regard to externalizing and internalizing problems: selection, socialization, avoidance and withdrawal. At three moments during one school-year, we asked 542 adolescents (8th grade, M-age = 13.3 years, 51 % female) to report who they liked in their classroom, and their own internalizing and externalizing problems. Adolescents tend to prefer peers who have similar externalizing problem scores, but no significant selection effect was found for internalizing problems. Adolescents who share the same group of friends socialize each other and then become more similar with respect to externalizing problems, but not with respect to internalizing problems. We found no significant effects for avoidance or withdrawal. Adolescents may choose to belong to a peer group that is similar to them in terms of externalizing problem behaviors, and through peer group socialization (e.g., enticing, modelling, mimicking, and peer pressure) become more similar to that group over time.

  9. An Analysis of the Network Selection Problem for Heterogeneous Environments with User-Operator Joint Satisfaction and Multi-RAT Transmission

    Directory of Open Access Journals (Sweden)

    J. J. Escudero-Garzás

    2017-01-01

    Full Text Available The trend in wireless networks is that several wireless radio access technologies (RATs coexist in the same area, forming heterogeneous networks in which the users may connect to any of the available RATs. The problem of associating a user to the most suitable RAT, known as network selection problem (NSP, is of capital importance for the satisfaction of the users in these emerging environments. However, also the satisfaction of the operator is important in this scenario. In this work, we propose that a connection may be served by more than one RAT by using multi-RAT terminals. We formulate the NSP with multiple RAT association based on utility functions that take into consideration both user’s satisfaction and provider’s satisfaction. As users are characterized according to their expected quality of service, our results exhaustively analyze the influence of the user’s profile, along with the network topology and the type of applications served.

  10. Guidebook on destructive examination of water reactor fuel

    International Nuclear Information System (INIS)

    1997-01-01

    As a result of common efforts of fuel vendors, utilities and research institutes the average burnup pf design batch fuels was increased for both PWRs and BWRs and the fuel failure rate has been reduced. The previously published Guidebook on Non-Destructive Examination of Water Reactor Fuel recommended that more detailed destructive techniques are required for complete understanding of fuel performance. On the basis of contributions of the 14 participants in the ED-WARF-II CRP and proceedings of IAEA Technical Committee on Recent Developments in Post-irradiation Examination Techniques for Water Reactor Fuel this guidebook was compiled. It gives a complete survey of destructive techniques available to date worldwide. The following examination techniques are described in detailed including major principles of equipment design: microstructural studies; elemental analysis; isotopic analysis; measurement of physical properties; measurement of mechanical properties. Besides the examination techniques, methods for refabrication of experimental rods from high burnup power reactor rods as well as methods for verification of non-destructive techniques by using destructive techniques is included

  11. Adolescent peer relationships and behavior problems predict young adults' communication on social networking websites.

    Science.gov (United States)

    Mikami, Amori Yee; Szwedo, David E; Allen, Joseph P; Evans, Meredyth A; Hare, Amanda L

    2010-01-01

    This study examined online communication on social networking web pages in a longitudinal sample of 92 youths (39 male, 53 female). Participants' social and behavioral adjustment was assessed when they were ages 13-14 years and again at ages 20-22 years. At ages 20-22 years, participants' social networking website use and indicators of friendship quality on their web pages were coded by observers. Results suggested that youths who had been better adjusted at ages 13-14 years were more likely to be using social networking web pages at ages 20-22 years, after statistically controlling for age, gender, ethnicity, and parental income. Overall, youths' patterns of peer relationships, friendship quality, and behavioral adjustment at ages 13-14 years and at ages 20-22 years predicted similar qualities of interaction and problem behavior on their social networking websites at ages 20-22 years. Findings are consistent with developmental theory asserting that youths display cross-situational continuity in their social behaviors and suggest that the conceptualization of continuity may be extended into the online domain. Copyright 2009 APA, all rights reserved.

  12. Osteoclast inhibition impairs chondrosarcoma growth and bone destruction.

    Science.gov (United States)

    Otero, Jesse E; Stevens, Jeff W; Malandra, Allison E; Fredericks, Douglas C; Odgren, Paul R; Buckwalter, Joseph A; Morcuende, Jose

    2014-12-01

    Because Chondrosarcoma is resistant to available chemotherapy and radiation regimens, wide resection is the mainstay in treatment, which frequently results in high morbidity and which may not prevent local recurrence. There is a clear need for improved adjuvant treatment of this malignancy. We have observed the presence of osteoclasts in the microenvironment of chondrosarcoma in human pathological specimens. We utilized the Swarm rat chondrosarcoma (SRC) model to test the hypothesis that osteoclasts affect chondrosarcoma pathogenesis. We implanted SRC tumors in tibia of Sprague-Dawley rats and analyzed bone histologically and radiographically for bone destruction and tumor growth. At three weeks, tumors invaded local bone causing cortical disruption and trabecular resorption. Bone destruction was accompanied by increased osteoclast number and resorbed bone surface. Treatment of rats with the zoledronic acid prevented cortical destruction, inhibited trabecular resorption, and resulted in decreased tumor volume in bone. To confirm that inhibition of osteoclasts per se, and not off-target effects of drug, was responsible for the prevention of tumor growth and bone destruction, we implanted SRC into osteopetrotic rat tibia. SRC-induced bone destruction and tumor growth were impaired in osteopetrotic bone compared with control bone. The results from our animal model demonstrate that osteoclasts contribute to chondrosarcoma-mediated bone destruction and tumor growth and may represent a therapeutic target in particular chondrosarcoma patients. © 2014 Orthopaedic Research Society. Published by Wiley Periodicals, Inc.

  13. Distributed Problem Solving: Adaptive Networks with a Computer Intermediary Resource. Intelligent Executive Computer Communication

    Science.gov (United States)

    1991-06-01

    Proceedings of The National Conference on Artificial Intelligence , pages 181-184, The American Association for Aritificial Intelligence , Pittsburgh...Intermediary Resource: Intelligent Executive Computer Communication John Lyman and Carla J. Conaway University of California at Los Angeles for Contracting...Include Security Classification) Interim Report: Distributed Problem Solving: Adaptive Networks With a Computer Intermediary Resource: Intelligent

  14. Destruction of high explosives and wastes containing high explosives using the molten salt destruction process

    International Nuclear Information System (INIS)

    Upadhye, R.S.; Brummond, W.A.; Pruneda, C.O.

    1992-01-01

    This paper reports the Molten Salt Destruction (MSD) Process which has been demonstrated for the destruction of HE and HE-containing wastes. MSD has been used by Rockwell International and by Anti-Pollution Systems to destroy hazardous wastes. MSD converts the organic constituents (including the HE) of the waste into non-hazardous substances such as carbon dioxide, nitrogen and water. In the case of HE-containing mixed wastes, any actinides in the waste are retained in the molten salt, thus converting the mixed wastes into low-level wastes. (Even though the MSD process is applicable to mixed wastes, this paper will emphasize HE-treatment.) The destruction of HE is accomplished by introducing it, together with oxidant gases, into a crucible containing a molten salt, such as sodium carbonate, or a suitable mixture of the carbonates of sodium, potassium, lithium and calcium. The temperature of the molten salt can be between 400 to 900 degrees C. The combustible organic components of the waste react with oxygen to produce carbon dioxide, nitrogen and steam

  15. The Location-Routing Problem with Full Truckloads in Low-Carbon Supply Chain Network Designing

    Directory of Open Access Journals (Sweden)

    Cheng Chen

    2018-01-01

    Full Text Available In recent years, low-carbon supply chain network design has been the focus of studies as the development of low-carbon economy. The location-routing problem with full truckloads (LRPFT is investigated in this paper, which extends the existing studies on the LRP to full truckloads problem within the regional many-to-many raw material supply network. A mathematical model with dual objectives of minimizing total cost and environmental effects simultaneously is developed to determine the number and locations of facilities and optimize the flows among different kinds of nodes and routes of trucks as well. A novel multiobjective hybrid approach named NSGA-II-TS is proposed by combining a known multiobjective algorithm, NSGA-II, and a known heuristics, Tabu Search (TS. A chromosome presentation based on natural number and modified partially mapping crossover operator for the LRPFT are designed. Finally, the computational effectiveness of the hybrid approach is validated by the numerical results and a practical case study is applied to demonstrate the tradeoff between total cost and CO2 emission in the LRPFT.

  16. In-situ Non-destructive Studies on Biofouling Processes in Reverse Osmosis Membrane Systems

    KAUST Repository

    Farhat, Nadia

    2016-12-01

    Reverse osmosis (RO) and nanofiltration (NF) membrane systems are high-pressure membrane filtration processes that can produce high quality drinking water. Biofouling, biofilm formation that exceeds a certain threshold, is a major problem in spiral wound RO and NF membrane systems resulting in a decline in membrane performance, produced water quality, and quantity. In practice, detection of biofouling is typically done indirectly through measurements of performance decline. Existing direct biofouling detection methods are mainly destructive, such as membrane autopsies, where biofilm samples can be contaminated, damaged and resulting in biofilm structural changes. The objective of this study was to test whether transparent luminescent planar oxygen sensing optodes, in combination with a simple imaging system, can be used for in-situ, non-destructive biofouling characterization. Aspects of the study were early detection of biofouling, biofilm spatial patterning in spacer filled channels, and the effect of feed cross-flow velocity, and feed flow temperature. Oxygen sensing optode imaging was found suitable for studying biofilm processes and gave detailed spatial and quantitative biofilm development information enabling better understanding of the biofouling development process. The outcome of this study attests the importance of in-situ, non-destructive imaging in acquiring detailed knowledge on biofilm development in membrane systems contributing to the development of effective biofouling control strategies.

  17. Postradiation destruction of dextran in solutions

    International Nuclear Information System (INIS)

    Bondarenko, N.T.; Sharpatyj, V.A.

    1989-01-01

    Methods of pH-metry, UV absorption and ESR spectroscopy were used to study the oxidation destruction of dextran solutions, stored in the air after gamma irradiation ( 60 Co) bydoses of up to 200 kGy. It is shown that polymer destruction under mentioned conditions is initiated by hydroperoxide decomposition with successive radical transformation into peroxides. Experimentally observed periodical change of acidity of irradiated dextran solutions is also explained by transformations of peroxy radicals

  18. Phenomenology of love: The Destructive and Constructive Nature of Love

    Directory of Open Access Journals (Sweden)

    Alireza Farnam

    2017-12-01

    Full Text Available Love, this eminent humane experience, has been explored not only by writers and poets, but also by philosophers, psychologists and even experimental scientists. This paper aims to discuss a novel aspect in phenomenology of love, as the concept of destructive and constructive nature of love, which is to the best of our knowledge, presented for the first time. The fundamental idea of this paper was obtained from verses of Hafiz, then polished by theories of Robert Cloninger and several other thinkers in the field of human emotions. Many verses of Hafiz display love experience as a necessary step towards growth, in a way that could be evinced further by the development of the "self-aware psych" introduced by Cloninger. He introduces the "self-aware psych" as one of the three constituting domains of human mind and personality, the intuitive essence bringing integrity for personality. If self-aware psych flourishes by favorable growth and development, it would prepare the ground for creativity, wisdom and well-being, otherwise, personality disorders would be contingent. The destructive and constructive nature of love, towards development of self-awareness and mental growth, is further determined by re-explaining the proposed theory of "ego as a complex" by Carl Jung, the theory of "network of intentionality" by John Searle, and the theory of "emotional processing" by Edna Foa and Michael Kozak in this context.

  19. Exact and heuristic solution approaches for the Integrated Job Scheduling and Constrained Network Routing Problem

    DEFF Research Database (Denmark)

    Gamst, M.

    2014-01-01

    problem. The methods are computationally evaluated on test instances arising from telecommunications with up to 500 jobs and 500 machines. Results show that solving the integrated job scheduling and constrained network routing problem to optimality is very difficult. The exact solution approach performs......This paper examines the problem of scheduling a number of jobs on a finite set of machines such that the overall profit of executed jobs is maximized. Each job has a certain demand, which must be sent to the executing machine via constrained paths. A job cannot start before all its demands have...... arrived at the machine. Furthermore, two resource demand transmissions cannot use the same edge in the same time period. The problem has application in grid computing, where a number of geographically distributed machines work together for solving large problems. The machines are connected through...

  20. In situ non-destructive measurement of biofilm thickness and topology in an interferometric optical microscope

    Energy Technology Data Exchange (ETDEWEB)

    Larimer, Curtis [Pacific Northwest National Laboratory, Battelle for the USDOE, PO Box 999, MSIN P7-50 Richland WA 99354 USA; Suter, Jonathan D. [Pacific Northwest National Laboratory, Battelle for the USDOE, PO Box 999, MSIN P7-50 Richland WA 99354 USA; Bonheyo, George [Pacific Northwest National Laboratory, Battelle for the USDOE, PO Box 999, MSIN P7-50 Richland WA 99354 USA; Addleman, Raymond Shane [Pacific Northwest National Laboratory, Battelle for the USDOE, PO Box 999, MSIN P7-50 Richland WA 99354 USA

    2016-03-15

    Biofilms are ubiquitous and deleteriously impact a wide range of industrial processes, medical and dental health issues, and environmental problems such as transport of invasive species and the fuel efficiency of ocean going vessels. Biofilms are difficult to characterize when fully hydrated, especially in a non-destructive manner, because of their soft structure and water-like bulk properties. Herein we describe a non-destructive high resolution method of measuring and monitoring the thickness and topology of live biofilms of using white light interferometric optical microscopy. Using this technique, surface morphology, surface roughness, and biofilm thickness can be measured non-destructively and with high resolution as a function of time without disruption of the biofilm activity and processes. The thickness and surface topology of a P. putida biofilm were monitored growing from initial colonization to a mature biofilm. Typical bacterial growth curves were observed. Increase in surface roughness was a leading indicator of biofilm growth.

  1. Interferon-alpha-induced destructive thyroiditis followed by Graves' disease in a patient with chronic hepatitis C: a case report.

    Science.gov (United States)

    Kim, Bu Kyung; Choi, Young Sik; Park, Yo Han; Lee, Sang Uk

    2011-12-01

    Interferon-induced thyroiditis (IIT) is a major clinical problem for patients receiving interferon-alpha (IFN-α) therapy. But, destructive thyroiditis followed by Graves' disease associated with IFN-α therapy is very rarely reported. Herein, we report a rare case of pegylated IFN-α (pegIFN-α) induced destructive thyroiditis followed by Graves' disease in a patient with HCV infection. A 31-yr-old woman suffered from chronic active hepatitis C and was treated with pegIFN-α and ribavirin for 12 months. Results of a thyroid function test and autoantibody levels were normal before IFN-α therapy was initiated. Destructive thyrotoxicosis appeared seven months after the initiation of IFN-α therapy, followed by Graves' thyrotoxicosis two months after the cessation of therapy. The diagnoses of destructive thyroiditis and Graves' disease were confirmed by the presence of TSH receptor antibodies in addition to Tc-99m scintigraphy findings. The patient's antithyroglobulin antibody titer increased gradually during IFN-α therapy and remained weakly positive after IFN-α therapy was discontinued.

  2. Status report on the destructive and non-destructive examinations of U-bends removed from Trojan steam generator D

    International Nuclear Information System (INIS)

    Aspden, R.G.

    1981-01-01

    The last status report on the non-destructive examination of U-bends removed from Trojan steam generator D was dated July 7, 1980. As part of this activity, the measurement of wall thicknesses on selected U-bends was planned using an ultrasonic gage. These readings were not made because reproducible results could not be obtained using water as the coupling fluid which was necessary to avoid contamination. Three tubes from the same heat were selected for destructive examination at Westinghouse: one leaking U-bend (R1-C6) and two tubes with no indications (R1-C10 and R1-C22). Results of the examination procedure are presented. The non-destructive examination results from the July 7, 1980 report for 29 U-bends are included

  3. Physical basis of destruction of concrete and other building materials

    Science.gov (United States)

    Suleymanova, L. A.; Pogorelova, I. A.; Kirilenko, S. V.; Suleymanov, K. A.

    2018-03-01

    In the article the scientifically-grounded views of authors on the physical essence of destruction process of concrete and other materials are stated; it is shown that the mechanism of destruction of materials is similar in its essence during the mechanical, thermal, physical-chemical and combined influences, and that in its basis Newton's third law lays. In all cases destruction consists in decompaction of structures, loosening of the internal bonds in materials, in the further integrity damage and their division into separate loosely-bound (full destruction) and unbound with each other (incomplete destruction) elements, which depends on the kind of external influence and perfection of materials structure.

  4. Online solving of economic dispatch problem using neural network approach and comparing it with classical method

    International Nuclear Information System (INIS)

    Mohammadi, A.; Varahram, M.H.

    2007-01-01

    In this study, two methods for solving economic dispatch problems, namely Hopfield neural network and lambda iteration method are compared. Three sample of power system with 3, 6 and 20 units have been considered. The time required for CPU, for solving economic dispatch of these two systems has been calculated. It has been Shown that for on-line economic dispatch, Hopfield neural network is more efficient and the time required for Convergence is considerably smaller compared to classical methods. (author)

  5. 27 CFR 24.294 - Destruction of wine.

    Science.gov (United States)

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 1 2010-04-01 2010-04-01 false Destruction of wine. 24..., DEPARTMENT OF THE TREASURY LIQUORS WINE Removal, Return and Receipt of Wine Removals Without Payment of Tax § 24.294 Destruction of wine. (a) General. Wine on bonded wine premises may be destroyed on or off wine...

  6. NUMERICAL SIMULATIONS OF SUPERNOVA DUST DESTRUCTION. I. CLOUD-CRUSHING AND POST-PROCESSED GRAIN SPUTTERING

    International Nuclear Information System (INIS)

    Silvia, Devin W.; Smith, Britton D.; Michael Shull, J.

    2010-01-01

    We investigate through hydrodynamic simulations the destruction of newly formed dust grains by sputtering in the reverse shocks of supernova (SN) remnants. Using an idealized setup of a planar shock impacting a dense, spherical clump, we implant a population of Lagrangian particles into the clump to represent a distribution of dust grains in size and composition. We then post-process the simulation output to calculate the grain sputtering for a variety of species and size distributions. We explore the parameter space appropriate for this problem by altering the overdensity of the ejecta clumps and the speed of the reverse shocks. Since radiative cooling could lower the temperature of the medium in which the dust is embedded and potentially protect the dust by slowing or halting grain sputtering, we study the effects of different cooling methods over the timescale of the simulations. In general, our results indicate that grains with radii less than 0.1 μm are sputtered to much smaller radii and often destroyed completely, while larger grains survive their interaction with the reverse shock. We also find that, for high ejecta densities, the percentage of dust that survives is strongly dependent on the relative velocity between the clump and the reverse shock, causing up to 50% more destruction for the highest velocity shocks. The fraction of dust destroyed varies widely across grain species, ranging from total destruction of Al 2 O 3 grains to minimal destruction of Fe grains (only 20% destruction in the most extreme cases). C and SiO 2 grains show moderate to strong sputtering as well, with 38% and 80% mass loss. The survival rate of grains formed by early SNe is crucial in determining whether or not they can act as the 'dust factories' needed to explain high-redshift dust.

  7. Algorithm for complete enumeration based on a stroke graph to solve the supply network configuration and operations scheduling problem

    Directory of Open Access Journals (Sweden)

    Julien Maheut

    2013-07-01

    Full Text Available Purpose: The purpose of this paper is to present an algorithm that solves the supply network configuration and operations scheduling problem in a mass customization company that faces alternative operations for one specific tool machine order in a multiplant context. Design/methodology/approach: To achieve this objective, the supply chain network configuration and operations scheduling problem is presented. A model based on stroke graphs allows the design of an algorithm that enumerates all the feasible solutions. The algorithm considers the arrival of a new customized order proposal which has to be inserted into a scheduled program. A selection function is then used to choose the solutions to be simulated in a specific simulation tool implemented in a Decision Support System. Findings and Originality/value: The algorithm itself proves efficient to find all feasible solutions when alternative operations must be considered. The stroke structure is successfully used to schedule operations when considering more than one manufacturing and supply option in each step. Research limitations/implications: This paper includes only the algorithm structure for a one-by-one, sequenced introduction of new products into the list of units to be manufactured. Therefore, the lotsizing process is done on a lot-per-lot basis. Moreover, the validation analysis is done through a case study and no generalization can be done without risk. Practical implications: The result of this research would help stakeholders to determine all the feasible and practical solutions for their problem. It would also allow to assessing the total costs and delivery times of each solution. Moreover, the Decision Support System proves useful to assess alternative solutions. Originality/value: This research offers a simple algorithm that helps solve the supply network configuration problem and, simultaneously, the scheduling problem by considering alternative operations. The proposed system

  8. A Potential Reduction Method for Canonical Duality, with an Application to the Sensor Network Localization Problem

    OpenAIRE

    Latorre, Vittorio

    2014-01-01

    We propose to solve large instances of the non-convex optimization problems reformulated with canonical duality theory. To this aim we propose an interior point potential reduction algorithm based on the solution of the primal-dual total complementarity (Lagrange) function. We establish the global convergence result for the algorithm under mild assumptions and demonstrate the method on instances of the Sensor Network Localization problem. Our numerical results are promising and show the possi...

  9. Vibration Based Damage Assessment of a Civil Engineering Structures using a Neural Networks

    DEFF Research Database (Denmark)

    Kirkegaard, Poul Henning; Rytter, A.

    In this paper the possibility of using a Multilayer Perceptron (MLP) network trained with the Backpropagation Algorith as a non-destructive damage assessment technique to locate and quantify a damage in Civil Engineering structures is investigated. Since artificial neural networks are proving...

  10. 2-Sensor Problem

    Directory of Open Access Journals (Sweden)

    Michael Segal

    2004-11-01

    Full Text Available Abstract: Ad-hoc networks of sensor nodes are in general semi-permanently deployed. However, the topology of such networks continuously changes over time, due to the power of some sensors wearing out to new sensors being inserted into the network, or even due to designers moving sensors around during a network re-design phase (for example, in response to a change in the requirements of the network. In this paper, we address the problem of covering a given path by a limited number of sensors — in our case to two, and show its relation to the well-studied matrix multiplication problem.

  11. Solving Hub Network Problem Using Genetic Algorithm

    Directory of Open Access Journals (Sweden)

    Mursyid Hasan Basri

    2012-01-01

    Full Text Available This paper addresses a network problem that described as follows. There are n ports that interact, and p of those will be designated as hubs. All hubs are fully interconnected. Each spoke will be allocated to only one of available hubs. Direct connection between two spokes is allowed only if they are allocated to the same hub. The latter is a distinct characteristic that differs it from pure hub-and-spoke system. In case of pure hub-and-spoke system, direct connection between two spokes is not allowed. The problem is where to locate hub ports and to which hub a spoke should be allocated so that total transportation cost is minimum. In the first model, there are some additional aspects are taken into consideration in order to achieve a better representation of the problem. The first, weekly service should be accomplished. Secondly, various vessel types should be considered. The last, a concept of inter-hub discount factor is introduced. Regarding the last aspect, it represents cost reduction factor at hub ports due to economies of scale. In practice, it is common that the cost rate for inter-hub movement is less than the cost rate for movement between hub and origin/destination. In this first model, inter-hub discount factor is assumed independent with amount of flows on inter-hub links (denoted as flow-independent discount policy. The results indicated that the patterns of enlargement of container ship size, to some degree, are similar with those in Kurokawa study. However, with regard to hub locations, the results have not represented the real practice. In the proposed model, unsatisfactory result on hub locations is addressed. One aspect that could possibly be improved to find better hub locations is inter-hub discount factor. Then inter-hub discount factor is assumed to depend on amount of inter-hub flows (denoted as flow-dependent discount policy. There are two discount functions examined in this paper. Both functions are characterized by

  12. Solution Algorithm for a New Bi-Level Discrete Network Design Problem

    Directory of Open Access Journals (Sweden)

    Qun Chen

    2013-12-01

    Full Text Available A new discrete network design problem (DNDP was pro-posed in this paper, where the variables can be a series of integers rather than just 0-1. The new DNDP can determine both capacity improvement grades of reconstruction roads and locations and capacity grades of newly added roads, and thus complies with the practical projects where road capacity can only be some discrete levels corresponding to the number of lanes of roads. This paper designed a solution algorithm combining branch-and-bound with Hooke-Jeeves algorithm, where feasible integer solutions are recorded in searching the process of Hooke-Jeeves algorithm, lend -ing itself to determine the upper bound of the upper-level problem. The thresholds for branch cutting and ending were set for earlier convergence. Numerical examples are given to demonstrate the efficiency of the proposed algorithm.

  13. Unceratainty of Heisenberg in Universe Destruction

    Directory of Open Access Journals (Sweden)

    Sri Jumini

    2017-12-01

    Full Text Available The Qur'an is a guidence which explaines all about the universe to human being. The discovery of science has been able to explain the truth of the Qur'an scientifically. One of which is the principle of Heisenberg's uncertainty in the event of the universe destruction. The purpose of this research is to know: 1 Science's view of the event of the universe destruction (Big Crunch in Qur’an [Al Infithaar]: 1-3, and How the relation of Heisenberg’s uncertainty principles and the law of thermodynamics II toward  the collapse of the universe (Big Crunch based on Scientific views and the Quran. This research is a qualitative research using library research method which analyzes the related books directly or indirectly. The results of the analysis stated that: 1 The concentration of mass, which is big enough, relates to some of the laws of physics, those are: Relativity, Heisenberg's uncertainty principles, and the law of Thermodynamic II; 2 The universe will return at its sole point, i.e; the absence of the universe; 3 The destruction of the universe is the destruction of the order of the universe which then the stars fall scatteredly because of the gravitational force that prevents them disappears, the balance of the universe diminishes, decreases and becomes uncertain, and eventually disappears.

  14. Destruction of metallic foils under laser radiation

    International Nuclear Information System (INIS)

    Khokhlov, N.P.; Lisitsyn, Yu.V.; Mineev, V.N.; Ivanov, A.G.

    1975-01-01

    Experimental results are presented which illustrate the process of destruction of aluminium, lead and tantalum foils under irradiation of a neodymium laser, working in free generation regime with a power density varying from 5.10 5 - 5.10 6 wt/sq.cm. Calorimeters and photocells sensitive to the radiation with lambda=1.06 have been used for measuring the energy and recording the shape of the radiation pulse incident onto the target and passing through the disintegration products. The weight of the target has been determined prior to and after the experiment to find out the weight of Δm material expelled from the target. Rates of product scattering and a target destruction period, an amount of the material expelled and parameters of the radiation passing through the disintegration products have been determined as a function of the power density and an angle of the radiation incidence on the surface of the specimens. Average densities and absorption coefficients of the disintegration products of the foils under study have been assessed. A comparison of the characteristics of the metal foil (t 1 j) destruction in Pb-Ta-Al series with the metal thermal properties in this series shows that the destruction characteristics periodically vary as heat capacity, thermal conduction, evaporation heat and melting heat alter. A period of the target destruction becomes longer and the expelled mass smaller as the aforesaid thermal properties of the metals in Pb-Ta-Al series intensity [ru

  15. Predictors of engaging in problem gambling treatment: data from the West Virginia Problem Gamblers Help Network.

    Science.gov (United States)

    Weinstock, Jeremiah; Burton, Steve; Rash, Carla J; Moran, Sheila; Biller, Warren; Krudelbach, Norman; Phoenix, Natalie; Morasco, Benjamin J

    2011-06-01

    Gambling help-lines are an essential access point, or frontline resource, for treatment seeking. This study investigated treatment engagement after calling a gambling help-line. From 2000-2007 over 2,900 unique callers were offered an in-person assessment appointment. Logistic regression analyses assessed predictors of (a) accepting the referral to the in-person assessment appointment and (b) attending the in-person assessment appointment. Over 76% of callers accepted the referral and 55% of all callers attended the in-person assessment appointment. This treatment engagement rate is higher than typically found for other help-lines. Demographic factors and clinical factors such as gender, severity of gambling problems, amount of gambling debt, and coercion by legal and social networks predicted engagement in treatment. Programmatic factors such as offering an appointment within 72 hr also aided treatment engagement. Results suggest gambling help-lines can be a convenient and confidential way for many individuals with gambling problems to access gambling-specific treatment. Alternative services such as telephone counseling may be beneficial for those who do not engage in treatment. (PsycINFO Database Record (c) 2011 APA, all rights reserved).

  16. The Artificial Neural Networks Based on Scalarization Method for a Class of Bilevel Biobjective Programming Problem

    Science.gov (United States)

    Chen, Zhong; Liu, June; Li, Xiong

    2017-01-01

    A two-stage artificial neural network (ANN) based on scalarization method is proposed for bilevel biobjective programming problem (BLBOP). The induced set of the BLBOP is firstly expressed as the set of minimal solutions of a biobjective optimization problem by using scalar approach, and then the whole efficient set of the BLBOP is derived by the proposed two-stage ANN for exploring the induced set. In order to illustrate the proposed method, seven numerical examples are tested and compared with results in the classical literature. Finally, a practical problem is solved by the proposed algorithm. PMID:29312446

  17. Reliable Communication in Wireless Meshed Networks using Network Coding

    DEFF Research Database (Denmark)

    Pahlevani, Peyman; Paramanathan, Achuthan; Hundebøll, Martin

    2012-01-01

    The advantages of network coding have been extensively studied in the field of wireless networks. Integrating network coding with existing IEEE 802.11 MAC layer is a challenging problem. The IEEE 802.11 MAC does not provide any reliability mechanisms for overheard packets. This paper addresses...... this problem and suggests different mechanisms to support reliability as part of the MAC protocol. Analytical expressions to this problem are given to qualify the performance of the modified network coding. These expressions are confirmed by numerical result. While the suggested reliability mechanisms...

  18. Evaluation of laser radiation regimes at thermal tissue destruction

    Science.gov (United States)

    Ivanov, Anatoly; Kazaryan, Mishik A.; Molodykh, E. I.; Shchetinkina, T. A.

    1996-01-01

    The existing methods of laser destruction of biotissues, widely spread in surgery and coagulation action, are based on local heat emission in the tissues after light absorption. Here we present the results of the simulation of tissues heat destruction, taking into account the influence of blood and lymph circulation on the processes of heat transfer. The problem is adapted to the case of liver tissue with tumor. A liver is considered as a capillary-porous body with internal blood circulation. Heatconductivity and tissue-blood heat transfer are considered. Heat action is assumed to be implemented with contact laser scalpel. The mathematical model consists of two inhomogeneous nonlinear equations of heatconductivity with spherical symmetry. Nonstationary temperature fields of tissue and blood are determined and the main parameters are: (1) coefficients of heatconductivity and capacitance of blood and tissue, (2) blood and tissue density, (3) total metabolic energy, (4) volume coefficient accounting for heat-exchange between tissue and blood, and (5) blood circulation velocity. The power of laser radiation was taken into account in boundary conditions set for the center of coagulated tissue volume. We also took into account the process connected with changing of substance phase (vaporization). The original computer programs allow one to solve the problem varying in a wide range of the main parameters. Reasonable agreement was found between the calculation results and the experimental data for operations on microsamples and on test animals. It was demonstrated, in particular, that liver tissue coagulation regime is achieved at 10 W laser power during 25 s. The coagulation radius of 0.7 cm with the given tumor radius of 0.5 cm corresponds to the real clinical situation in case of metastasis liver affection.

  19. Grain destruction in interstellar shocks

    International Nuclear Information System (INIS)

    Seab, C.G.; Shull, J.M.

    1984-01-01

    One of the principal methods for removing grains from the Interstellar Medium is to destroy them in shock waves. Previous theoretical studies of shock destruction have generally assumed only a single size and type of grain; most do not account for the effect of the grain destruction on the structure of the shock. Earlier calculations have been improved in three ways: first, by using a ''complete'' grain model including a distribution of sizes and types of grains; second, by using a self-consistent shock structure that incorporates the changing elemental depletions as the grains are destroyed; and third, by calculating the shock-processed ultraviolet extinction curves for comparison with observations. (author)

  20. An Integrated Approach for Reliable Facility Location/Network Design Problem with Link Disruption

    Directory of Open Access Journals (Sweden)

    Davood Shishebori

    2015-05-01

    Full Text Available Proposing a robust designed facility location is one of the most effective ways to hedge against unexpected disruptions and failures in a transportation network system. This paper considers the combined facility location/network design problem with regard to transportation link disruptions and develops a mixed integer linear programming formulation to model it. With respect to the probability of link disruptions, the objective function of the model minimizes the total costs, including location costs, link construction costs and also the expected transportation costs. An efficient hybrid algorithm based on LP relaxation and variable neighbourhood search metaheuristic is developed in order to solve the mathematical model. Numerical results demonstrate that the proposed hybrid algorithm has suitable efficiency in terms of duration of solution time and determining excellent solution quality.

  1. Differential susceptibility effects: the interaction of negative emotionality and sibling relationship quality on childhood internalizing problems and social skills.

    Science.gov (United States)

    Morgan, Judith K; Shaw, Daniel S; Olino, Thomas M

    2012-08-01

    Whereas socialization influences in early childhood have been linked to children's emerging internalizing problems and prosocial behavior, relatively few studies have examined how NE might moderate such associations in both advantageous and maladaptive ways. Furthermore, more research is needed to evaluate the impact of sibling relationships as an influential socialization influence on these child outcomes. In the current study we examined how NE might differentially moderate the associations between quality of relationships with siblings and both internalizing problems and social skills at school entry. NE moderated the effects of positive and destructive sibling relationship quality on child internalizing problems. Specifically, for boys high on NE, more positive sibling relationship quality predicted fewer internalizing problems, but more destructive sibling conflict predicted more internalizing problems. NE also moderated the effects of destructive sibling conflict on child social skills. For boys high on NE, destructive sibling conflict predicted fewer social skills. Boys high on NE appear to show greater susceptibility to the effects of sibling socialization on child outcomes, relative to boys low on NE. The implications of these interactions are discussed with respect to differential susceptibility theory.

  2. Three-dimensional analysis of alveolar wall destruction in the early stage of pulmonary emphysema.

    Science.gov (United States)

    Kobayashi, Yukihiro; Uehara, Takeshi; Kawasaki, Kenji; Sugano, Mitsutoshi; Matsumoto, Takehisa; Matsumoto, Gou; Honda, Takayuki

    2015-03-01

    The morphological mechanism of alveolar wall destruction during pulmonary emphysema has not been clarified. The aim of this study was to elucidate this process three-dimensionally. Lung specimens from five patients with pulmonary emphysema were used, and five controls with normal alveolar structure were also examined. Sections 150 μm thick were stained with hematoxylin and eosin, elastica, and silver impregnation, and immunostained with selected antibodies. We examined these sections three-dimensionally using a laser confocal microscope and a light microscope. There were only a few Kohn's pores and no fenestrae in the normal alveoli from the controls. In the lungs of the emphysema patients a small rupture appeared in the extremely thin alveolar wall among the alveolar capillaries. This rupture enlarged to form a circle surrounded by the capillaries, which was called an alveolar fenestra. Two neighboring fenestrae fused by breakdown of the collapsed or cord-like capillary between them to form a large fenestra. The large fenestrae fused repeatedly to become larger, and these were bordered by thick elastic fibers constructing an alveolar framework. Alveolar wall destruction during emphysema could start from small ruptures of the alveolar wall that become fenestrae surrounded by capillaries, which fuse repeatedly to become larger fenestrae rimmed with elastic fibers. The alveolar capillary network could initially prevent enlargement of the fenestrae, and the thick elastic fibers constituting the alveolar framework could secondarily prevent destruction of the alveolar wall structure. © 2014 Wiley Periodicals, Inc.

  3. Destructive distillation

    Energy Technology Data Exchange (ETDEWEB)

    1938-07-05

    A process and apparatus for the destructive distillation at low temperature of mineral or organic material particularly oil shale, is given in which the process comprises distilling the material in a horizontal gaseous stream, subjecting the hot residues to the action of a gaseous stream containing a predetermined amount of oxygen so as to burn, at least partly, the carbon-containing substances, and the process uses the gases from this combustion for the indirect heating of the gases serving for the distillation.

  4. The results of cutting disks testing for rock destruction

    Directory of Open Access Journals (Sweden)

    Khoreshok Aleksey

    2017-01-01

    Full Text Available To determine the rational order of disk tools placement on the working body is necessary to know the maximum amount of rock, destroyed by the disk tool in benching cutting mode depending on the tool geometry parameters, physical and mechanical parameters of rocks. The article contains the definition of rational parameters of cutting disk tools as well as power and energy parameters of the destruction process by cutting disks and by executive body of the coal cutter. The rational geometric parameters of cutting discs are specified. It was found that each step of cutting with a minimum depth of penetration has its own maximum height of bench outcrop. The dependence of the volumes of large items destroyed by the disk tool on the cutting step height was determined. The existence of the cyclic alternation of destruction phases, regardless the fracture parameters, the height of the ledge outcrop, and tools like free cutting geometry were found. In contrast to the free cutting in benching mode of destruction two large fragments of rocks in one cycle were observed. Consequently, the cyclical nature of the destruction process in the benching mode will be characterized by two chips and crushing, and this cycling repeats throughout the destruction process with the same parameters of destruction.

  5. Radiation, chemical and biological protection. Mass destruction weapons

    International Nuclear Information System (INIS)

    Janasek, D.; Svetlik, J.

    2005-01-01

    In this text-book mass destruction weapons and radiation, chemical and biological protection are reviewed. The text-book contains the following chapter: (1) Mass destruction weapons; (2) Matter and material; (3) Radioactive materials; (4) Toxic materials; (5) Biological resources; (6) Nuclear energetic equipment; Appendices; References.

  6. A framework to approach problems of forensic anthropology using complex networks

    Science.gov (United States)

    Caridi, Inés; Dorso, Claudio O.; Gallo, Pablo; Somigliana, Carlos

    2011-05-01

    We have developed a method to analyze and interpret emerging structures in a set of data which lacks some information. It has been conceived to be applied to the problem of getting information about people who disappeared in the Argentine state of Tucumán from 1974 to 1981. Even if the military dictatorship formally started in Argentina had begun in 1976 and lasted until 1983, the disappearance and assassination of people began some months earlier. During this period several circuits of Illegal Detention Centres (IDC) were set up in different locations all over the country. In these secret centres, disappeared people were illegally kept without any sort of constitutional guarantees, and later assassinated. Even today, the final destination of most of the disappeared people’s remains is still unknown. The fundamental hypothesis in this work is that a group of people with the same political affiliation whose disappearances were closely related in time and space shared the same place of captivity (the same IDC or circuit of IDCs). This hypothesis makes sense when applied to the systematic method of repression and disappearances which was actually launched in Tucumán, Argentina (2007) [11]. In this work, the missing individuals are identified as nodes on a network and connections are established among them based on the individuals’ attributes while they were alive, by using rules to link them. In order to determine which rules are the most effective in defining the network, we use other kind of knowledge available in this problem: previous results from the anthropological point of view (based on other sources of information, both oral and written, historical and anthropological data, etc.); and information about the place (one or more IDCs) where some people were kept during their captivity. For these best rules, a prediction about these people’s possible destination is assigned (one or more IDCs where they could have been kept), and the success of the

  7. Non-destructive control of castings

    International Nuclear Information System (INIS)

    Boutault, J.; Mascre, C.

    1978-01-01

    The object of non-destructive control in foundries is to verify the metal structure, the absence of unacceptable discontinuity, total tightness, etc. This leads to a range of very varied controls according to the importance of the series, the quality level required by the specifications, the nature of the alloy. The originality of the solutions which are imperative for castings is shown through examples: casting of high quality complex forms in short series; very thick unit parts; very large series of parts requiring on efficient automation of non-destructive control. Lastly the publishing of testing methods and interpretating rules, which are the base of a friendly understanding between constructors and founders are recalled [fr

  8. A review on application of neural networks and fuzzy logic to solve hydrothermal scheduling problem

    International Nuclear Information System (INIS)

    Haroon, S.; Malik, T.N.; Zafar, S.

    2014-01-01

    Electrical power system is highly complicated having hydro and thermal mix with large number of machines. To reduce power production cost, hydro and thermal resources are mixed. Hydrothermal scheduling is the optimal coordination of hydro and thermal plants to meet the system load demand at minimum possible operational cost while satisfying the system constraints. Hydrothermal scheduling is dynamic, large scale, non-linear and non-convex optimization problem. The classical techniques have failed in solving such problem. Artificial Intelligence Tools based techniques are used now a day to solve this complex optimization problem because of their no requirements on the nature of the problem. The aim of this research paper is to provide a comprehensive survey of literature related to both Artificial Neural Network (ANN) and Fuzzy Logic (FL) as effective optimization algorithms for the hydrothermal scheduling problem. The outcomes along with the merits and demerits of individual techniques are also discussed. (author)

  9. 32 CFR 644.494 - Donation, abandonment or destruction.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 4 2010-07-01 2010-07-01 true Donation, abandonment or destruction. 644.494 Section 644.494 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY (CONTINUED) REAL... Land) § 644.494 Donation, abandonment or destruction. (a) General. Improvements may be abandoned...

  10. A new cut-based algorithm for the multi-state flow network reliability problem

    International Nuclear Information System (INIS)

    Yeh, Wei-Chang; Bae, Changseok; Huang, Chia-Ling

    2015-01-01

    Many real-world systems can be modeled as multi-state network systems in which reliability can be derived in terms of the lower bound points of level d, called d-minimal cuts (d-MCs). This study proposes a new method to find and verify obtained d-MCs with simple and useful found properties for the multi-state flow network reliability problem. The proposed algorithm runs in O(mσp) time, which represents a significant improvement over the previous O(mp 2 σ) time bound based on max-flow/min-cut, where p, σ and m denote the number of MCs, d-MC candidates and edges, respectively. The proposed algorithm also conquers the weakness of some existing methods, which failed to remove duplicate d-MCs in special cases. A step-by-step example is given to demonstrate how the proposed algorithm locates and verifies all d-MC candidates. As evidence of the utility of the proposed approach, we present extensive computational results on 20 benchmark networks in another example. The computational results compare favorably with a previously developed algorithm in the literature. - Highlights: • A new method is proposed to find all d-MCs for the multi-state flow networks. • The proposed method can prevent the generation of d-MC duplicates. • The proposed method is simpler and more efficient than the best-known algorithms

  11. Orbital roof encephalocele mimicking a destructive neoplasm.

    Science.gov (United States)

    Alsuhaibani, Adel H; Hitchon, Patrick W; Smoker, Wendy R K; Lee, Andrew G; Nerad, Jeffrey A

    2011-01-01

    The purpose of this case report is to report an orbital roof encephalocele mimicking a destructive orbital neoplasm. Orbital roof encephalocele is uncommon but can mimic neoplasm. One potential mechanism for the orbital roof destruction is a post-traumatic "growing orbital roof fracture." The growing fracture has been reported mostly in children but can occur in adults. Alternative potential etiologies for the encephalocele are discussed, including Gorham syndrome. Orbital roof encephalocele is uncommon in adults, and the findings can superficially resemble an orbital neoplasm. Radiographic and clinical features that might suggest the correct diagnosis include a prior history of trauma, overlying frontal lobe encephalomalacia without significant mass effect or edema, and an orbital roof defect. The "growing fracture" mechanism may be a potential explanation for the orbital roof destruction in some cases.

  12. Destructive analysis and evaluation services

    International Nuclear Information System (INIS)

    Kuhn, E.; Lemaire, R.; Wenzel, U.; Aigner, H.; Bagliano, G.; Deron, S.; Jordan, L.

    1986-07-01

    This manual describes the procedures for independent verification measurements by Destructive Analysis as required by the Divisions of Operations. It includes the relevant instructions and information necessary to achieve the verification from sampling through final use of the evaluation results. It is a working/reference document for the Inspectors and for the supporting units, as well as a training manual for Inspectors which brings together all the necessary information for verification by Destructive Analysis. This manual gives information essential to the Inspector and to the units of the Safeguards Analytical Services (SAS) in the following areas: material stratification, sampling, sample conditioning and data collection; packaging, transporting, tracking, receipt and analysis of samples; and evaluation and final use of the evaluation results. This information is provided as: specific instructions and/or examples; summaries of relevant, existing documents; and references to existing documents. Forms are available for sample, item and stratum data collection as well as for transfer of samples and for the reporting of results. A complete typical example package of the documents related to the verification by Destructive Analysis is included. In addition, summaries of the analytical procedures used at the Safeguards Analytical Laboratory (SAL) of the IAEA and the expected measurement performance for element assay and isotopic abundance are provided. (author)

  13. Manifestations of Indirect Self-Destructiveness and Dimensions of Emotional Intelligence.

    Science.gov (United States)

    Tsirigotis, Konstantinos; Łuczak, Joanna

    2016-09-01

    While indirect self-destructiveness exerts a rather negative influence on the life and psychological and social functioning of the individual, emotional intelligence may have a favourable effect. The aim of this study has been to explore possible relationships between manifestations of indirect self-destructiveness and dimensions of emotional intelligence. A population of 260 individuals (130 females and 130 males) aged 20-30 (mean age of 24.5) was studied by using the Polish version of the Chronic Self-Destructiveness Scale and INTE, i.e., the Polish version of the Assessing Emotions Scale. Manifestations of indirect self-destructiveness show many significant correlations with variables of the INTE, and those correlations are negative. Generally, it can be said that low emotional intelligence is associated with poor psychosocial and social functioning, which, in turn, is associated with indirect self-destructiveness and its manifestations. It seems advisable to use emotional intelligence in the prophylactic and therapeutic work with individuals suffering from various types of disorders, especially the syndrome of indirect self-destructiveness.

  14. Non-destructive testing of electronic parts

    International Nuclear Information System (INIS)

    Widenhorn, G.

    1980-01-01

    The requirements on quality, safety, faultlessness and reliability of electric components increase because of the high complexity of the appliances in which they are used. By means of examples a survey is given on the common non-destructive testing methods, testing operation and evaluation of test results on electric components which must meet in their application high requirements on quality and reliability. Defective components, especially those with hidden failures are sorted out by non-destructive testing and the failure frequency of the appliances and plants in testing and operation is greatly reduced. (orig.) [de

  15. European Non Destructive Examination Forum (ENDEF)

    International Nuclear Information System (INIS)

    Deffrennes, M.; Engl, G.; Estorff, U. von

    1998-01-01

    Non destructive examination (NDE) during fabrication, Pre-service inspection (PSI) and In service inspection (ISI) are considered key issues for the safe use of nuclear energy. They are important elements of plant lifetime management which is a critical item in decision making on nuclear policies. The European non destructive examination forum (ENDEF) founded by European Commission provides a platform for open discussion between representatives of the European industries with the purpose to establish cooperation between EU, Central and Eastern European Countries and New Independent States in the field of NDE and ISI

  16. Heat recovery networks synthesis of large-scale industrial sites: Heat load distribution problem with virtual process subsystems

    International Nuclear Information System (INIS)

    Pouransari, Nasibeh; Maréchal, Francois

    2015-01-01

    Highlights: • Synthesizing industrial size heat recovery network with match reduction approach. • Targeting TSI with minimum exchange between process subsystems. • Generating a feasible close-to-optimum network. • Reducing tremendously the HLD computational time and complexity. • Generating realistic network with respect to the plant layout. - Abstract: This paper presents a targeting strategy to design a heat recovery network for an industrial plant by dividing the system into subsystems while considering the heat transfer opportunities between them. The methodology is based on a sequential approach. The heat recovery opportunity between process units and the optimal flow rates of utilities are first identified using a Mixed Integer Linear Programming (MILP) model. The site is then divided into a number of subsystems where the overall interaction is resumed by a pair of virtual hot and cold stream per subsystem which is reconstructed by solving the heat cascade inside each subsystem. The Heat Load Distribution (HLD) problem is then solved between those packed subsystems in a sequential procedure where each time one of the subsystems is unpacked by switching from the virtual stream pair back into the original ones. The main advantages are to minimize the number of connections between process subsystems, to alleviate the computational complexity of the HLD problem and to generate a feasible network which is compatible with the minimum energy consumption objective. The application of the proposed methodology is illustrated through a number of case studies, discussed and compared with the relevant results from the literature

  17. Hamster and Murine Models of Severe Destructive Lyme Arthritis

    Science.gov (United States)

    Munson, Erik; Nardelli, Dean T.; Du Chateau, Brian K.; Callister, Steven M.; Schell, Ronald F.

    2012-01-01

    Arthritis is a frequent complication of infection in humans with Borrelia burgdorferi. Weeks to months following the onset of Lyme borreliosis, a histopathological reaction characteristic of synovitis including bone, joint, muscle, or tendon pain may occur. A subpopulation of patients may progress to a chronic, debilitating arthritis months to years after infection which has been classified as severe destructive Lyme arthritis. This arthritis involves focal bone erosion and destruction of articular cartilage. Hamsters and mice are animal models that have been utilized to study articular manifestations of Lyme borreliosis. Infection of immunocompetent LSH hamsters or C3H mice results in a transient synovitis. However, severe destructive Lyme arthritis can be induced by infecting irradiated hamsters or mice and immunocompetent Borrelia-vaccinated hamsters, mice, and interferon-gamma- (IFN-γ-) deficient mice with viable B. burgdorferi. The hamster model of severe destructive Lyme arthritis facilitates easy assessment of Lyme borreliosis vaccine preparations for deleterious effects while murine models of severe destructive Lyme arthritis allow for investigation of mechanisms of immunopathology. PMID:22461836

  18. Use of non-destructive controls for the supervision of operating apparatus

    International Nuclear Information System (INIS)

    Ducrot, Bernard.

    1978-01-01

    The scope of application of this paper, that is standard apparatus whether pressure or not, is presented. Then the particular problem of the use of non-destructive controls for the supervision of operating apparatus is outlined. The subject of how to exercise that supervision is developed by replying to four questions: why, when, how, who. A summary of the main advantages and disadvantages of the different control techniquess used is given in a tabular form. A last part deals with a series of practical applications, which show at the same time the interest and difficulties of that type of control [fr

  19. An investigation of homogeneous and heterogeneous sonochemistry for the destruction of hazardous substances. Progress report, 1996 - 1997

    International Nuclear Information System (INIS)

    Hua, I.

    1997-01-01

    'The primary objective of this research project is to acquire a deeper fundamental knowledge of acoustic cavitation and cavitation chemistry, and in doing so, to ascertain how ultrasonic irradiation can be more effectively applied to environmental problems. Four on-going projects will be described in this progress report, The first project is the destruction of carbofuran in a Near-Field Acoustical Processor (NAP), and the hydrodynamic characterization of the reactor. The second project is a comprehensive study of how ultrasonic frequency influences sonochemical reaction rates; the substrate it, the preliminary portion of this study has been hydrogen peroxide formation. The third project in progress is destruction of four polychlorinated biphenyls at 20 kHz. Work so far has been at 20 kHz, but the most significant portion of this project will involve a multi-frequency (ultrasonic frequency) study. Finally, the destruction of a pesticide, dichlorvos, during sonication at 500 kHz will be described. Preliminary work during the first year has emphasized determination of kinetics; further work (years 2--3) will be focused upon closing mass balances and identifying transformation products.'

  20. Analysis of Radiation Accident of Non-destructive Inspection and Rational Preparing Bills

    International Nuclear Information System (INIS)

    Bae, Junwoo; Yoo, Donghan; Kim, Hee Reyoung

    2013-01-01

    After 2006, according to enactment of Non-destructive Inspection Promotion Act, the number of non-destructive inspection companies and corresponding accident is increased sharply. In this research, it includes characteristic analysis of field of the non-destructive inspection. And from the result of analysis, the purpose of this research is discovering reason for 'Why there is higher accident ratio in non-destructive inspection field, relatively' and preparing effective bill for reducing radiation accidents. The number of worker for non-destructive inspect is increased steadily and non-destructive inspect worker take highest dose. Corresponding to these, it must be needed to prepare bills to protect non-destructive inspect workers. By analysis of accident case, there are many case of carelessness that tools are too heavy to carry it everywhere workers go. And there are some cases caused by deficiency of education that less understanding of radiation and poor operation by less understanding of structure of tools. Also, there is no data specialized to non-destructive inspect field. So, it has to take information from statistical data. Because of this, it is hard to analyze nondestructive inspect field accurately. So, it is required to; preparing rational bills to protect non-destructive inspect workers nondestructive inspect instrument lightening and easy manual which can understandable for low education background people accurate survey data from real worker. To accomplish these, we needs to do; analyze and comprehend the present law about non-destructive inspect worker understand non-destructive inspect instruments accurately and conduct research for developing material developing rational survey to measuring real condition for non-destructive inspect workers

  1. Boolean decision problems with competing interactions on scale-free networks: Equilibrium and nonequilibrium behavior in an external bias

    Science.gov (United States)

    Zhu, Zheng; Andresen, Juan Carlos; Moore, M. A.; Katzgraber, Helmut G.

    2014-02-01

    We study the equilibrium and nonequilibrium properties of Boolean decision problems with competing interactions on scale-free networks in an external bias (magnetic field). Previous studies at zero field have shown a remarkable equilibrium stability of Boolean variables (Ising spins) with competing interactions (spin glasses) on scale-free networks. When the exponent that describes the power-law decay of the connectivity of the network is strictly larger than 3, the system undergoes a spin-glass transition. However, when the exponent is equal to or less than 3, the glass phase is stable for all temperatures. First, we perform finite-temperature Monte Carlo simulations in a field to test the robustness of the spin-glass phase and show that the system has a spin-glass phase in a field, i.e., exhibits a de Almeida-Thouless line. Furthermore, we study avalanche distributions when the system is driven by a field at zero temperature to test if the system displays self-organized criticality. Numerical results suggest that avalanches (damage) can spread across the whole system with nonzero probability when the decay exponent of the interaction degree is less than or equal to 2, i.e., that Boolean decision problems on scale-free networks with competing interactions can be fragile when not in thermal equilibrium.

  2. CH(+) Destruction by Reaction with H: Computing Quantum Rates To Model Different Molecular Regions in the Interstellar Medium.

    Science.gov (United States)

    Bovino, S; Grassi, T; Gianturco, F A

    2015-12-17

    A detailed analysis of an ionic reaction that plays a crucial role in the carbon chemistry of the interstellar medium (ISM) is carried out by computing ab initio reactive cross sections with a quantum method and by further obtaining the corresponding CH(+) destruction rates over a range of temperatures that shows good overall agreement with existing experiments. The differences found between all existing calculations and the very-low-T experiments are discussed and explored via a simple numerical model that links these cross section reductions to collinear approaches where nonadiabatic crossing is expected to dominate. The new rates are further linked to a complex chemical network that models the evolution of the CH(+) abundance in the photodissociation region (PDR) and molecular cloud (MC) environments of the ISM. The abundances of CH(+) are given by numerical solutions of a large set of coupled, first-order kinetics equations that employs our new chemical package krome. The analysis that we carry out reveals that the important region for CH(+) destruction is that above 100 K, hence showing that, at least for this reaction, the differences with the existing laboratory low-T experiments are of essentially no importance within the astrochemical environments discussed here because, at those temperatures, other chemical processes involving the title molecule are taking over. A detailed analysis of the chemical network involving CH(+) also shows that a slight decrease in the initial oxygen abundance might lead to higher CH(+) abundances because the main chemical carbon ion destruction channel is reduced in efficiency. This might provide an alternative chemical route to understand the reason why general astrochemical models fail when the observed CH(+) abundances are matched with the outcomes of their calculations.

  3. 27 CFR 25.221 - Voluntary destruction of beer.

    Science.gov (United States)

    2010-04-01

    ... beer. 25.221 Section 25.221 Alcohol, Tobacco Products and Firearms ALCOHOL AND TOBACCO TAX AND TRADE BUREAU, DEPARTMENT OF THE TREASURY LIQUORS BEER Voluntary Destruction § 25.221 Voluntary destruction of beer. (a) On brewery premises. (1) A brewer may destroy, at the brewery, beer on which the tax has not...

  4. 19 CFR 191.44 - Destruction under Customs supervision.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 2 2010-04-01 2010-04-01 false Destruction under Customs supervision. 191.44 Section 191.44 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY (CONTINUED) DRAWBACK Rejected Merchandise § 191.44 Destruction under Customs supervision. A claimant may destroy merchandise an...

  5. 19 CFR 191.37 - Destruction under Customs supervision.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 2 2010-04-01 2010-04-01 false Destruction under Customs supervision. 191.37 Section 191.37 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY (CONTINUED) DRAWBACK Unused Merchandise Drawback § 191.37 Destruction under Customs supervision. A claimant may destroy...

  6. 19 CFR 191.25 - Destruction under Customs supervision.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 2 2010-04-01 2010-04-01 false Destruction under Customs supervision. 191.25 Section 191.25 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY (CONTINUED) DRAWBACK Manufacturing Drawback § 191.25 Destruction under Customs supervision. A claimant may destroy merchandise...

  7. The Steiner tree problem

    CERN Document Server

    Hwang, FK; Winter, P

    1992-01-01

    The Steiner problem asks for a shortest network which spans a given set of points. Minimum spanning networks have been well-studied when all connections are required to be between the given points. The novelty of the Steiner tree problem is that new auxiliary points can be introduced between the original points so that a spanning network of all the points will be shorter than otherwise possible. These new points are called Steiner points - locating them has proved problematic and research has diverged along many different avenues. This volume is devoted to the assimilation of the rich field of intriguing analyses and the consolidation of the fragments. A section has been given to each of the three major areas of interest which have emerged. The first concerns the Euclidean Steiner Problem, historically the original Steiner tree problem proposed by Jarník and Kössler in 1934. The second deals with the Steiner Problem in Networks, which was propounded independently by Hakimi and Levin and has enjoyed the most...

  8. Report on the bill project related to the struggle against proliferation of weapons of mass destruction and their delivery systems; Rapport fait au Nom de la Commission de la Defense Nationale et des Forces Armees sur le Projet de Loi (n. 1652) relatif a la lutte contre la proliferation des armes de destruction massive et de leurs vecteurs

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2010-07-01

    In a first part presenting the various forms of proliferations, the author first gives a quantitative overview of illegal activities concerning nuclear materials, and then discusses the existence and activities of proliferation networks, explaining how international trade liberalization creates a favourable context for proliferations of any kind, and describing how a typical network is organised. He also discusses the example of Iraq and the case of the network created by the Pakistani scientist Abdul Q. Khan. The risk created by the hypothetical relationship between terrorism and nuclear weapon of mass destruction is also questioned. Then, after having recalled the existing international texts and the present national legislation, the author comments the contribution on the bill project and outlines aspects which are not dealt with by this bill project: radiological devices and cybernetic attacks. Then he reports the comments made by the commission on the bill project articles which define interdictions, sanctions and sentences, or procedures against people or organisations involved in the financing or the use of weapons of mass destruction (biological and chemical). A table gives a comparison between the bill project text and the commission's propositions

  9. Adapted Boolean network models for extracellular matrix formation

    Directory of Open Access Journals (Sweden)

    Wollbold Johannes

    2009-07-01

    Full Text Available Abstract Background Due to the rapid data accumulation on pathogenesis and progression of chronic inflammation, there is an increasing demand for approaches to analyse the underlying regulatory networks. For example, rheumatoid arthritis (RA is a chronic inflammatory disease, characterised by joint destruction and perpetuated by activated synovial fibroblasts (SFB. These abnormally express and/or secrete pro-inflammatory cytokines, collagens causing joint fibrosis, or tissue-degrading enzymes resulting in destruction of the extra-cellular matrix (ECM. We applied three methods to analyse ECM regulation: data discretisation to filter out noise and to reduce complexity, Boolean network construction to implement logic relationships, and formal concept analysis (FCA for the formation of minimal, but complete rule sets from the data. Results First, we extracted literature information to develop an interaction network containing 18 genes representing ECM formation and destruction. Subsequently, we constructed an asynchronous Boolean network with biologically plausible time intervals for mRNA and protein production, secretion, and inactivation. Experimental gene expression data was obtained from SFB stimulated by TGFβ1 or by TNFα and discretised thereafter. The Boolean functions of the initial network were improved iteratively by the comparison of the simulation runs to the experimental data and by exploitation of expert knowledge. This resulted in adapted networks for both cytokine stimulation conditions. The simulations were further analysed by the attribute exploration algorithm of FCA, integrating the observed time series in a fine-tuned and automated manner. The resulting temporal rules yielded new contributions to controversially discussed aspects of fibroblast biology (e.g., considerable expression of TNF and MMP9 by fibroblasts stimulation and corroborated previously known facts (e.g., co-expression of collagens and MMPs after TNF

  10. Self-Destructive Behavior in People with Dissociative Disorders.

    Science.gov (United States)

    Saxe, Glenn N.; Chawla, Neharika; Van der Kolk, Bessel

    2002-01-01

    Study assesses self-destructive behavior in a group of inpatients who have dissociative disorders compared to those who report few dissociative symptoms. Results reveal that these patients more frequently engage in self-destructive behaviors, use more methods of self-injury, and begin to injure themselves at an earlier age then patients who do not…

  11. Inverse problems in vision and 3D tomography

    CERN Document Server

    Mohamad-Djafari, Ali

    2013-01-01

    The concept of an inverse problem is a familiar one to most scientists and engineers, particularly in the field of signal and image processing, imaging systems (medical, geophysical, industrial non-destructive testing, etc.) and computer vision. In imaging systems, the aim is not just to estimate unobserved images, but also their geometric characteristics from observed quantities that are linked to these unobserved quantities through the forward problem. This book focuses on imagery and vision problems that can be clearly written in terms of an inverse problem where an estimate for the image a

  12. A Bi-Level Programming Model for the Railway Express Cargo Service Network Design Problem

    Directory of Open Access Journals (Sweden)

    Boliang Lin

    2018-06-01

    Full Text Available Service network design is fundamentally crucial for railway express cargo transportation. The main challenge is to strike a balance between two conflicting objectives: low network setup costs and high expected operational incomes. Different configurations of these objectives will have different impacts on the quality of freight transportation services. In this paper, a bi-level programming model for the railway express cargo service network design problem is proposed. The upper-level model forms the optimal decisions in terms of the service characteristics, and the low-level model selects the service arcs for each commodity. The rail express cargo is strictly subject to the service commitment, the capacity restriction, flow balance constraints, and logical relationship constraints among the decisions variables. Moreover, linearization techniques are used to convert the lower-level model to a linear one so that it can be directly solved by a standard optimization solver. Finally, a real-world case study based on the Beijing–Guangzhou Railway Line is carried out to demonstrate the effectiveness and efficiency of the proposed solution approach.

  13. Constructive Deviance, Destructive Deviance and Personality: How do they interrelate?

    OpenAIRE

    Bodankin, Moran; Tziner, Aharon

    2009-01-01

    In recent years deviant behavior in organizations has drawn increasing attention. However, surprisingly little research has focused on constructive rather than destructive deviance. In an attempt to bridge this gap, the present study investigated both constructive and destructive deviance at work and their relationship to employee personality. Using 89 hitech employees, constructive and destructive (interpersonal and organizational) deviance were regressed on the big-five factors of personali...

  14. Influence of Kaolin in Fly Ash Based Geopolymer Concrete: Destructive and Non-Destructive Testing

    Science.gov (United States)

    Yahya, Z.; Abdullah, M. M. A. B.; Ramli, N. Mohd; Burduhos-Nergis, D. D.; Razak, R. Abd

    2018-06-01

    Development of geopolymer concrete is mainly to reduce the production of ordinary Portland cement (OPC) that adverse the natural effect. Fly ash is a by-product collected from electrical generating power plant which resulted from burning pulverized coal. Since fly ash is waste materials, it can be recycled for future advantages particularly as pozzolanic materials in construction industry. This study focused on the feasibility of fly ash based geopolymer concrete to which kaolin has been added. The main constituents of geopolymer production for this study were class F fly ash, sodium silicate and sodium hydroxide (NaOH) solution. The concentration of NaOH solution was fixed at 12 Molar, ratio of fly ash/alkaline activator and sodium silicate/NaOH fixed at 1.5 and 2.5, respectively. Kaolin was added in range 5% to 15% from the mass of fly ash and all the samples were cured at room temperature. Destructive and non-destructive test were performed on geopolymer concrete to evaluate the best mix proportions that yield the highest strength as well as the quality of the concrete. Compressive strength, flexural strength, rebound hammer and ultrasonic pulse velocity (UPV) result have been obtained. It shown that 5% replacement of kaolin contributed to maximum compressive strength and flexural strength of 40.4 MPa and 12.35 MPa at 28 days. These result was supported by non-destructive test for the same mix proportion.

  15. Advanced non-destructive methods for an efficient service performance

    International Nuclear Information System (INIS)

    Rauschenbach, H.; Clossen-von Lanken Schulz, M.; Oberlin, R.

    2015-01-01

    Due to the power generation industry's desire to decrease outage time and extend inspection intervals for highly stressed turbine parts, advanced and reliable Non-destructive methods were developed by Siemens Non-destructive laboratory. Effective outage performance requires the optimized planning of all outage activities as well as modern Non-destructive examination methods, in order to examine the highly stressed components (turbine rotor, casings, valves, generator rotor) reliably and in short periods of access. This paper describes the experience of Siemens Energy with an ultrasonic Phased Array inspection technique for the inspection of radial entry pinned turbine blade roots. The developed inspection technique allows the ultrasonic inspection of steam turbine blades without blade removal. Furthermore advanced Non-destructive examination methods for joint bolts will be described, which offer a significant reduction of outage duration in comparison to conventional inspection techniques. (authors)

  16. Herding Complex Networks

    KAUST Repository

    Ruf, Sebastian F.

    2018-04-12

    The problem of controlling complex networks is of interest to disciplines ranging from biology to swarm robotics. However, controllability can be too strict a condition, failing to capture a range of desirable behaviors. Herdability, which describes the ability to drive a system to a specific set in the state space, was recently introduced as an alternative network control notion. This paper considers the application of herdability to the study of complex networks. The herdability of a class of networked systems is investigated and two problems related to ensuring system herdability are explored. The first is the input addition problem, which investigates which nodes in a network should receive inputs to ensure that the system is herdable. The second is a related problem of selecting the best single node from which to herd the network, in the case that a single node is guaranteed to make the system is herdable. In order to select the best herding node, a novel control energy based herdability centrality measure is introduced.

  17. Schumpeter's process of creative destruction and the Scandinavian systems

    DEFF Research Database (Denmark)

    Andersen, Esben Sloth; Dahl, Michael Slavensky; Lundvall, Bengt-Åke

    The paper studies of the process of creative destruction according to Schumpeter's programme of making a 'Theoretical, Historical, and Statistical Analysis of the Capitalist Process'. He had both a Mark I and a Mark II of concept of creative destruction, and they are important for understanding...... the coevolution between economic life and socio-political life. A method for partitioning of evolutionary change into a selection effect and an innovation effect is described, and sketches of the historical experience of Denmark and Sweden are made accordingly. Finally, a statistical study of creative destruction...

  18. Synthesizing Huber's Problem Solving and Kolb's Learning Cycle: A Balanced Approach to Technical Problem Solving

    Science.gov (United States)

    Kamis, Arnold; Khan, Beverly K.

    2009-01-01

    How do we model and improve technical problem solving, such as network subnetting? This paper reports an experimental study that tested several hypotheses derived from Kolb's experiential learning cycle and Huber's problem solving model. As subjects solved a network subnetting problem, they mapped their mental processes according to Huber's…

  19. Inverse problems in 1D hemodynamics on systemic networks: a sequential approach.

    Science.gov (United States)

    Lombardi, D

    2014-02-01

    In this work, a sequential approach based on the unscented Kalman filter is applied to solve inverse problems in 1D hemodynamics, on a systemic network. For instance, the arterial stiffness is estimated by exploiting cross-sectional area and mean speed observations in several locations of the arteries. The results are compared with those ones obtained by estimating the pulse wave velocity and the Moens-Korteweg formula. In the last section, a perspective concerning the identification of the terminal models parameters and peripheral circulation (modeled by a Windkessel circuit) is presented. Copyright © 2013 John Wiley & Sons, Ltd.

  20. Development of hotcell non-destructive examination techniques

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Young Uhn; Yu, S. C.; Kang, B. S.; Byun, K. S. [Chungbuk National University, Chungju (Korea)

    2002-01-01

    The purpose of this project is to establish non-destructive examination techniques which needs to determine the status of spent nuclear fuel and/or bundles. Through the project, we will establish an image reconstruction tomography which is a kind of non-destructive techniques in Hotcell. The tomography technique can be used to identify the 2-dimensional density distribution of fission products in the spent fuel rods and/or bundles. And form results of the measurement and analysis of magnetic properties of neutron irradiated material in the press vessel and reactor, we will develop some techniques to test its hardness and defects. In 2001, the first year, we have established mathematical background and necessary data and informations to develop the techniques. We will try to find some experimental results that are necessary in developing the Hotcell non-destructive examination techniques in the coming year. 14 refs., 65 figs., 5 tabs. (Author)

  1. Robust transient stabilisation problem for a synchronous generator in a power network

    Science.gov (United States)

    Verrelli, C. M.; Damm, G.

    2010-04-01

    The robust transient stabilisation problem (with stability proof€) of a synchronous generator in an uncertain power network with transfer conductances is rigorously formulated and solved. The generator angular speed and electrical power are required to be kept close, when mechanical and electrical perturbations occur, to the synchronous speed and mechanical input power, respectively, while the generator terminal voltage is to be regulated, when perturbations are removed, to its pre-fault reference constant value. A robust adaptive nonlinear feedback control algorithm is designed on the basis of a third-order model of the synchronous machine: only two system parameters (synchronous machine damping and inertia constants) along with upper and lower bounds on the remaining uncertain ones are supposed to be known. The conditions to be satisfied by the remote network dynamics for guaranteeing ℒ2 and ℒ∞ robustness and asymptotic relative speed and voltage regulation to zero are weaker than those required by the single machine-infinite bus approximation: dynamic interactions between the local deviations of the generator states from the corresponding equilibrium values and the remote generators states are allowed.

  2. Sample problem calculations related to two-phase flow transients in a PWR relief-piping network

    International Nuclear Information System (INIS)

    Shin, Y.W.; Wiedermann, A.H.

    1981-03-01

    Two sample problems related with the fast transients of water/steam flow in the relief line of a PWR pressurizer were calculated with a network-flow analysis computer code STAC (System Transient-Flow Analysis Code). The sample problems were supplied by EPRI and are designed to test computer codes or computational methods to determine whether they have the basic capability to handle the important flow features present in a typical relief line of a PWR pressurizer. It was found necessary to implement into the STAC code a number of additional boundary conditions in order to calculate the sample problems. This includes the dynamics of the fluid interface that is treated as a moving boundary. This report describes the methodologies adopted for handling the newly implemented boundary conditions and the computational results of the two sample problems. In order to demonstrate the accuracies achieved in the STAC code results, analytical solutions are also obtained and used as a basis for comparison

  3. Northern emporia and maritime networks. Modelling past communication using archaeological network analysis

    DEFF Research Database (Denmark)

    Sindbæk, Søren Michael

    2015-01-01

    preserve patterns of thisinteraction. Formal network analysis and modelling holds the potential to identify anddemonstrate such patterns, where traditional methods often prove inadequate. Thearchaeological study of communication networks in the past, however, calls for radically different analytical...... this is not a problem of network analysis, but network synthesis: theclassic problem of cracking codes or reconstructing black-box circuits. It is proposedthat archaeological approaches to network synthesis must involve a contextualreading of network data: observations arising from individual contexts, morphologies...

  4. Reorganizing Neural Network System for Two Spirals and Linear Low-Density Polyethylene Copolymer Problems

    Directory of Open Access Journals (Sweden)

    G. M. Behery

    2009-01-01

    Full Text Available This paper presents an automatic system of neural networks (NNs that has the ability to simulate and predict many of applied problems. The system architectures are automatically reorganized and the experimental process starts again, if the required performance is not reached. This processing is continued until the performance obtained. This system is first applied and tested on the two spiral problem; it shows that excellent generalization performance obtained by classifying all points of the two-spirals correctly. After that, it is applied and tested on the shear stress and the pressure drop problem across the short orifice die as a function of shear rate at different mean pressures for linear low-density polyethylene copolymer (LLDPE at 190∘C. The system shows a better agreement with an experimental data of the two cases: shear stress and pressure drop. The proposed system has been also designed to simulate other distributions not presented in the training set (predicted and matched them effectively.

  5. Managing Network Partitions in Structured P2P Networks

    Science.gov (United States)

    Shafaat, Tallat M.; Ghodsi, Ali; Haridi, Seif

    Structured overlay networks form a major class of peer-to-peer systems, which are touted for their abilities to scale, tolerate failures, and self-manage. Any long-lived Internet-scale distributed system is destined to face network partitions. Consequently, the problem of network partitions and mergers is highly related to fault-tolerance and self-management in large-scale systems. This makes it a crucial requirement for building any structured peer-to-peer systems to be resilient to network partitions. Although the problem of network partitions and mergers is highly related to fault-tolerance and self-management in large-scale systems, it has hardly been studied in the context of structured peer-to-peer systems. Structured overlays have mainly been studied under churn (frequent joins/failures), which as a side effect solves the problem of network partitions, as it is similar to massive node failures. Yet, the crucial aspect of network mergers has been ignored. In fact, it has been claimed that ring-based structured overlay networks, which constitute the majority of the structured overlays, are intrinsically ill-suited for merging rings. In this chapter, we motivate the problem of network partitions and mergers in structured overlays. We discuss how a structured overlay can automatically detect a network partition and merger. We present an algorithm for merging multiple similar ring-based overlays when the underlying network merges. We examine the solution in dynamic conditions, showing how our solution is resilient to churn during the merger, something widely believed to be difficult or impossible. We evaluate the algorithm for various scenarios and show that even when falsely detecting a merger, the algorithm quickly terminates and does not clutter the network with many messages. The algorithm is flexible as the tradeoff between message complexity and time complexity can be adjusted by a parameter.

  6. ODS Destruction in the United States and Abroad - February 2018

    Science.gov (United States)

    This technical report provides information on sources, destruction technologies, and best practices for recovery, collection, transport, and destruction of ozone-depleting substances and other fluorinated compounds such as HFCs

  7. Quantized hopfield networks for reliability optimization

    International Nuclear Information System (INIS)

    Nourelfath, Mustapha; Nahas, Nabil

    2003-01-01

    The use of neural networks in the reliability optimization field is rare. This paper presents an application of a recent kind of neural networks in a reliability optimization problem for a series system with multiple-choice constraints incorporated at each subsystem, to maximize the system reliability subject to the system budget. The problem is formulated as a nonlinear binary integer programming problem and characterized as an NP-hard problem. Our design of neural network to solve efficiently this problem is based on a quantized Hopfield network. This network allows us to obtain optimal design solutions very frequently and much more quickly than others Hopfield networks

  8. Contributions to ultrasounds applications in non-destructive tests on materials used in nuclear technologies

    International Nuclear Information System (INIS)

    Stanica, V.

    1979-01-01

    The problems expounded in the paper, besides servjng the practical purpose generated by the need to perform quality tests on fuel element compounds by means of the ultrasounds method, are also interesting to ultrasounds non-destructive tests applied in all industry branches as they assert the necessity of passing from manual to automation tests carried out by installations which should record the signals caused by failures, both to increase the productivjty and especially to transform it into an objective, effective test. (author)

  9. Conceptualizing Chronic Self-Destructiveness.

    Science.gov (United States)

    Kelley, Kathryn

    Self-destructiveness can be viewed in two ways: as performing an act which one knows cognitively is not conducive to one's welfare but nonetheless leads to some pleasurable affect (e.g., overeating, smoking); or not performing an act one knows one should perform but which has some negative affective consequences (e.g., dental checkups, saving…

  10. Destruction of explosives in groundwater and process water using photocatalytic and biological methods

    Energy Technology Data Exchange (ETDEWEB)

    Rodacy, P.J.; Leslie, P.K.; Prairie, M.R. [and others

    1996-04-01

    The environmentally safe destruction of pinkwater is a significant problem that requires a multidisciplinary approach to solve. We have investigated the application of advanced oxidation processes, including the use of both UV light source and laser technologies. The reactions were run under both oxidizing and reducing atmospheres. Aerobic and anaerobic biotreatments were examined as both pre- and post-treatments to the oxidation processes. The toxicity of the wastewater at various stages of treatment was determined. Membrane preconcentration schemes were examined to determine their effectiveness as part of the total pinkwater treatment scheme.

  11. 9 CFR 2.129 - Confiscation and destruction of animals.

    Science.gov (United States)

    2010-01-01

    ... 9 Animals and Animal Products 1 2010-01-01 2010-01-01 false Confiscation and destruction of animals. 2.129 Section 2.129 Animals and Animal Products ANIMAL AND PLANT HEALTH INSPECTION SERVICE, DEPARTMENT OF AGRICULTURE ANIMAL WELFARE REGULATIONS Miscellaneous § 2.129 Confiscation and destruction of...

  12. Self-Destructing Dark Matter

    Energy Technology Data Exchange (ETDEWEB)

    Grossman, Yuval [Cornell U., LEPP; Harnik, Roni [Fermilab; Telem, Ofri [Cornell U., LEPP; Zhang, Yue [Northwestern U.

    2017-12-01

    We present Self-Destructing Dark Matter (SDDM), a new class of dark matter models which are detectable in large neutrino detectors. In this class of models, a component of dark matter can transition from a long-lived state to a short-lived one by scattering off of a nucleus or an electron in the Earth. The short-lived state then decays to Standard Model particles, generating a dark matter signal with a visible energy of order the dark matter mass rather than just its recoil. This leads to striking signals in large detectors with high energy thresholds. We present a few examples of models which exhibit self destruction, all inspired by bound state dynamics in the Standard Model. The models under consideration exhibit a rich phenomenology, possibly featuring events with one, two, or even three lepton pairs, each with a fixed invariant mass and a fixed energy, as well as non-trivial directional distributions. This motivates dedicated searches for dark matter in large underground detectors such as Super-K, Borexino, SNO+, and DUNE.

  13. A life cycle assessment of destruction of ammunition

    International Nuclear Information System (INIS)

    Alverbro, K.; Bjoerklund, A.; Finnveden, G.; Hochschorner, E.; Haegvall, J.

    2009-01-01

    The Swedish Armed Forces have large stocks of ammunition that were produced at a time when decommissioning was not considered. This ammunition will eventually become obsolete and must be destroyed, preferably with minimal impact on the environment and in a safe way for personnel. The aim of this paper is to make a comparison of the environmental impacts in a life cycle perspective of three different methods of decommissioning/destruction of ammunition, and to identify the environmental advantages and disadvantages of each of these destruction methods: open detonation; static kiln incineration with air pollution control combined with metal recycling, and a combination of incineration with air pollution control, open burning, recovery of some energetic material and metal recycling. Data used are for the specific processes and from established LCA databases. Recycling the materials in the ammunition and minimising the spread of airborne pollutants during incineration were found to be the most important factors affecting the life cycle environmental performance of the compared destruction methods. Open detonation with or without metal recycling proved to be the overall worst alternative from a life cycle perspective. The results for the static kiln and combination treatment indicate that the kind of ammunition and location of the destruction plant might determine the choice of method, since the environmental impacts from these methods are of little difference in the case of this specific grenade. Different methods for destruction of ammunition have previously been discussed from a risk and safety perspective. This is however to our knowledge the first study looking specifically on environmentally aspect in a life cycle perspective.

  14. Chondrule destruction in nebular shocks

    Energy Technology Data Exchange (ETDEWEB)

    Jacquet, Emmanuel; Thompson, Christopher, E-mail: ejacquet@mnhn.fr [Canadian Institute for Theoretical Astrophysics, University of Toronto, 60 St George Street, Toronto, ON M5S 3H8 (Canada)

    2014-12-10

    Chondrules are millimeter-sized silicate spherules ubiquitous in primitive meteorites, but whose origin remains mysterious. One of the main proposed mechanisms for producing them is melting of solids in shock waves in the gaseous protoplanetary disk. However, evidence is mounting that chondrule-forming regions were enriched in solids well above solar abundances. Given the high velocities involved in shock models, destructive collisions would be expected between differently sized grains after passage of the shock front as a result of differential drag. We investigate the probability and outcome of collisions of particles behind a one-dimensional shock using analytic methods as well as a full integration of the coupled mass, momentum, energy, and radiation equations. Destruction of protochondrules seems unavoidable for solid/gas ratios ε ≳ 0.1, and possibly even for solar abundances because of 'sandblasting' by finer dust. A flow with ε ≳ 10 requires much smaller shock velocities (∼2 versus 8 km s{sup –1}) in order to achieve chondrule-melting temperatures, and radiation trapping allows slow cooling of the shocked fragments. Initial destruction would still be extensive; although re-assembly of millimeter-sized particles would naturally occur by grain sticking afterward, the compositional heterogeneity of chondrules may be difficult to reproduce. We finally note that solids passing through small-scale bow shocks around few kilometer-sized planetesimals might experience partial melting and yet escape fragmentation.

  15. Design and Optimisation Problems in Wireless Sensor Networks

    Indian Academy of Sciences (India)

    Premkumar Karumbu,1.05 ECE,,+91-9448227167

    2010-11-14

    Nov 14, 2010 ... Wireless Networks of Multifunction Smart Sensors (WSNs). A smart sensor ... Energy and environment management networks in large buildings. Emerging ISA ... Monitoring mobile patients in hospitals and homes. Locating ...

  16. Statistical Network Analysis for Functional MRI: Mean Networks and Group Comparisons.

    Directory of Open Access Journals (Sweden)

    Cedric E Ginestet

    2014-05-01

    Full Text Available Comparing networks in neuroscience is hard, because the topological properties of a given network are necessarily dependent on the number of edges of that network. This problem arises in the analysis of both weighted and unweighted networks. The term density is often used in this context, in order to refer to the mean edge weight of a weighted network, or to the number of edges in an unweighted one. Comparing families of networks is therefore statistically difficult because differences in topology are necessarily associated with differences in density. In this review paper, we consider this problem from two different perspectives, which include (i the construction of summary networks, such as how to compute and visualize the mean network from a sample of network-valued data points; and (ii how to test for topological differences, when two families of networks also exhibit significant differences in density. In the first instance, we show that the issue of summarizing a family of networks can be conducted by either adopting a mass-univariate approach, which produces a statistical parametric network (SPN, or by directly computing the mean network, provided that a metric has been specified on the space of all networks with a given number of nodes. In the second part of this review, we then highlight the inherent problems associated with the comparison of topological functions of families of networks that differ in density. In particular, we show that a wide range of topological summaries, such as global efficiency and network modularity are highly sensitive to differences in density. Moreover, these problems are not restricted to unweighted metrics, as we demonstrate that the same issues remain present when considering the weighted versions of these metrics. We conclude by encouraging caution, when reporting such statistical comparisons, and by emphasizing the importance of constructing summary networks.

  17. 3D characterisation of RCF crack networks

    Directory of Open Access Journals (Sweden)

    Ahlström Johan

    2014-06-01

    Full Text Available Rolling contact fatigue (RCF damage is becoming more frequent with increased traffic and loading conditions in the railway industry. Defects which are characterized by a two-lobe darkened surface and a V-shaped surface-breaking crack are often so-called squats. The origination and propagation of squats in railway rails is the topic of many recent studies; the associated crack networks develop with complicated geometry near the surface of rails that is difficult to characterise using most non-destructive methods. The cracks can be examined with repeated metallographic sectioning, but the process is time-consuming and destructive. In order to reduce time, as well as information and material loss, high-resolution and high-energy X-ray imaging of railway rails was done in the current study. Combining the exposures from a range of angles using image analysis, a 3D representation of the complex crack network is achieved. The latter was complemented with metallographic sectioning to determine the accuracy of prediction of the geometrical reconstruction.

  18. Evaluation of destructive methods for managing decontamination wastes

    International Nuclear Information System (INIS)

    Piciulo, P.L.; Adams, J.W.

    1986-01-01

    Results are discussed of a laboratory evaluation of destructive methods for processing chemical decontamination wastes. Incineration, acid digestion and wet-air oxidation are capable of degrading decontamination reagents and organic ion-exchange resins. The extent of destruction as a function of operating parameters was waste specific. The reagents used in the testing were: EDTA, oxalic acid, citric acid, picolinic acid and LND-101A

  19. Energy-aware virtual network embedding in flexi-grid optical networks

    Science.gov (United States)

    Lin, Rongping; Luo, Shan; Wang, Haoran; Wang, Sheng; Chen, Bin

    2018-01-01

    Virtual network embedding (VNE) problem is to map multiple heterogeneous virtual networks (VN) on a shared substrate network, which mitigate the ossification of the substrate network. Meanwhile, energy efficiency has been widely considered in the network design. In this paper, we aim to solve the energy-aware VNE problem in flexi-grid optical networks. We provide an integer linear programming (ILP) formulation to minimize the power increment of each arriving VN request. We also propose a polynomial-time heuristic algorithm where virtual links are embedded sequentially to keep a reasonable acceptance ratio and maintain a low energy consumption. Numerical results show the functionality of the heuristic algorithm in a 24-node network.

  20. Parallelization of learning problems by artificial neural networks. Application in external radiotherapy

    International Nuclear Information System (INIS)

    Sauget, M.

    2007-12-01

    This research is about the application of neural networks used in the external radiotherapy domain. The goal is to elaborate a new evaluating system for the radiation dose distributions in heterogeneous environments. The al objective of this work is to build a complete tool kit to evaluate the optimal treatment planning. My st research point is about the conception of an incremental learning algorithm. The interest of my work is to combine different optimizations specialized in the function interpolation and to propose a new algorithm allowing to change the neural network architecture during the learning phase. This algorithm allows to minimise the al size of the neural network while keeping a good accuracy. The second part of my research is to parallelize the previous incremental learning algorithm. The goal of that work is to increase the speed of the learning step as well as the size of the learned dataset needed in a clinical case. For that, our incremental learning algorithm presents an original data decomposition with overlapping, together with a fault tolerance mechanism. My last research point is about a fast and accurate algorithm computing the radiation dose deposit in any heterogeneous environment. At the present time, the existing solutions used are not optimal. The fast solution are not accurate and do not give an optimal treatment planning. On the other hand, the accurate solutions are far too slow to be used in a clinical context. Our algorithm answers to this problem by bringing rapidity and accuracy. The concept is to use a neural network adequately learned together with a mechanism taking into account the environment changes. The advantages of this algorithm is to avoid the use of a complex physical code while keeping a good accuracy and reasonable computation times. (author)

  1. Resolution enhancement for ultrasonic echographic technique in non destructive testing with an adaptive deconvolution method

    International Nuclear Information System (INIS)

    Vivet, L.

    1989-01-01

    The ultrasonic echographic technique has specific advantages which makes it essential in a lot of Non Destructive Testing (NDT) investigations. However, the high acoustic power necessary to propagate through highly attenuating media can only be transmitted by resonant transducers, which induces severe limitations of the resolution on the received echograms. This resolution may be improved with deconvolution methods. But one-dimensional deconvolution methods come up against problems in non destructive testing when the investigated medium is highly anisotropic and inhomogeneous (i.e. austenitic steel). Numerous deconvolution techniques are well documented in the NDT literature. But they often come from other application fields (biomedical engineering, geophysics) and we show they do not apply well to specific NDT problems: frequency-dependent attenuation and non-minimum phase of the emitted wavelet. We therefore introduce a new time-domain approach which takes into account the wavelet features. Our method solves the deconvolution problem as an estimation one and is performed in two steps: (i) A phase correction step which takes into account the phase of the wavelet and estimates a phase-corrected echogram. The phase of the wavelet is only due to the transducer and is assumed time-invariant during the propagation. (ii) A band equalization step which restores the spectral content of the ideal reflectivity. The two steps of the method are performed using fast Kalman filters which allow a significant reduction of the computational effort. Synthetic and actual results are given to prove that this is a good approach for resolution improvement in attenuating media [fr

  2. Aseismic blocks and destructive earthquakes in the Aegean

    Science.gov (United States)

    Stiros, Stathis

    2017-04-01

    Aseismic areas are not identified only in vast, geologically stable regions, but also within regions of active, intense, distributed deformation such as the Aegean. In the latter, "aseismic blocks" about 200m wide were recognized in the 1990's on the basis of the absence of instrumentally-derived earthquake foci, in contrast to surrounding areas. This pattern was supported by the available historical seismicity data, as well as by geologic evidence. Interestingly, GPS evidence indicates that such blocks are among the areas characterized by small deformation rates relatively to surrounding areas of higher deformation. Still, the largest and most destructive earthquake of the 1990's, the 1995 M6.6 earthquake occurred at the center of one of these "aseismic" zones at the northern part of Greece, found unprotected against seismic hazard. This case was indeed a repeat of the case of the tsunami-associated 1956 Amorgos Island M7.4 earthquake, the largest 20th century event in the Aegean back-arc region: the 1956 earthquake occurred at the center of a geologically distinct region (Cyclades Massif in Central Aegean), till then assumed aseismic. Interestingly, after 1956, the overall idea of aseismic regions remained valid, though a "promontory" of earthquake prone-areas intruding into the aseismic central Aegean was assumed. Exploitation of the archaeological excavation evidence and careful, combined analysis of historical and archaeological data and other palaeoseismic, mostly coastal data, indicated that destructive and major earthquakes have left their traces in previously assumed aseismic blocks. In the latter earthquakes typically occur with relatively low recurrence intervals, >200-300 years, much smaller than in adjacent active areas. Interestingly, areas assumed a-seismic in antiquity are among the most active in the last centuries, while areas hit by major earthquakes in the past are usually classified as areas of low seismic risk in official maps. Some reasons

  3. 9 CFR 54.7 - Procedures for destruction of animals.

    Science.gov (United States)

    2010-01-01

    ... 9 Animals and Animal Products 1 2010-01-01 2010-01-01 false Procedures for destruction of animals. 54.7 Section 54.7 Animals and Animal Products ANIMAL AND PLANT HEALTH INSPECTION SERVICE, DEPARTMENT... SCRAPIE Scrapie Indemnification Program § 54.7 Procedures for destruction of animals. (a) Scrapie-positive...

  4. Trust, Privacy, and Frame Problems in Social and Business E-Networks, Part 1

    Directory of Open Access Journals (Sweden)

    Jeff Buechner

    2011-03-01

    Full Text Available Privacy issues in social and business e-networks are daunting in complexity—private information about oneself might be routed through countless artificial agents. For each such agent, in that context, two questions about trust are raised: Where an agent must access (or store personal information, can one trust that artificial agent with that information and, where an agent does not need to either access or store personal information, can one trust that agent not to either access or store that information? It would be an infeasible task for any human being to explicitly determine, for each artificial agent, whether it can be trusted. That is, no human being has the computational resources to make such an explicit determination. There is a well-known class of problems in the artificial intelligence literature, known as frame problems, where explicit solutions to them are computationally infeasible. Human common sense reasoning solves frame problems, though the mechanisms employed are largely unknown. I will argue that the trust relation between two agents (human or artificial functions, in some respects, is a frame problem solution. That is, a problem is solved without the need for a computationally infeasible explicit solution. This is an aspect of the trust relation that has remained unexplored in the literature. Moreover, there is a formal, iterative structure to agent-agent trust interactions that serves to establish the trust relation non-circularly, to reinforce it, and to “bootstrap” its strength.

  5. Chronic destructive pulmonary tuberculosis: assessment of disease activity by computed tomography

    Energy Technology Data Exchange (ETDEWEB)

    Nam, Kyung Jin; Jeong, Yeon Joo [Dept. of Radiology, Pusan National Univ. Hospital, Pusan National Univ. School of Medicine and Medical Research Inst., Pusan (Korea, Republic of)], E-mail: jeongyj@pusan.ac.kr; Kim, Yeong Dae; I, Hoseok [Thoracic and Cardiovascular Surgery, Pusan National Univ. Hospital, Pusan National Univ. School of Medicine and Medical Research Inst., Pusan (Korea, Republic of); Kim, Kun-Il; Lee, Jun Woo [Dept. of Radiology, Pusan National Univ. Yangsan Hospital, Pusan National Univ. School of Medicine, Pusan (Korea, Republic of); Park, Hye Kyung [Internal Medicine, and Pusan National Univ. Hospital, Pusan National Univ. School of Medicine and Medical Research Inst., Pusan (Korea, Republic of)

    2012-11-15

    Background Determination of disease activity of chronic destructive pulmonary tuberculosis (TB) on imaging studies can be difficult because several imaging findings due to disease chronicity such as a residual cavity can be misinterpreted as an active disease. Purpose To evaluate computed tomography (CT) findings to predict active disease in patients with chronic destructive pulmonary TB. Material and Methods CT findings of 36 patients with chronic active destructive pulmonary TB and 78 patients with chronic inactive destructive pulmonary TB were reviewed and their patterns of lung lesions were compared. Statistical comparisons were performed using chi-square and Student's T tests for univariate analyses, and a stepwise logistic regression method was used for multivariate analysis. Results Based on univariate analyses, cavitary destruction (P = 0.015), non-branching centrilobular nodules (P < 0.001), tree-in-bud pattern (P < 0.001), airspace nodules (P < 0.001), and cavities in other lobes (P = 0.001) were more frequently seen in chronic active destructive pulmonary TB. A stepwise logistic regression analysis demonstrated that tree-in-bud pattern (odds ratio, 52.3; 95% confidence interval, 6.2-437.2; P < 0.001) were significant CT findings associated with active disease. Conclusion Tree-in-bud pattern were the most characteristic CT findings to predict active disease in patients with chronic destructive pulmonary TB.

  6. DESTRUCTIVE EXAMINATION OF SHIPPING PACKAGE 9975-06100

    Energy Technology Data Exchange (ETDEWEB)

    Daugherty, W.

    2014-11-07

    Destructive and non-destructive examinations have been performed on specified components of shipping package 9975-06100. This package was selected for examination based on several characteristics: - This was the first destructively examined package in which the fiberboard assembly was fabricated from softwood fiberboard. - The package contained a relatively high heat load to contribute to internal temperature, which is a key environmental factor for fiberboard degradation. - The package has been stored in the middle or top of a storage array since its receipt in K- Area, positions that would contribute to increased service temperatures. No significant changes were observed for attributes that were measured during both field surveillance and destructive examination. Except for the axial gap, all observations and test results met identified criteria, or were collected for information and trending purposes. The axial gap met the 1 inch maximum criterion during field surveillance, but was just over the criterion during SRNL measurements. When re-measured at a later date, it again met the criterion. The bottom of the lower fiberboard assembly and the drum interior had two small stains at matching locations, suggestive of water intrusion. However, the fiberboard assembly did not contain any current evidence of excess moisture. No evidence of a degraded condition was found in this package. Despite exposure to the elevated temperatures of this higher-then-average wattage package, properties of the fiberboard and O-rings are consistent with those of new packages.

  7. Neural Network Molecule: a Solution of the Inverse Biometry Problem through Software Support of Quantum Superposition on Outputs of the Network of Artificial Neurons

    Directory of Open Access Journals (Sweden)

    Vladimir I. Volchikhin

    2017-12-01

    Full Text Available Introduction: The aim of the study is to accelerate the solution of neural network biometrics inverse problem on an ordinary desktop computer. Materials and Methods: To speed up the calculations, the artificial neural network is introduced into the dynamic mode of “jittering” of the states of all 256 output bits. At the same time, too many output states of the neural network are logarithmically folded by transitioning to the Hamming distance space between the code of the image “Own” and the codes of the images “Alien”. From the database of images of “Alien” 2.5 % of the most similar images are selected. In the next generation, 97.5 % of the discarded images are restored with GOST R 52633.2-2010 procedures by crossing parent images and obtaining descendant images from them. Results: Over a period of about 10 minutes, 60 generations of directed search for the solution of the inverse problem can be realized that allows inversing matrices of neural network functionals of dimension 416 inputs to 256 outputs with restoration of up to 97 % information on unknown biometric parameters of the image “Own”. Discussion and Conclusions: Supporting for 10 minutes of computer time the 256 qubit quantum superposition allows on a conventional computer to bypass the actual infinity of analyzed states in 5050 (50 to 50 times more than the same computer could process realizing the usual calculations. The increase in the length of the supported quantum superposition by 40 qubits is equivalent to increasing the processor clock speed by about a billion times. It is for this reason that it is more profitable to increase the number of quantum superpositions supported by the software emulator in comparison with the creation of a more powerful processor.

  8. Animal Spirits Meets Creative Destruction

    NARCIS (Netherlands)

    Francois, P.; Lloyd-Ellis, H.

    2001-01-01

    We show how a Schumpeterian process of creative destruction can induce coordination in the timing of entrepreneurial activities across diverse sectors of the economy.Consequently, a multi-sector economy, in which sector-specific, productivity improvements are made by independent, profit-seeking

  9. Dynamic Scoring Through Creative Destruction

    NARCIS (Netherlands)

    van Oudheusden, P.

    2012-01-01

    Abstract: We examine the dynamic feedback effects of fiscal policies on the government budget and economy activity in a calibrated general equilibrium framework featuring endogenous growth through creative destruction. For several European countries, we find that making tax incentives with respect

  10. Destructive spondyloarthropathy and radiographic follow-up in hemodialysis patients

    International Nuclear Information System (INIS)

    Orzincolo, C.; Cardona, P.; Bedani, P.L.; Gilli, P.; Scutellari, P.N.; Trotta, F.

    1990-01-01

    Nine patients undergoing regular dialytic treatment for more than 60 months showed clinical and radiologic features of a noninfective and destructive spondyloarthropathy. Typically, radiographs and CT scans revealed narrowing of intervertebral spaces, with destruction or sclerosis of the subchondral bone of the vertebral plate. A radiographic follow-up of the cervical spine was performed in seven patients after a period of 12 months and showed that the bone destruction in DSA is very rapid and progressive. The lower biocompatibility of the cuprophan membranes of dialyzers is probably the factor most responsible for hyperproduction of β 2 -m and subsequently osteoarticular deposition of a new type of amyloidosis. (orig./DG)

  11. Library Automation and Networking in India: Problems and Prospects.

    Science.gov (United States)

    Vyas, S. D.

    1997-01-01

    Examines the information infrastructure and the impact of information technology in India. Highlights include attempts toward automation; library networking at the national and local level; descriptions of four major networks; library software; and constraints of networking in academic libraries. (LRW)

  12. Reappraising craft specialization and exchange in pre-contact Hawaii through non-destructive sourcing of basalt adze debitage

    International Nuclear Information System (INIS)

    Mills, P.R.; Lundblad, S.P.; Hon, K.; Moniz Nakamura, J.J.; Kahahane, E.L.; Drake-Raue, A.; Souza, T.M.; Wei, R.

    2011-01-01

    Depictions of pre-Contact Hawaiian complex societies are framed in self-sufficient small land units (Ahupua'a) that minimised the occurrence of long-distance commodity exchange and chiefly redistributive networks. We test the Ahupua'a model by using non-destructive Energy-Dispersive X-Ray Fluorescence (EDXRF) to source 955 basalt flakes and cores recovered from Kahalu'u Habitation Cave in the Kona district (∼AD 1600-1800). Findings suggest that less than 7% of the basalt debitage was obtained from local sources. (author). 48 refs., 7 figs., 4 tabs.

  13. Thermodynamic Profiles of the Destructive June 2012 Derecho

    Science.gov (United States)

    Liu, C.; Novakovskaia, E.; Bosse, J.; Ware, R.; Stillman, D.; Sloop, C.; Blanchette, L.; Demoz, B.; Nelson, M.; Cooper, L.; Czarnetzki, A.; Reehorst, A.

    2012-12-01

    The June 2012 mid-Atlantic and Midwest Derecho was one of the most destructive and deadly fast-moving severe thunderstorm events in North American history. The derecho produced wind gusts approaching 100 miles per hour as it traveled more than 600 miles across large sections of the Midwestern United States, the central Appalachians and the Mid-Atlantic States on the afternoon and evening of June 29, 2012 and into the early morning of June 30, 2012. It produced hurricane-like impacts with little warning, resulting in more than 20 deaths, widespread damage and millions of power outages across the entire affected region. We present continuous temperature and moisture profiles observed by microwave radiometers, and derived forecast indices, along the storm path at locations in Iowa, Ohio and Maryland, providing unique perspective on the evolution of this historic storm. For example, an extreme CAPE value of 5,000 J/kg was derived from radiometer observations at Germantown, Maryland ten hours before storm passage, and 80 knot Wind Index (WINDEX) was derived seven hours before passage. The Germantown radiometer is operated as part of the Earth Networks Boundary Layer Network (BLN) for continuous thermodynamic monitoring of the planetary boundary layer up to 30,000 feet. The BLN uses Radiometrics microwave profilers providing continuous temperature and humidity soundings with radiosonde-equivalent observation accuracy, and unique liquid soundings. This case study illustrates the promise for severe storm forecast improvement based on continuous monitoring of temperature and moisture in the boundary layer and above.

  14. Energy optimization in mobile sensor networks

    Science.gov (United States)

    Yu, Shengwei

    Mobile sensor networks are considered to consist of a network of mobile robots, each of which has computation, communication and sensing capabilities. Energy efficiency is a critical issue in mobile sensor networks, especially when mobility (i.e., locomotion control), routing (i.e., communications) and sensing are unique characteristics of mobile robots for energy optimization. This thesis focuses on the problem of energy optimization of mobile robotic sensor networks, and the research results can be extended to energy optimization of a network of mobile robots that monitors the environment, or a team of mobile robots that transports materials from stations to stations in a manufacturing environment. On the energy optimization of mobile robotic sensor networks, our research focuses on the investigation and development of distributed optimization algorithms to exploit the mobility of robotic sensor nodes for network lifetime maximization. In particular, the thesis studies these five problems: 1. Network-lifetime maximization by controlling positions of networked mobile sensor robots based on local information with distributed optimization algorithms; 2. Lifetime maximization of mobile sensor networks with energy harvesting modules; 3. Lifetime maximization using joint design of mobility and routing; 4. Optimal control for network energy minimization; 5. Network lifetime maximization in mobile visual sensor networks. In addressing the first problem, we consider only the mobility strategies of the robotic relay nodes in a mobile sensor network in order to maximize its network lifetime. By using variable substitutions, the original problem is converted into a convex problem, and a variant of the sub-gradient method for saddle-point computation is developed for solving this problem. An optimal solution is obtained by the method. Computer simulations show that mobility of robotic sensors can significantly prolong the lifetime of the whole robotic sensor network while

  15. DETERMINANTS DESTRUCTIVE TO BUSINESS CONDUCT TRANSPORT

    Directory of Open Access Journals (Sweden)

    Natalia Anatol’evna Loginova

    2017-03-01

    Full Text Available The article examines the determinants of destructive behavior in the transport business with the aim to identify their causes and to clarify the features of influence on them by all business stakeholders in transport. It is shown that the key determinants are: submission to the will of one business entity to another, the implementation of state support only in distressed periods of functioning of transport organizations, business obligations to the state are often perceived as a back-breaking businessmen, unfair, unnecessary. The main conclusions of the work are reduced to the following recommendations: to form a focused pulse of the state in support of the transport business; improve enforcement culture; more efficient use of the transport business capital. The goal – to identify the cause of the destructive business behavior and clarify the characteristics of their research on the part of all stakeholders in the transport sector. Method or methodology of work: in the article used analytical methods, and statistical analysis methods. Results for: received informative pictures that describe deterministic minanaty-destructive conduct business on the road, on the basis of which developed recommendations to neutralize their influence on the behavior of entrepreneurs. Application of results: the results the expediency applied differently businesses and government agencies operating in the field of transport.

  16. Destructiveness criteria for seismic risk evaluation of nuclear power plant

    International Nuclear Information System (INIS)

    Saragoni, G.R.

    1995-01-01

    Two criteria of destructiveness for seismic risk evaluation of nuclear power plant are presented. The first one is a simple linear criterion that allows to compute average response spectra in terms of earthquake accelerogram characteristics. The second defines the destructiveness potential factor P D which measures the capacity of earthquake to produce nonlinear damage. This second criterion that shows large differences of destructiveness capacity for earthquake accelerograms of different seismic environment, specially between subductive and transcursive, is strongly recommended. (author). 8 refs., 1 fig. 1 tab

  17. Visualization of protein interaction networks: problems and solutions

    Directory of Open Access Journals (Sweden)

    Agapito Giuseppe

    2013-01-01

    Full Text Available Abstract Background Visualization concerns the representation of data visually and is an important task in scientific research. Protein-protein interactions (PPI are discovered using either wet lab techniques, such mass spectrometry, or in silico predictions tools, resulting in large collections of interactions stored in specialized databases. The set of all interactions of an organism forms a protein-protein interaction network (PIN and is an important tool for studying the behaviour of the cell machinery. Since graphic representation of PINs may highlight important substructures, e.g. protein complexes, visualization is more and more used to study the underlying graph structure of PINs. Although graphs are well known data structures, there are different open problems regarding PINs visualization: the high number of nodes and connections, the heterogeneity of nodes (proteins and edges (interactions, the possibility to annotate proteins and interactions with biological information extracted by ontologies (e.g. Gene Ontology that enriches the PINs with semantic information, but complicates their visualization. Methods In these last years many software tools for the visualization of PINs have been developed. Initially thought for visualization only, some of them have been successively enriched with new functions for PPI data management and PIN analysis. The paper analyzes the main software tools for PINs visualization considering four main criteria: (i technology, i.e. availability/license of the software and supported OS (Operating System platforms; (ii interoperability, i.e. ability to import/export networks in various formats, ability to export data in a graphic format, extensibility of the system, e.g. through plug-ins; (iii visualization, i.e. supported layout and rendering algorithms and availability of parallel implementation; (iv analysis, i.e. availability of network analysis functions, such as clustering or mining of the graph, and the

  18. Energy-aware virtual network embedding in flexi-grid networks.

    Science.gov (United States)

    Lin, Rongping; Luo, Shan; Wang, Haoran; Wang, Sheng

    2017-11-27

    Network virtualization technology has been proposed to allow multiple heterogeneous virtual networks (VNs) to coexist on a shared substrate network, which increases the utilization of the substrate network. Efficiently mapping VNs on the substrate network is a major challenge on account of the VN embedding (VNE) problem. Meanwhile, energy efficiency has been widely considered in the network design in terms of operation expenses and the ecological awareness. In this paper, we aim to solve the energy-aware VNE problem in flexi-grid optical networks. We provide an integer linear programming (ILP) formulation to minimize the electricity cost of each arriving VN request. We also propose a polynomial-time heuristic algorithm where virtual links are embedded sequentially to keep a reasonable acceptance ratio and maintain a low electricity cost. Numerical results show that the heuristic algorithm performs closely to the ILP for a small size network, and we also demonstrate its applicability to larger networks.

  19. Improving network management with Software Defined Networking

    International Nuclear Information System (INIS)

    Dzhunev, Pavel

    2013-01-01

    Software-defined networking (SDN) is developed as an alternative to closed networks in centers for data processing by providing a means to separate the control layer data layer switches, and routers. SDN introduces new possibilities for network management and configuration methods. In this article, we identify problems with the current state-of-the-art network configuration and management mechanisms and introduce mechanisms to improve various aspects of network management

  20. Total destruction of PCB transformers

    International Nuclear Information System (INIS)

    Myers, D.S.

    1991-01-01

    This paper reports that if elimination of PCB liability, including lingering liabilities, is the goal, then landfilling cannot be and option. The law is clear that the generator of PCB waste is responsible for that waste until this destruction. Landfilling is not destruction. Retrofilling as askarel units will not get rid of all PCB liabilities, either. Askarel retrofilling can only make this claim when it can give a lifetime guaranty of no detectable PCBs. States like Washington and California regulate, as hazardous waste, fluids which contain greater than 2 and 5 ppm PCB, respectively. There is no guarantee that your state will not so regulate PCBs in the future or that the federal laws might tighten up. Therefore, replacement and disposal by Resource Recovery constitutes the only lifetime guarantee on the market that the PCBs in your askarel transformers will never come back to haunt you

  1. Experience destructive therapy anogenital warts

    Directory of Open Access Journals (Sweden)

    M. R. Rahmatulina

    2016-01-01

    Full Text Available Objective. To assess the efficiency and tolerability of the Mardil Zinc Max, solution for external application, in topical therapy of patients with anogenital warts. Materials and methods. The study involved 58 women and 12 men at the age of 18 to 57 years old, suffering from anogenital warts. the diagnosis was confirmed by identification of human papillomavirus by the polymerase chain reaction in real time. All the patients were treated by the chemical destruction of anogenital warts with the 1.5% solution of zinc chloropropionate in 50% 2-chloropropionic acid (Mardil Zinc Max by a single application of the solution on the pathological eruptions. The results of treatment were assessed in 2 weeks, in 1, 3, 6 and 9 months after the destructive therapy. Results. In 2 weeks 62 (88.6% patients showed a clinical cure with complete tissue regeneration in the lesions, in 8 (11,4% cases in areas of the preparation erosions were visualized in the epithelialization phase, and they completely resolved within 1 week. recurrences of anogenital warts were detected in 1 (1,4% patient in the observation period up to 3 months and in 2 (2,8% patients during 9 months after carrying out the destruction. Adverse drug events have not been identified in the course of therapy and follow-up. Conclusions. As a result of the treatment of anogenital warts with the Mardil Zinc Max high rate of performance and security was set (100%, as well as the low percentage (4,2% of development of relapses.

  2. 50 CFR 28.43 - Destruction of dogs and cats.

    Science.gov (United States)

    2010-10-01

    ... 50 Wildlife and Fisheries 6 2010-10-01 2010-10-01 false Destruction of dogs and cats. 28.43 Section 28.43 Wildlife and Fisheries UNITED STATES FISH AND WILDLIFE SERVICE, DEPARTMENT OF THE INTERIOR... VIOLATIONS OF PARTS 25, 26, AND 27 Impoundment Procedures § 28.43 Destruction of dogs and cats. Dogs and cats...

  3. Distributed Multi-Commodity Network Flow Algorithm for Energy Optimal Routing in Wireless Sensor Networks.

    Directory of Open Access Journals (Sweden)

    J. Trdlicka

    2010-12-01

    Full Text Available This work proposes a distributed algorithm for energy optimal routing in a wireless sensor network. The routing problem is described as a mathematical problem by the minimum-cost multi-commodity network flow problem. Due to the separability of the problem, we use the duality theorem to derive the distributed algorithm. The algorithm computes the energy optimal routing in the network without any central node or knowledge of the whole network structure. Each node only needs to know the flow which is supposed to send or receive and the costs and capacities of the neighboring links. An evaluation of the presented algorithm on benchmarks for the energy optimal data flow routing in sensor networks with up to 100 nodes is presented.

  4. Analysis of non-destructive current simulators of flux compression generators.

    Science.gov (United States)

    O'Connor, K A; Curry, R D

    2014-06-01

    Development and evaluation of power conditioning systems and high power microwave components often used with flux compression generators (FCGs) requires repeated testing and characterization. In an effort to minimize the cost and time required for testing with explosive generators, non-destructive simulators of an FCG's output current have been developed. Flux compression generators and simulators of FCGs are unique pulsed power sources in that the current waveform exhibits a quasi-exponential increasing rate at which the current rises. Accurately reproducing the quasi-exponential current waveform of a FCG can be important in designing electroexplosive opening switches and other power conditioning components that are dependent on the integral of current action and the rate of energy dissipation. Three versions of FCG simulators have been developed that include an inductive network with decreasing impedance in time. A primary difference between these simulators is the voltage source driving them. It is shown that a capacitor-inductor-capacitor network driving a constant or decreasing inductive load can produce the desired high-order derivatives of the load current to replicate a quasi-exponential waveform. The operation of the FCG simulators is reviewed and described mathematically for the first time to aid in the design of new simulators. Experimental and calculated results of two recent simulators are reported with recommendations for future designs.

  5. European Non Destructive Examination Forum (ENDEF)

    International Nuclear Information System (INIS)

    Deffrennes, M.; Engl, G.; Estorff, U. von

    1998-01-01

    ENDEF, an initiative of the European Commission, DG XVII (Energy) was well supported by the European industrial institutions working in assistance with nuclear industrial organisations in the CEEC's (Central and Eastern European Countries) and NIS's (New Independent States). This Forum provides effectively a platform for open discussion between representatives of industrial actors active in the NDE (Non Destructive Examination)/ISI (In Service Inspection) field with the purpose to establish a co-operation pattern between qualified representatives of the EU (European Union) industry to offer a better co-ordinated and well defined assistance to the CEEC's and NIS in the field of NDE/ISI, and to lay the ground for further industrial co-operation. ENDEF developed a strategy to follow for the establishment of co-operation projects. This strategy is now used to understand the extent of past or present assistance projects and to identify the areas where more co-operation is needed. ENDEF encourages the creation in the NIS's and CEEC's of similar forums in order to increase the co-operation and co-ordination. ENDEF is also working in perfect agreement with the European Network ENIQ, piloted by the European plant operators. This identity of views lead to the leadership by the ENDEF co-ordinator of the ENIQ Task 3 involving Applications of the European Methodology for ISI qualification in the CEEC's and NIS's and presently fully integrated in ENDEF. (orig.)

  6. Modelling of fiberglass pipe destruction process

    Directory of Open Access Journals (Sweden)

    А. К. Николаев

    2017-03-01

    Full Text Available The article deals with important current issue of oil and gas industry of using tubes made of high-strength composite corrosion resistant materials. In order to improve operational safety of industrial pipes it is feasible to use composite fiberglass tubes. More than half of the accidents at oil and gas sites happen at oil gathering systems due to high corrosiveness of pumped fluid. To reduce number of accidents and improve environmental protection we need to solve the issue of industrial pipes durability. This problem could be solved by using composite materials from fiberglass, which have required physical and mechanical properties for oil pipes. The durability and strength can be monitored by a fiberglass winding method, number of layers in composite material and high corrosion-resistance properties of fiberglass. Usage of high-strength composite materials in oil production is economically feasible; fiberglass pipes production is cheaper than steel pipes. Fiberglass has small volume weight, which simplifies pipe transportation and installation. In order to identify the efficiency of using high-strength composite materials at oil production sites we conducted a research of their physical-mechanical properties and modelled fiber pipe destruction process.

  7. SCM: A method to improve network service layout efficiency with network evolution

    Science.gov (United States)

    Zhao, Qi; Zhang, Chuanhao

    2017-01-01

    Network services are an important component of the Internet, which are used to expand network functions for third-party developers. Network function virtualization (NFV) can improve the speed and flexibility of network service deployment. However, with the evolution of the network, network service layout may become inefficient. Regarding this problem, this paper proposes a service chain migration (SCM) method with the framework of “software defined network + network function virtualization” (SDN+NFV), which migrates service chains to adapt to network evolution and improves the efficiency of the network service layout. SCM is modeled as an integer linear programming problem and resolved via particle swarm optimization. An SCM prototype system is designed based on an SDN controller. Experiments demonstrate that SCM could reduce the network traffic cost and energy consumption efficiently. PMID:29267299

  8. SCM: A method to improve network service layout efficiency with network evolution.

    Science.gov (United States)

    Zhao, Qi; Zhang, Chuanhao; Zhao, Zheng

    2017-01-01

    Network services are an important component of the Internet, which are used to expand network functions for third-party developers. Network function virtualization (NFV) can improve the speed and flexibility of network service deployment. However, with the evolution of the network, network service layout may become inefficient. Regarding this problem, this paper proposes a service chain migration (SCM) method with the framework of "software defined network + network function virtualization" (SDN+NFV), which migrates service chains to adapt to network evolution and improves the efficiency of the network service layout. SCM is modeled as an integer linear programming problem and resolved via particle swarm optimization. An SCM prototype system is designed based on an SDN controller. Experiments demonstrate that SCM could reduce the network traffic cost and energy consumption efficiently.

  9. Aging material evaluation and studies by non-destructive techniques (AMES-NDT) - a European network project

    International Nuclear Information System (INIS)

    Dobmann, Gerd; Debarberis, Luigi; Coste, Jean-Francois

    2001-01-01

    This paper presents results obtained in a round-robin action organized in a concerted action of ten partners in the EURATOM program of the European Community. The objective of the research was to document the state of the art of available non-destructive testing (NDT) techniques in order to characterize material aging phenomena based on a reduction of Charpy-V energy and a shift in the fracture appearance transition temperature. Therefore, samples from the Japanese nuclear reactor pressure vessel JRQ-steel (ASMT Standard A533-B Class 1) have been thermally treated at 700 deg. C for 18 h with a subsequent water quenching. Besides micromagnetic and electromagnetic NDT, the positron annihilation technique, ultrasonic reverberation by using Laser ultrasonics and the thermo-electrical power have been applied to characterize the aged material states

  10. Thermographic and potentiometric research on thermal destruction

    Energy Technology Data Exchange (ETDEWEB)

    Mel' nichuk, A.Yu.; Fialkov, B.S.; Zazharov, A.G.; Lemke, E.R.

    1981-03-01

    Analyses of thermal effects and electric potential during the thermal destruction of various types of solid fuels were conducted by means of thermography and electron-ion phenomena determination. The characteristics of coals of various ranks, and of graphite and coke are presented. Thermograms and potential curves are graphed. The studies showed a certain correlation between the thermograms and potential change curves of the solid phase. The character of the potential curves and intensity of their peaks depends on the type of sample and makes an evaluation on the charged state of the products of destruction possible. (8 refs.) (In Russian)

  11. The Problem of Privacy in Capitalism and the Alternative Social Networking Site Diaspora*

    Directory of Open Access Journals (Sweden)

    Sebastian Sevignani

    2012-05-01

    Full Text Available In this paper, l examine the alternative social networking site Diaspora* from a Marxist standpoint. The investigation focuses on privacy, and contributes to a better understanding of this issue within the context of capitalism in general. First, I describe Diaspora*’s way of production by pointing out its alternative character as part of the free software and copyleft movement. Second, dominant theories of privacy related to individual control, exclusion, and property are introduced. Third, the problem of privacy in capitalism is described wherein dominant concepts of privacy will be contextualised on behalf of a critical political economy analysis that refers to the Marxian concept of ideology critique, Marx’s differentiation between a societal sphere of production and a societal sphere of circulation, and his analysis of capitalist fetishisms. Fourth, taking into account the problem of privacy in capitalism, the alternative potential of Diaspora* is evaluated. Finally, a brief outline of a Marxist theory of privacy is proposed.

  12. A new look at trends in non-destructive testing

    International Nuclear Information System (INIS)

    Forsten, J.

    1984-01-01

    Non-destructive testing (NDT) has been performed extensively for several decades. However, the NDT area is not in a static condition, as sophisticated equipment, improved procedures and new innovations keep development going on. Neither is the NDT field isolated from other fields, and this influences strongly the current situation, i.e.: The cost of electronics is decreasing and complex problems can now be solved; Safety requirements on products and components become more stringent; Quality requirements of the whole life span of a product or a component become more accentuated; Improved testing reliability is required; Quality assurance requirements must be imposed on NDT itself; New materials, e.g., fiber reinforced materials, and materials combinations, e.g., sandwich structures, will be used for special purposes; New production techniques, like glueing of metals, put new requirements on the NDT techniques

  13. Neural Network for Sparse Reconstruction

    Directory of Open Access Journals (Sweden)

    Qingfa Li

    2014-01-01

    Full Text Available We construct a neural network based on smoothing approximation techniques and projected gradient method to solve a kind of sparse reconstruction problems. Neural network can be implemented by circuits and can be seen as an important method for solving optimization problems, especially large scale problems. Smoothing approximation is an efficient technique for solving nonsmooth optimization problems. We combine these two techniques to overcome the difficulties of the choices of the step size in discrete algorithms and the item in the set-valued map of differential inclusion. In theory, the proposed network can converge to the optimal solution set of the given problem. Furthermore, some numerical experiments show the effectiveness of the proposed network in this paper.

  14. Maternal exposure to hurricane destruction and fetal mortality.

    Science.gov (United States)

    Zahran, Sammy; Breunig, Ian M; Link, Bruce G; Snodgrass, Jeffrey G; Weiler, Stephan; Mielke, Howard W

    2014-08-01

    The majority of research documenting the public health impacts of natural disasters focuses on the well-being of adults and their living children. Negative effects may also occur in the unborn, exposed to disaster stressors when critical organ systems are developing and when the consequences of exposure are large. We exploit spatial and temporal variation in hurricane behaviour as a quasi-experimental design to assess whether fetal death is dose-responsive in the extent of hurricane damage. Data on births and fetal deaths are merged with Parish-level housing wreckage data. Fetal outcomes are regressed on housing wreckage adjusting for the maternal, fetal, placental and other risk factors. The average causal effect of maternal exposure to hurricane destruction is captured by difference-in-differences analyses. The adjusted odds of fetal death are 1.40 (1.07-1.83) and 2.37 (1.684-3.327) times higher in parishes suffering 10-50% and >50% wreckage to housing stock, respectively. For every 1% increase in the destruction of housing stock, we observe a 1.7% (1.1-2.4%) increase in fetal death. Of the 410 officially recorded fetal deaths in these parishes, between 117 and 205 may be attributable to hurricane destruction and postdisaster disorder. The estimated fetal death toll is 17.4-30.6% of the human death toll. The destruction caused by Hurricanes Katrina and Rita imposed significant measurable losses in terms of fetal death. Postdisaster migratory dynamics suggest that the reported effects of maternal exposure to hurricane destruction on fetal death may be conservative. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.

  15. Nitrous oxide emission from denitrification in stream and river networks

    Science.gov (United States)

    Nitrous oxide (N2O) is a potent greenhouse gas that contributes to climate change and stratospheric ozone destruction. Anthropogenic nitrogen (N) loading to river networks is a potentially important source of N2O via microbial denitrification which converts N to N2O and dinitrog...

  16. Scheduling Maintenance Jobs in Networks

    OpenAIRE

    Abed, Fidaa; Chen, Lin; Disser, Yann; Groß, Martin; Megow, Nicole; Meißner, Julie; Richter, Alexander T.; Rischke, Roman

    2017-01-01

    We investigate the problem of scheduling the maintenance of edges in a network, motivated by the goal of minimizing outages in transportation or telecommunication networks. We focus on maintaining connectivity between two nodes over time; for the special case of path networks, this is related to the problem of minimizing the busy time of machines. We show that the problem can be solved in polynomial time in arbitrary networks if preemption is allowed. If preemption is restricted to integral t...

  17. Roentgenoendovascular destruction of the adrenals in Icenko-Cushing's diseases

    International Nuclear Information System (INIS)

    Yugrinov, O.G.; Komissarenko, I.V.; Cheban, A.K.; Rybakov, S.I.; Eremenko, V.N.; Makarenko, G.I.; Sheptukha, A.I.; Chernij, Ya.M.

    1986-01-01

    The principle of nonoperative adrenalectomy by means of the destruction of the adrenals with the help of roentgenoendovascular intervention was developed. It was based on a transcatheter transvenous route of delivery of a radiopaque agent which was used to control on X-ray screen mechanical damage of the adrenal structural elements (destruction) at the expense of artificial exceeding of the capacity of its venous bed. Excess of the radiopaque agent was deposited in the paravasal spaces of the adrenal on its entire length. Transcatheter transvenous destruction of the adrenals (TTDA) was performed in 97 patients: unilateral TTDA in 62, bilateral in 35. TTDA is a method of choice in the treatment of Icenko-Cushing's disease, in some patients it is an alternative to surgery

  18. Green mobile networks a networking perspective

    CERN Document Server

    Ansari, Nirwan

    2016-01-01

    Combines the hot topics of energy efficiency and next generation mobile networking, examining techniques and solutions. Green communications is a very hot topic. Ever increasing mobile network bandwidth rates significantly impacts on operating costs due to aggregate network energy consumption. As such, design on 4G networks and beyond has increasingly started to focus on 'energy efficiency' or so-called 'green' networks. Many techniques and solutions have been proposed to enhance the energy efficiency of mobile networks, yet no book has provided an in-depth analysis of the energy consumption issues in mobile networks nor offers detailed theories, tools and solutions for solving the energy efficiency problems.

  19. Exergy destruction in ammonia scrubbers

    NARCIS (Netherlands)

    Zisopoulos, Filippos K.; Goot, van der Atze Jan; Boom, Remko M.

    2018-01-01

    A theoretical ammonia scrubbing process by sulfuric acid solution is assessed with the concept of exergy. The exergy destruction of chemical neutralization is mainly (75–94%) due to changes in the chemical exergy of streams and thermal effects from the reaction while mixing effects have a limited

  20. Proliferation of massive destruction weapons: fantasy or reality?

    International Nuclear Information System (INIS)

    Duval, M.

    2001-01-01

    This article evaluates the threat of massive destruction weapons (nuclear, chemical, biological) for Europe and recalls the existing safeguards against the different forms of nuclear proliferation: legal (non-proliferation treaty (NPT), comprehensive nuclear test ban treaty (CTBT), fissile material cut off treaty (FMCT) etc..), technical (fabrication of fissile materials, delays). However, all these safeguards can be overcome as proven by the activities of some countries. The situation of proliferation for the other type of massive destruction weapons is presented too. (J.S.)

  1. Efficient Monte Carlo sampling of inverse problems using a neural network-based forward—applied to GPR crosshole traveltime inversion

    Science.gov (United States)

    Hansen, T. M.; Cordua, K. S.

    2017-12-01

    Probabilistically formulated inverse problems can be solved using Monte Carlo-based sampling methods. In principle, both advanced prior information, based on for example, complex geostatistical models and non-linear forward models can be considered using such methods. However, Monte Carlo methods may be associated with huge computational costs that, in practice, limit their application. This is not least due to the computational requirements related to solving the forward problem, where the physical forward response of some earth model has to be evaluated. Here, it is suggested to replace a numerical complex evaluation of the forward problem, with a trained neural network that can be evaluated very fast. This will introduce a modeling error that is quantified probabilistically such that it can be accounted for during inversion. This allows a very fast and efficient Monte Carlo sampling of the solution to an inverse problem. We demonstrate the methodology for first arrival traveltime inversion of crosshole ground penetrating radar data. An accurate forward model, based on 2-D full-waveform modeling followed by automatic traveltime picking, is replaced by a fast neural network. This provides a sampling algorithm three orders of magnitude faster than using the accurate and computationally expensive forward model, and also considerably faster and more accurate (i.e. with better resolution), than commonly used approximate forward models. The methodology has the potential to dramatically change the complexity of non-linear and non-Gaussian inverse problems that have to be solved using Monte Carlo sampling techniques.

  2. Techniques for Analysing Problems in Engineering Projects

    DEFF Research Database (Denmark)

    Thorsteinsson, Uffe

    1998-01-01

    Description of how CPM network can be used for analysing complex problems in engineering projects.......Description of how CPM network can be used for analysing complex problems in engineering projects....

  3. DOE Network 2025: Network Research Problems and Challenges for DOE Scientists. Workshop Report

    Energy Technology Data Exchange (ETDEWEB)

    None, None

    2016-02-01

    The growing investments in large science instruments and supercomputers by the US Department of Energy (DOE) hold enormous promise for accelerating the scientific discovery process. They facilitate unprecedented collaborations of geographically dispersed teams of scientists that use these resources. These collaborations critically depend on the production, sharing, moving, and management of, as well as interactive access to, large, complex data sets at sites dispersed across the country and around the globe. In particular, they call for significant enhancements in network capacities to sustain large data volumes and, equally important, the capabilities to collaboratively access the data across computing, storage, and instrument facilities by science users and automated scripts and systems. Improvements in network backbone capacities of several orders of magnitude are essential to meet these challenges, in particular, to support exascale initiatives. Yet, raw network speed represents only a part of the solution. Indeed, the speed must be matched by network and transport layer protocols and higher layer tools that scale in ways that aggregate, compose, and integrate the disparate subsystems into a complete science ecosystem. Just as important, agile monitoring and management services need to be developed to operate the network at peak performance levels. Finally, these solutions must be made an integral part of the production facilities by using sound approaches to develop, deploy, diagnose, operate, and maintain them over the science infrastructure.

  4. Problem solving for wireless sensor networks

    CERN Document Server

    Garcia-Hernando, Ana-Belen; Lopez-Navarro, Juan-Manuel; Prayati, Aggeliki; Redondo-Lopez, Luis

    2008-01-01

    Wireless Sensor Networks (WSN) is an area of huge research interest, attracting substantial attention from industry and academia for its enormous potential and its inherent challenges. This reader-friendly text delivers a comprehensive review of the developments related to the important technological issues in WSN.

  5. International conference 'Addressing the issues of potential terrorism and guarding against weapons of mass destruction in Central Asia' Proceedings

    International Nuclear Information System (INIS)

    2010-04-01

    Over a period of 20 century, starting from First World War, the weapons of mass destruction (W D M) arouse serious concern in world community. Geneva's protocol of 1925 prohibits the use of chemical and biological weapons. Once nuclear weapon was created, the W D M proliferation becomes the subject of high concern. Nowadays, trans national organized criminal groups and international terrorist networks are appeared in the world scene, which show their interest in obtaining an access to sensitive materials, technologies, weapons and their distribution

  6. Early MRI findings of rapidly destructive coxarthrosis

    International Nuclear Information System (INIS)

    Watanabe, Wataru; Itoi, Eiji; Yamada, Shin

    2002-01-01

    Rapidly destructive coxarthrosis (RDC) is known to affect elderly women, but its etiology is unknown. This is the first report to our knowledge, based on a search of the English literature, that reveals the entire process of hip destruction from the onset to the terminal stage of RDC, in an 80-year-old woman. Radiographic evaluation showed subchondral insufficiency fracture of the femoral head at an early stage of this disease. An MRI examination within a month of the onset of hip pain showed the entire femoral head with low intensity on T1-weighted images and high intensity on T2-weighted images, and a small low-intensity band at the subchondral area of the lateral weight-bearing portion of the head. These findings are consistent with subchondral insufficiency fracture and associated bone marrow edema. The lesion developed into a deep and large erosion at the superolateral portion of the femoral head, the process being observed on both roentgenograms and MRI. These findings were confirmed during total hip arthroplasty. This case suggests that subchondral insufficiency fracture of the femoral head may be a preceding sign of destruction of the femoral head. (orig.)

  7. Non-destructive nuclear forensics of radioactive samples

    Energy Technology Data Exchange (ETDEWEB)

    Rogge, R.B. [Canadian Neutron Beam Centre, Chalk River, ON (Canada); Alexander, Q.; Bentoumi, G.; Dimayuga, F. [Atomic Energy of Canada Limited, Chalk River, ON (Canada); Flacau, R. [Canadian Neutron Beam Centre, Chalk River, ON (Canada); Li, G.; Li, L.; Sur, B. [Atomic Energy of Canada Limited, Chalk River, ON (Canada)

    2014-07-01

    It is a matter of public safety and security to be able to examine suspicious packages of unknown origin. If the package is radioactive and sealed (i.e., the radioactive materials contained in the package, including their chemical and physical forms, are unknown), there is a significant risk on how to handle the package and eventually safely dispose of its contents. Within the context of nuclear security, nuclear forensics helps address the key issue of identifying the nature and origin of radioactive and nuclear material in order to improve physical protection measures and prevent future theft or diversion of these materials. Nuclear forensics utilizes analytical techniques, destructive and non-destructive, developed for applications related to nuclear fuel cycles. This paper demonstrates the non-destructive examination techniques that can be used to inspect encapsulated radioactive samples. Results of γ spectroscopy, X-ray spectroscopy, neutron imaging, neutron diffraction, and delayed neutron analysis as applied to an examination of sealed capsules containing unknown radioactive materials are presented. The paper also highlights the value of these techniques to the overall nuclear forensic investigation to determine the origin of these unknown radioactive materials. (author)

  8. Overlay networks toward information networking

    CERN Document Server

    Tarkoma, Sasu

    2010-01-01

    With their ability to solve problems in massive information distribution and processing, while keeping scaling costs low, overlay systems represent a rapidly growing area of R&D with important implications for the evolution of Internet architecture. Inspired by the author's articles on content based routing, Overlay Networks: Toward Information Networking provides a complete introduction to overlay networks. Examining what they are and what kind of structures they require, the text covers the key structures, protocols, and algorithms used in overlay networks. It reviews the current state of th

  9. Non-destructive microstructural analysis with depth resolution

    Energy Technology Data Exchange (ETDEWEB)

    Zolotoyabko, E. E-mail: zloto@tx.technion.ac.il; Quintana, J.P

    2003-01-01

    A depth-sensitive X-ray diffraction technique has been developed with the aim of studying microstructural modifications in inhomogeneous polycrystalline materials. In that method, diffraction profiles are measured at different X-ray energies varied by small steps. X-rays at higher energies probe deeper layers of material. Depth-resolved structural information is retrieved by comparing energy-dependent diffraction profiles. The method provides non-destructive depth profiling of the preferred orientation, grain size, microstrain fluctuations and residual strains. This technique is applied to the characterization of seashells. Similarly, energy-variable X-ray diffraction can be used for the non-destructive characterization of different laminated structures and composite materials.

  10. A Novel Intensive Distribution Logistics Network Design and Profit Allocation Problem considering Sharing Economy

    Directory of Open Access Journals (Sweden)

    Mi Gan

    2018-01-01

    Full Text Available The rapid growth of logistics distribution highlights the problems including the imperfect infrastructure of logistics distribution network, the serious shortage of distribution capacity of each individual enterprise, and the high cost of distribution in China. While the development of sharing economy makes it possible to achieve the integration of whole social logistic resources, big data technology can grasp customer’s logistics demand accurately on the basis of analyzing the customer’s logistics distribution preference, which contributes to the integration and optimization of the whole logistics resources. This paper proposes a kind of intensive distribution logistics network considering sharing economy, which assumes that all the social logistics suppliers build a strategic alliance, and individual idle logistics resources are also used to deal with distribution needs. Analyzing customer shopping behavior by the big data technology to determine customer’s logistics preference on the basis of dividing the customer’s logistics preference into high speed, low cost, and low pollution and then constructing the corresponding objective function model according to different logistics preferences, we obtain the intensive distribution logistics network model and solve it with heuristic algorithm. Furthermore, this paper analyzes the mechanism of interest distribution of the participants in the distribution network and puts forward an improved interval Shapley value method considering both satisfaction and contribution, with case verifying the feasibility and effectiveness of the model. The results showed that, compared with the traditional Shapley method, distribution coefficient calculated by the improved model could be fairer, improve stakeholder satisfaction, and promote the sustainable development of the alliance as well.

  11. Problems in the design of multifunction meteor-radar networks

    Science.gov (United States)

    Nechitailenko, V. A.; Voloshchuk, Iu. I.

    The design of meteor-radar networks is examined in connection with the need to conduct experiments on a mass scale in meteor geophysics and astronomy. Attention is given to network architecture features and procedures of communication-path selection in the organization of information transfer, with allowance for the features of the meteor communication link. The meteor link is considered as the main means to ensure traffic in the meteor-radar network.

  12. Recent canadian experience in chemical warfare agent destruction. An overview

    Energy Technology Data Exchange (ETDEWEB)

    McAndless, J.M.

    1995-09-01

    A Canadian chemical warfare agent destruction project (Swiftsure) was recently completed in which stockpiles of aged mustard, lewisite, nerve agents and contaminated scrap metal were incinerated or chemically neutralized in a safe, environmentally-responsible manner. The project scope, destruction technologies, environmental monitoring and public consultation programs are described.

  13. Recent Canadian experience in chemical warfare agent destruction: An overview. Suffield report No. 626

    Energy Technology Data Exchange (ETDEWEB)

    McAndless, J.M.

    1995-12-31

    This paper reviews a project in which stockpiles of aged mustard (bis-2-chloroethyl sulfide), lewisite (2-chlorovinyl-dichloro arsine), nerve agents, and contaminated scrap metal were incinerated or chemically neutralized in a safe, environmentally responsible manner. Sections of the paper describe the public consultation program conducted prior to destruction operations, the environmental assessment of the destruction projects, the environmental protection plan implemented to eliminate or mitigate risks with respect to the installation and operation of the destruction equipment, the environmental monitoring procedures, the agent destruction operations, and the destruction process performance, including incinerator emissions.

  14. Solution of combinatorial optimization problems by an accelerated hopfield neural network. Kobai kasokugata poppu firudo nyuraru netto ni yoru kumiawase saitekika mondai no kaiho

    Energy Technology Data Exchange (ETDEWEB)

    Ohori, T.; Yamamoto, H.; Setsu, Nenso; Watanabe, K. (Hokkaido Inst. of Technology, Hokkaido (Japan))

    1994-04-20

    The accelerated approximate solution of combinatorial optimization problems by symmetry integrating hopfield neural network (NN) has been applied to many combinatorial problems such as the traveling salesman problem, the network planning problem, etc. However, the hopfield NN converges to local minimum solutions very slowly. In this paper, a general inclination model composed by introducing an accelerated parameter to the hopfield model is proposed, and it has been shown that the acceleration parameter can make the model converge to the local minima more quickly. Moreover, simulation experiments for random quadratic combinatorial problems with two and twenty-five variables were carried out. The results show that the acceleration of convergence makes the attraction region of the local minimum change and the accuracy of solution worse. If an initial point is selected around the center of unit hyper cube, solutions with high accuracy not affected by the acceleration parameter can be obtained. 9 refs., 8 figs., 3 tabs.

  15. Non destructive nuclear measurements for control and characterization purpose

    International Nuclear Information System (INIS)

    Lyoussi, Abdallah

    2002-01-01

    In this report for accreditation to supervise researches, the author proposes a large and rather precise overview of his research works which dealt with the upstream and downstream parts of the nuclear fuel cycle. After having discussed the different needs associated with non destructive nuclear measurements during the fuel cycle, the author describes his past research activities. In the following parts, he discusses control and characterization methods associated with the upstream and downstream parts of the fuel cycle: fuel density variation measurement, non destructive control of uranium-235 content of enriched uranium ingots, examination of induced photo-fissions in radioactive waste parcels, use of electron accelerator for simultaneous neutron and photon examination, measurement of the spatial distribution of the photonic component from the Mini Linatron, association of non destructive measurement techniques

  16. Technology of Rock Destruction by Combined Explosion-Mechanical Load

    Directory of Open Access Journals (Sweden)

    Oleg M. Terentiev

    2017-10-01

    Full Text Available Background. Rock drilling is characterized by an energy capacity of more than 120 kWh/m3. This is due to the fact that about 90 % of the energy is expended on the “preparation” of rocks for destruction. This study proposes to combine explosive and mechanical loads to reduce specific energy consumption of rock destruction. Objective. The aim of the paper is energy effective technology development for rock destruction by combined explosive-mechanical loads. Methods. Analytical studies; regression analysis; math modeling; experimental research; technical and economic analysis. Results. Specific energy decreasing for explosive-mechanical rock drilling by 4–16 % was experimentally proved. Conclusions. As a result of the implementation of explosive-mechanical rock drilling on the created full-sized experimental device, the efficiency coefficient increased from 77 to 80 %.

  17. Distillation, destructive

    Energy Technology Data Exchange (ETDEWEB)

    Walton, G

    1865-05-16

    A retort for the destructive distillation of coal, shale, whereby hydrocarbons are produced, is described. The vertical retort is provided with a charging door, a discharging door, an outlet leading to the condensing plant, an inclined bottom, and a perforated cage to facilitate the escape of the vapor and to regulate the amount of materials operated upon in the retort. The upper part of the cage is conical to deflect the materials fed in by the door and the lower part is also slightly conical to facilitate emptying the retort. The bottom may incline from both back and front, and also from the sides to the center. The apparatus is heated from below, and the flues pass all round the lower part of the retort.

  18. 27 CFR 19.315 - Removal or destruction of distilling material.

    Science.gov (United States)

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 1 2010-04-01 2010-04-01 false Removal or destruction of distilling material. 19.315 Section 19.315 Alcohol, Tobacco Products and Firearms ALCOHOL AND TOBACCO TAX AND...) spirits, (2) alcoholic beverages, or (3) vinegar by the vaporizing process; or (c) for destruction. The...

  19. Cell wall proteome of sugarcane stems: comparison of a destructive and a non-destructive extraction method showed differences in glycoside hydrolases and peroxidases.

    Science.gov (United States)

    Calderan-Rodrigues, Maria Juliana; Jamet, Elisabeth; Douché, Thibaut; Bonassi, Maria Beatriz Rodrigues; Cataldi, Thaís Regiani; Fonseca, Juliana Guimarães; San Clemente, Hélène; Pont-Lezica, Rafael; Labate, Carlos Alberto

    2016-01-11

    Sugarcane has been used as the main crop for ethanol production for more than 40 years in Brazil. Recently, the production of bioethanol from bagasse and straw, also called second generation (2G) ethanol, became a reality with the first commercial plants started in the USA and Brazil. However, the industrial processes still need to be improved to generate a low cost fuel. One possibility is the remodeling of cell walls, by means of genetic improvement or transgenesis, in order to make the bagasse more accessible to hydrolytic enzymes. We aimed at characterizing the cell wall proteome of young sugarcane culms, to identify proteins involved in cell wall biogenesis. Proteins were extracted from the cell walls of 2-month-old culms using two protocols, non-destructive by vacuum infiltration vs destructive. The proteins were identified by mass spectrometry and bioinformatics. A predicted signal peptide was found in 84 different proteins, called cell wall proteins (CWPs). As expected, the non-destructive method showed a lower percentage of proteins predicted to be intracellular than the destructive one (33% vs 44%). About 19% of CWPs were identified with both methods, whilst the infiltration protocol could lead to the identification of 75% more CWPs. In both cases, the most populated protein functional classes were those of proteins related to lipid metabolism and oxido-reductases. Curiously, a single glycoside hydrolase (GH) was identified using the non-destructive method whereas 10 GHs were found with the destructive one. Quantitative data analysis allowed the identification of the most abundant proteins. The results highlighted the importance of using different protocols to extract proteins from cell walls to expand the coverage of the cell wall proteome. Ten GHs were indicated as possible targets for further studies in order to obtain cell walls less recalcitrant to deconstruction. Therefore, this work contributed to two goals: enlarge the coverage of the sugarcane

  20. ATHENA [Advanced Thermal Hydraulic Energy Network Analyzer] solutions to developmental assessment problems

    International Nuclear Information System (INIS)

    Carlson, K.E.; Ransom, V.H.; Roth, P.A.

    1987-03-01

    The ATHENA (Advanced Thermal Hydraulic Energy Network Analyzer) code has been developed to perform transient simulation of the thermal hydraulic systems that may be found in fusion reactors, space reactors, and other advanced systems. As an assessment of current capability the code was applied to a number of physical problems, both conceptual and actual experiments. Results indicate that the numerical solution to the basic conservation equations is technically sound, and that generally good agreement can be obtained when modeling relevant hydrodynamic experiments. The assessment also demonstrates basic fusion system modeling capability and verifies compatibility of the code with both CDC and CRAY mainframes. Areas where improvements could be made include constitutive modeling, which describes the interfacial exchange term. 13 refs., 84 figs

  1. METHODS OF ASSESSING THE DEGREE OF DESTRUCTION OF RUBBER PRODUCTS USING COMPUTER VISION ALGORITHMS

    Directory of Open Access Journals (Sweden)

    A. A. Khvostov

    2015-01-01

    Full Text Available For technical inspection of rubber products are essential methods of improving video scopes analyzing the degree of destruction and aging of rubber in an aggressive environment. The main factor determining the degree of destruction of the rubber product, the degree of coverage is cracked, which can be described as the amount of the total area, perimeter cracks, geometric shapes and other parameters. In the process of creating a methodology for assessing the degree of destruction of rubber products arises the problem of the development of machine vision algorithm for estimating the degree of coverage of the sample fractures and fracture characterization. For the development of image processing algorithm performed experimental studies on the artificial aging of several samples of products that are made from different rubbers. In the course of the experiments it was obtained several samples of shots vulcanizates in real time. To achieve the goals initially made light stabilization of array images using Gaussian filter. Thereafter, for each image binarization operation is applied. To highlight the contours of the surface damage of the sample is used Canny algorithm. The detected contours are converted into an array of pixels. However, a crack may be allocated to several contours. Therefore, an algorithm was developed by combining contours criterion of minimum distance between them. At the end of the calculation is made of the morphological features of each contour (area, perimeter, length, width, angle of inclination, the At the end of the calculation is made of the morphological features of each contour (area, perimeter, length, width, angle of inclination, the Minkowski dimension. Show schedule obtained by the method parameters destruction of samples of rubber products. The developed method allows you to automate assessment of the degree of aging of rubber products in telemetry systems, to study the dynamics of the aging process of polymers to

  2. Practical neural network recipies in C++

    CERN Document Server

    Masters

    2014-01-01

    This text serves as a cookbook for neural network solutions to practical problems using C++. It will enable those with moderate programming experience to select a neural network model appropriate to solving a particular problem, and to produce a working program implementing that network. The book provides guidance along the entire problem-solving path, including designing the training set, preprocessing variables, training and validating the network, and evaluating its performance. Though the book is not intended as a general course in neural networks, no background in neural works is assum

  3. Self-teaching neural network learns difficult reactor control problem

    International Nuclear Information System (INIS)

    Jouse, W.C.

    1989-01-01

    A self-teaching neural network used as an adaptive controller quickly learns to control an unstable reactor configuration. The network models the behavior of a human operator. It is trained by allowing it to operate the reactivity control impulsively. It is punished whenever either the power or fuel temperature stray outside technical limits. Using a simple paradigm, the network constructs an internal representation of the punishment and of the reactor system. The reactor is constrained to small power orbits

  4. Destructive distillation under pressure

    Energy Technology Data Exchange (ETDEWEB)

    1932-09-08

    A process of destructive distillation of distillable carbonaceous material under pressure is described, consisting of regulating the temperature by introducing the carbonaceous materials to a point where the reaction of hydrogenation has begun but has not stopped, by placing it in indirect heat-exchange with a cooling agent at a critical temperature below the reaction temperature, the agent being under pressure and introduced in the liquid state. Water is used as the cooling agent.

  5. Child Reactivity Moderates the Over-Time Association between Mother-Child Conflict Quality and Externalizing Problems

    Science.gov (United States)

    Nelson, Jackie A.

    2015-01-01

    Constructive parent-child conflict interactions that teach children to problem-solve and negotiate can enhance children's social adjustment. This paper identifies constructive and destructive qualities of mother-child conflict and explores whether child temperament moderated associations with changes in externalizing problems over time. One…

  6. Effectiveness Analysis of a Non-Destructive Single Event Burnout Test Methodology

    CERN Document Server

    Oser, P; Spiezia, G; Fadakis, E; Foucard, G; Peronnard, P; Masi, A; Gaillard, R

    2014-01-01

    It is essential to characterize power MosFETs regarding their tolerance to destructive Single Event Burnouts (SEB). Therefore, several non-destructive test methods have been developed to evaluate the SEB cross-section of power devices. A power MosFET has been evaluated using a test circuit, designed according to standard non-destructive test methods discussed in the literature. Guidelines suggest a prior adaptation of auxiliary components to the device sensitivity before the radiation test. With the first value chosen for the de-coupling capacitor, the external component initiated destructive events and affected the evaluation of the cross-section. As a result, the influence of auxiliary components on the device cross-section was studied. This paper presents the obtained experimental results, supported by SPICE simulations, to evaluate and discuss how the circuit effectiveness depends on the external components.

  7. Ultrasonic process for destruction of chlorinated organic compounds in aqueous solution

    International Nuclear Information System (INIS)

    Wu, Jiann M.; Huang, Hann S.

    1993-01-01

    Laboratory investigations of the ultrasonic process for destruction of low concentrations of carbon tetrachloride (CCl 4 ) into nonhazardous end products were carried out in a bench-scale batch reactor, equipped with a 600-W ultrasonic power supply. Process parameters studied included irradiation time, concentration, steady-state operating temperature, pH, and the intensity of applied ultrasonic-wave energy. High destruction efficiencies of greater than 99% were achieved through this process, and the irradiation time and the intensity of applied energy were identified to be the most important process parameters. The irradiation time required for a given degree of destruction decreased with increasing intensity of the applied ultrasonic energy. In addition, a detailed chemical reaction mechanism for the destruction of CCl 4 in water was formulated. The agreement between the model and experimental results is generally good

  8. Indirect Self-Destructiveness in Women who Experience Domestic Violence.

    Science.gov (United States)

    Tsirigotis, Konstantinos; Łuczak, Joanna

    2018-01-02

    Lives of people experiencing domestic or/and intimate partner violence abound in many unpleasant events and physical and psychological suffering, which affects their psychosocial functioning. The aim of this study was to explore indirect self-destructiveness as a generalised behavioural tendency and its manifestations in women experiencing domestic violence. The "Chronic Self-Destructiveness Scale" (CS-DS) was used to study two groups of women: 52 women aged 30-65 years (mean age: 40.15) using assistance of the Crisis Intervention Centre due to experienced domestic violence (V group) and 150 well-matched women not experiencing domestic violence (NV group). Women suffering domestic violence (V) obtained significantly higher scores than women not experiencing domestic violence (NV) for both the general index and a majority of CS-DS subscales; it was only for the A1 (Transgression and Risk) subscale that they achieved somewhat lower scores. Correlation coefficients between particular CS-DS subscales in the V group were higher than in the NV group; there were also certain differences in coefficients between the groups. Subscale factor analysis results were different too: only one factor was isolated in the V group while two were distinguished in the NV group. It can be inferred from the results that the intensity of indirect self-destructiveness as a generalised behavioural tendency as well as of most its categories was higher in women experiencing domestic violence. Tendencies and categories of indirectly self-destructive behaviours in women suffering domestic violence were more closely connected with one another, and the internal coherence of indirect self-destructiveness in those women might also be higher.

  9. Fast and accurate solution for the SCUC problem in large-scale power systems using adapted binary programming and enhanced dual neural network

    International Nuclear Information System (INIS)

    Shafie-khah, M.; Moghaddam, M.P.; Sheikh-El-Eslami, M.K.; Catalão, J.P.S.

    2014-01-01

    Highlights: • A novel hybrid method based on decomposition of SCUC into QP and BP problems is proposed. • An adapted binary programming and an enhanced dual neural network model are applied. • The proposed EDNN is exactly convergent to the global optimal solution of QP. • An AC power flow procedure is developed for including contingency/security issues. • It is suited for large-scale systems, providing both accurate and fast solutions. - Abstract: This paper presents a novel hybrid method for solving the security constrained unit commitment (SCUC) problem. The proposed formulation requires much less computation time in comparison with other methods while assuring the accuracy of the results. Furthermore, the framework provided here allows including an accurate description of warmth-dependent startup costs, valve point effects, multiple fuel costs, forbidden zones of operation, and AC load flow bounds. To solve the nonconvex problem, an adapted binary programming method and enhanced dual neural network model are utilized as optimization tools, and a procedure for AC power flow modeling is developed for including contingency/security issues, as new contributions to earlier studies. Unlike classical SCUC methods, the proposed method allows to simultaneously solve the unit commitment problem and comply with the network limits. In addition to conventional test systems, a real-world large-scale power system with 493 units has been used to fully validate the effectiveness of the novel hybrid method proposed

  10. Transmission network expansion planning based on hybridization model of neural networks and harmony search algorithm

    Directory of Open Access Journals (Sweden)

    Mohammad Taghi Ameli

    2012-01-01

    Full Text Available Transmission Network Expansion Planning (TNEP is a basic part of power network planning that determines where, when and how many new transmission lines should be added to the network. So, the TNEP is an optimization problem in which the expansion purposes are optimized. Artificial Intelligence (AI tools such as Genetic Algorithm (GA, Simulated Annealing (SA, Tabu Search (TS and Artificial Neural Networks (ANNs are methods used for solving the TNEP problem. Today, by using the hybridization models of AI tools, we can solve the TNEP problem for large-scale systems, which shows the effectiveness of utilizing such models. In this paper, a new approach to the hybridization model of Probabilistic Neural Networks (PNNs and Harmony Search Algorithm (HSA was used to solve the TNEP problem. Finally, by considering the uncertain role of the load based on a scenario technique, this proposed model was tested on the Garver’s 6-bus network.

  11. A Social Network Approach to Understanding an Insurgency

    Science.gov (United States)

    2007-07-01

    criminality, in- surgency, regional conflict, and terrorism. Such environments can host destructive networks and various forms of ideological ...tion.23 Collective identities draw conceptual boundaries around the genus of individuals who are similarly affected by specific circumstances. However...organized across territorial boundaries and borders. The fact that the organization on the surface appears to be loose, there is an ideological connection

  12. Fracture-mechanical results of non-destructive testing - function, goals, methods

    International Nuclear Information System (INIS)

    Herter, K.H.; Kockelmann, H.; Schuler, X.; Waidele, H.

    2004-01-01

    Non-destructive testing provides data for fracture-mechanical analyses, e.g. defect size and orientation. On the other hand, fracture-mechanical analyses may help to define criteria for non-destructive testing, e.g. sensitivity, inspection intervals and inspection sites. The criteria applied differ as a function of the safety relevance of a component. (orig.) [de

  13. European Non Destructive Examination Forum (ENDEF)

    Energy Technology Data Exchange (ETDEWEB)

    Deffrennes, M [EC, DG XVII, Nuclear Energy, Brussels (Belgium); Engl, G [Siemens AG Energieerzeugung KWU, Erlangen (Germany); Estorff, U von [EC, JRC/IAM, Petten (Netherlands)

    1998-11-01

    ENDEF, an initiative of the European Commission, DG XVII (Energy) was well supported by the European industrial institutions working in assistance with nuclear industrial organisations in the CEEC`s (Central and Eastern European Countries) and NIS`s (New Independent States). This Forum provides effectively a platform for open discussion between representatives of industrial actors active in the NDE (Non Destructive Examination)/ISI (In Service Inspection) field with the purpose to establish a co-operation pattern between qualified representatives of the EU (European Union) industry to offer a better co-ordinated and well defined assistance to the CEEC`s and NIS in the field of NDE/ISI, and to lay the ground for further industrial co-operation. ENDEF developed a strategy to follow for the establishment of co-operation projects. This strategy is now used to understand the extent of past or present assistance projects and to identify the areas where more co-operation is needed. ENDEF encourages the creation in the NIS`s and CEEC`s of similar forums in order to increase the co-operation and co-ordination. ENDEF is also working in perfect agreement with the European Network ENIQ, piloted by the European plant operators. This identity of views lead to the leadership by the ENDEF co-ordinator of the ENIQ Task 3 involving Applications of the European Methodology for ISI qualification in the CEEC`s and NIS`s and presently fully integrated in ENDEF. (orig.)

  14. Supervised learning from human performance at the computationally hard problem of optimal traffic signal control on a network of junctions.

    Science.gov (United States)

    Box, Simon

    2014-12-01

    Optimal switching of traffic lights on a network of junctions is a computationally intractable problem. In this research, road traffic networks containing signallized junctions are simulated. A computer game interface is used to enable a human 'player' to control the traffic light settings on the junctions within the simulation. A supervised learning approach, based on simple neural network classifiers can be used to capture human player's strategies in the game and thus develop a human-trained machine control (HuTMaC) system that approaches human levels of performance. Experiments conducted within the simulation compare the performance of HuTMaC to two well-established traffic-responsive control systems that are widely deployed in the developed world and also to a temporal difference learning-based control method. In all experiments, HuTMaC outperforms the other control methods in terms of average delay and variance over delay. The conclusion is that these results add weight to the suggestion that HuTMaC may be a viable alternative, or supplemental method, to approximate optimization for some practical engineering control problems where the optimal strategy is computationally intractable.

  15. 7 CFR 1786.35 - Loss, theft, destruction, mutilation, or defacement of RUS guarantee.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 12 2010-01-01 2010-01-01 false Loss, theft, destruction, mutilation, or defacement... Loans Pursuant to Section 306(A) of the RE Act § 1786.35 Loss, theft, destruction, mutilation, or... circumstances of the loss, theft, or destruction of the guarantee; and (vi) The lender or holder, shall present...

  16. Evaluation of the Performance of Feedforward and Recurrent Neural Networks in Active Cancellation of Sound Noise

    OpenAIRE

    Mehrshad Salmasi; Homayoun Mahdavi-Nasab

    2012-01-01

    Active noise control is based on the destructive interference between the primary noise and generated noise from the secondary source. An antinoise of equal amplitude and opposite phase is generated and combined with the primary noise. In this paper, performance of the neural networks is evaluated in active cancellation of sound noise. For this reason, feedforward and recurrent neural networks are designed and trained. After training, performance of the feedforwrad and recurrent networks in n...

  17. Non-destructive investigations of Swiss museums objects with neutron and x-ray imaging methods

    International Nuclear Information System (INIS)

    Lehmann, E.H.; Deschler, E.; Pernet, L.; Vontobel, P.

    2004-01-01

    Many objects of archaeological relevance found in Switzerland are from the Celtic and Roman era. Because of their uniqueness in most cases it is demanded to perform any investigation with such samples non-destructively. Depending on the structure and size of the objects a transmission experiment performed either with X-ray or neutron can alight inner structures, composition, defects or the principles of the manufacturing procedures. Furthermore, the treatment by conservators and restaurateurs becomes visible in many cases. This report describes some examples of such investigations. In the case of neutron investigations, beside the transmission imaging as a radiograph the three-dimensional structure was observed with a tomography technique. For X-ray radiography, the images were obtained in the same digital format because the similar experimental method (imaging plates) was applied. It becomes evident in the described examples that the combination and complementary use of both methods (neutrons and X-ray) brings insights in different aspects of the samples properties and treatment. This approach to study museums objects stored and exhibit in Switzerland can be extrapolated to other countries where these techniques are also simultaneously available in order to investigate other objects of relevance. The European network COST-G8 entitled 'Non-destructive analysis and testing of museum objects' can help to support initiatives in this direction. (author)

  18. Astrophysical S-factor for destructive reactions of lithium-7 in big bang nucleosynthesis

    Energy Technology Data Exchange (ETDEWEB)

    Komatsubara, Tetsuro; Kwon, YoungKwan; Moon, JunYoung; Kim, Yong-Kyun [Rare Isotope Science Project, Institute for Basic Science, Daejeon (Korea, Republic of); Moon, Chang-Bum [Hoseo University, Asan, Chungnam (Korea, Republic of); Ozawa, Akira; Sasa, Kimikazu; Onishi, Takahiro; Yuasa, Toshiaki; Okada, Shunsuke; Saito, Yuta [Division of Physics, University of Tsukuba, Tsukuba, Ibaraki (Japan); Hayakawa, Takehito; Shizuma, Toshiyuki [Japan Atomic Energy Agency, Shirakata Shirane, Tokai, Ibaraki (Japan); Kubono, Shigeru [RIKEN, Hirosawa, Wako, Saitama (Japan); Kusakabe, Motohiko [School of Liberal Arts and Science, Korea Aerospace University (Korea, Republic of); Kajino, Toshitaka [National Astronomical Observatory, Osawa, Mitaka, Tokyo (Japan)

    2014-05-02

    One of the most prominent success with the Big Bang models is the precise reproduction of mass abundance ratio for {sup 4}He. In spite of the success, abundances of lithium isotopes are still inconsistent between observations and their calculated results, which is known as lithium abundance problem. Since the calculations were based on the experimental reaction data together with theoretical estimations, more precise experimental measurements may improve the knowledge of the Big Bang nucleosynthesis. As one of the destruction process of lithium-7, we have performed measurements for the reaction cross sections of the {sup 7}L({sup 3}He,p){sup 9}Be reaction.

  19. Controlling Voltage Levels of Distribution Network-Radial Feeder after Connecting Wind Turbines to the Network

    Directory of Open Access Journals (Sweden)

    Muhammad Al Badri

    2017-11-01

    Full Text Available Several factors in power generation and supply need to be taken into account such as shortages of energy supply, system stability, and energy quality and system disruption due to network losses, industrial development and population expansion. The addition of wind turbines to the distribution network is of great benefit in providing additional power and solving these problems, but this addition is accompanied by the problem of low voltage network. This research found optimal solutions to the problem of low voltage distribution network after connecting wind turbines. The main idea of this paper is to optimize the low-voltage problem as a result of connecting the wind turbines to the "far end" of the radial feeder for a distribution network and to obtain a voltage level within an acceptable and stable range. The problem of low voltage solved by using the load-drop compensation, capacitor-bank and “doubly-fed” induction generators. The results of this study were based on the operation of the entire design of the simulation system which would be compatible with the reality of the energy flow of all network components by using the PSCAD program. The present analysis program revealed an optimum solution for the low voltage profile of the distribution network after connecting the wind turbine.

  20. Competitive Liner Shipping Network Design

    DEFF Research Database (Denmark)

    Karsten, Christian Vad

    .The contributions of this thesis cover modeling, methodology, and applications.The developed methods address operational (cargo routing), tactical (speed optimization and service selection), and strategic (network design) planning problems faced by liner shipping companies. Ultimately, the proposed methods help...... take the container transportation times that can be realized in the network nor the number of transshipments into consideration. This is mainly because the optimization problem is based on other transportation networks where these constraints are not decisive to the quality of the network. Furthermore......, the problem in itself is challenging to optimize due to its size and complexity. However, the field has seen crucial progress and is mature to include handling of competitiveness in the actual design of the network.As a liner shipping network is an organic entity, which is constantly changed to reflect...

  1. effect of rainfall intensity and energy on gully development in ...

    African Journals Online (AJOL)

    Austine

    serene vast land that experienced very minimal land pressure problems. However, the present geometric rate and scale of cultivation; growth of human settlements and transversing road networks have induced very high land use pressure problems. These obviously imply serious destruction of vegetation and soil structure.

  2. Using Stochastic Spiking Neural Networks on SpiNNaker to Solve Constraint Satisfaction Problems

    Directory of Open Access Journals (Sweden)

    Gabriel A. Fonseca Guerra

    2017-12-01

    Full Text Available Constraint satisfaction problems (CSP are at the core of numerous scientific and technological applications. However, CSPs belong to the NP-complete complexity class, for which the existence (or not of efficient algorithms remains a major unsolved question in computational complexity theory. In the face of this fundamental difficulty heuristics and approximation methods are used to approach instances of NP (e.g., decision and hard optimization problems. The human brain efficiently handles CSPs both in perception and behavior using spiking neural networks (SNNs, and recent studies have demonstrated that the noise embedded within an SNN can be used as a computational resource to solve CSPs. Here, we provide a software framework for the implementation of such noisy neural solvers on the SpiNNaker massively parallel neuromorphic hardware, further demonstrating their potential to implement a stochastic search that solves instances of P and NP problems expressed as CSPs. This facilitates the exploration of new optimization strategies and the understanding of the computational abilities of SNNs. We demonstrate the basic principles of the framework by solving difficult instances of the Sudoku puzzle and of the map color problem, and explore its application to spin glasses. The solver works as a stochastic dynamical system, which is attracted by the configuration that solves the CSP. The noise allows an optimal exploration of the space of configurations, looking for the satisfiability of all the constraints; if applied discontinuously, it can also force the system to leap to a new random configuration effectively causing a restart.

  3. Using Stochastic Spiking Neural Networks on SpiNNaker to Solve Constraint Satisfaction Problems.

    Science.gov (United States)

    Fonseca Guerra, Gabriel A; Furber, Steve B

    2017-01-01

    Constraint satisfaction problems (CSP) are at the core of numerous scientific and technological applications. However, CSPs belong to the NP-complete complexity class, for which the existence (or not) of efficient algorithms remains a major unsolved question in computational complexity theory. In the face of this fundamental difficulty heuristics and approximation methods are used to approach instances of NP (e.g., decision and hard optimization problems). The human brain efficiently handles CSPs both in perception and behavior using spiking neural networks (SNNs), and recent studies have demonstrated that the noise embedded within an SNN can be used as a computational resource to solve CSPs. Here, we provide a software framework for the implementation of such noisy neural solvers on the SpiNNaker massively parallel neuromorphic hardware, further demonstrating their potential to implement a stochastic search that solves instances of P and NP problems expressed as CSPs. This facilitates the exploration of new optimization strategies and the understanding of the computational abilities of SNNs. We demonstrate the basic principles of the framework by solving difficult instances of the Sudoku puzzle and of the map color problem, and explore its application to spin glasses. The solver works as a stochastic dynamical system, which is attracted by the configuration that solves the CSP. The noise allows an optimal exploration of the space of configurations, looking for the satisfiability of all the constraints; if applied discontinuously, it can also force the system to leap to a new random configuration effectively causing a restart.

  4. Performance analysis of ventilation systems with desiccant wheel cooling based on exergy destruction

    International Nuclear Information System (INIS)

    Tu, Rang; Liu, Xiao-Hua; Hwang, Yunho; Ma, Fei

    2016-01-01

    Highlights: • Ventilation systems with desiccant wheel were analyzed from exergy destruction. • Main performances influencing factors for ventilation systems are put forward. • Improved ventilation systems with lower exergy destruction are suggested. • Performances of heat pumps driven ventilation systems are greatly increased. - Abstract: This paper investigates the performances of ventilation systems with desiccant wheel cooling from the perspective of exergy destructions. Based on the inherent influencing factors for exergy destructions of heat and mass transfer and heat sources, provide guidelines for efficient system design. First, performances of a basic ventilation system are simulated, which is operated at high regeneration temperature and low coefficient of performance (COP). Then, exergy analysis of the basic ventilation system shows that exergy destructions mainly exist in the heat and mass transfer components and the heat source. The inherent influencing factors for the heat and mass transfer exergy destruction are heat and mass transfer capacities, which are related to over dehumidification of the desiccant wheel, and unmatched coefficients, which represent the uniformity of the temperature or humidity ratio differences fields for heat and mass transfer components. Based on these findings, two improved ventilation systems are suggested. For the first system, over dehumidification is avoided and unmatched coefficients for each component are reduced. With lower heat and mass transfer exergy destructions and lower regeneration temperature, COP and exergy efficiency of the first system are increased compared with the basic ventilation system. For the second system, a heat pump, which recovers heat from the process air to heat the regeneration air, is adopted to replace the electrical heater and cooling devices. The exergy destruction of the heat pump is considerably reduced as compared with heat source exergy destruction of the basic ventilation

  5. Convergence speed of consensus problems over undirected scale-free networks

    International Nuclear Information System (INIS)

    Sun Wei; Dou Li-Hua

    2010-01-01

    Scale-free networks and consensus behaviour among multiple agents have both attracted much attention. To investigate the consensus speed over scale-free networks is the major topic of the present work. A novel method is developed to construct scale-free networks due to their remarkable power-law degree distributions, while preserving the diversity of network topologies. The time cost or iterations for networks to reach a certain level of consensus is discussed, considering the influence from power-law parameters. They are both demonstrated to be reversed power-law functions of the algebraic connectivity, which is viewed as a measurement on convergence speed of the consensus behaviour. The attempts of tuning power-law parameters may speed up the consensus procedure, but it could also make the network less robust over time delay at the same time. Large scale of simulations are supportive to the conclusions. (general)

  6. Mathematical modelling of the destruction degree of cancer under the influence of a RF hyperthermia

    Science.gov (United States)

    Paruch, Marek; Turchan, Łukasz

    2018-01-01

    The article presents the mathematical modeling of the phenomenon of artificial hyperthermia which is caused by the interaction of an electric field. The electric field is induced by the applicator positioned within the biological tissue with cancer. In addition, in order to estimate the degree of tumor destruction under the influence of high temperature an Arrhenius integral has been used. The distribution of electric potential in the domain considered is described by the Laplace system of equations, while the temperature field is described by the Pennes system of equations. These problems are coupled by source function being the additional component in the Pennes equation and resulting from the electric field action. The boundary element method is applied to solve the coupled problem connected with the heating of biological tissues.

  7. Growth Limits in Large Scale Networks

    DEFF Research Database (Denmark)

    Knudsen, Thomas Phillip

    limitations. The rising complexity of network management with the convergence of communications platforms is shown as problematic for both automatic management feasibility and for manpower resource management. In the fourth step the scope is extended to include the present society with the DDN project as its......The Subject of large scale networks is approached from the perspective of the network planner. An analysis of the long term planning problems is presented with the main focus on the changing requirements for large scale networks and the potential problems in meeting these requirements. The problems...... the fundamental technological resources in network technologies are analysed for scalability. Here several technological limits to continued growth are presented. The third step involves a survey of major problems in managing large scale networks given the growth of user requirements and the technological...

  8. Qualifying program on Non-Destructive Testing, Visual Inspection of the welding (level 2)

    International Nuclear Information System (INIS)

    Shafee, M. A.

    2011-01-01

    Nondestructive testing is a wide group of analysis technique used in science and industry to evaluate the properties of a material, component or system without causing damage. Common Non-Destructive Testing methods include ultrasonic, magnetic-particle, liquid penetrate, radiographic, visual inspection and eddy-current testing. AAEA put the new book of the Non-Destructive Testing publication series that focused on Q ualifying program on Non-Destructive Testing, visual inspection of welding-level 2 . This book was done in accordance with the Arab standard certification of Non-Destructive Testing (ARAB-NDT-CERT-002) which is agreeing with the ISO-9712 (2005) and IAEA- TEC-DOC-487. It includes twenty one chapters dealing with engineering materials used in industry, the mechanical behavior of metals, metal forming equipments, welding, metallurgy, testing of welds, introduction to Non-Destructive Testing, defects in metals, welding defects and discontinuities, introduction to visual inspection theory, properties and tools of visual testing, visual testing, quality control regulations, standards, codes and specifications, procedures of welding inspections, responsibility of welding test inspector, qualification of Non-Destructive Testing inspector and health safety during working.

  9. Linguistic parameters of Russian texts by suicides and persons with a high risk of self-destructive behaviour

    Directory of Open Access Journals (Sweden)

    Litvinova Tatiana Aleksandrovna

    2017-12-01

    Full Text Available The problem of identifying the features of speech (both oral and written of persons in different mental states and constructing mathematical models for classifying texts depending on the author's mental state is one of the topical and actively developed problems of modern computer and psychiatric linguistics. Most of these studies are based on the material of the English language. The work presents a review of the research devoted to the analysis of written texts of persons who commit suicide as well as persons with a high risk of self-destructive behaviour, with special attention paid to work done on the material of the Russian language. Prospects for further research are also outlined.

  10. Application of non-destructive testing and in-service inspections to research reactors and preparation of ISI programme and manual for WWR-C research reactors

    International Nuclear Information System (INIS)

    Khattab, M.

    1996-01-01

    The present report gives a review on the results of application of non-destructive testing and in-service inspections to WWR-C reactors in different countries. The major problems related to reactor safety and the procedure of inspection techniques are investigated to collect the experience gained from this type of reactors. Exchangeable experience in solving common problems in similar reactors play an important role in the effectiveness of their rehabilitation programmes. 9 figs., 4 tabs

  11. The transportation management division institutional program: Networking and problem solving

    International Nuclear Information System (INIS)

    McGinnis, K.A.; Peterson, J.M.

    1989-06-01

    The US Department of Energy (DOE) has several programs related to transportation. While these programs may have differing missions and legislative authority, the required activities are frequently similar. To ensure a DOE-wide perspective in developing transportation policies and procedures, a DOE Transportation Institutional Task Force (Task Force) has been formed, which is the primary focus of this paper. The Task Force, composed of representatives from each of the major DOE transportation programs, meets periodically to exchange experiences and insights on institutional issues related to Departmental shipping. The primary purpose of the group is to identify opportunities for productive interactions with the transportation community, including interested and affected members of the public. This paper will also focus sharply on the networking of DOE with the State, Tribal, and local officials in fostering better understanding and in solving problems. An example of such activity is the DOE's cooperative agreement with the Energy Task Force of the Urban Consortium. A major effort is to encourage cooperative action in identifying, addressing, and resolving issues that could impede the transportation of radioactive materials

  12. Interaction Networks: Generating High Level Hints Based on Network Community Clustering

    Science.gov (United States)

    Eagle, Michael; Johnson, Matthew; Barnes, Tiffany

    2012-01-01

    We introduce a novel data structure, the Interaction Network, for representing interaction-data from open problem solving environment tutors. We show how using network community detecting techniques are used to identify sub-goals in problems in a logic tutor. We then use those community structures to generate high level hints between sub-goals.…

  13. Early non-destructive biofouling detection and spatial distribution: Application of oxygen sensing optodes

    KAUST Repository

    Farhat, Nadia

    2015-06-11

    Biofouling is a serious problem in reverse osmosis/nanofiltration (RO/NF) applications, reducing membrane performance. Early detection of biofouling plays an essential role in an adequate anti-biofouling strategy. Presently, fouling of membrane filtration systems is mainly determined by measuring changes in pressure drop, which is not exclusively linked to biofouling. Non-destructive imaging of oxygen concentrations (i) is specific for biological activity of biofilms and (ii) may enable earlier detection of biofilm accumulation than pressure drop. The objective of this study was to test whether transparent luminescent planar O2 optodes, in combination with a simple imaging system, can be used for early non-destructive biofouling detection. This biofouling detection is done by mapping the two-dimensional distribution of O2 concentrations and O2 decrease rates inside a membrane fouling simulator (MFS). Results show that at an early stage, biofouling development was detected by the oxygen sensing optodes while no significant increase in pressure drop was yet observed. Additionally, optodes could detect spatial heterogeneities in biofouling distribution at a micro scale. Biofilm development started mainly at the feed spacer crossings. The spatial and quantitative information on biological activity will lead to better understanding of the biofouling processes, contributing to the development of more effective biofouling control strategies.

  14. Non-destructive evaluation of timber structures in a historical building of Tiradentes , MG

    Directory of Open Access Journals (Sweden)

    Luciana Barbosa de Abreu

    2013-09-01

    Full Text Available Problems related to the durability of wood are commonly found in historical buildings structures. Preservation and conservation resolutions must be adopted, in order to avoid losses and substitutions, which mischaracterize buildings. Non-destructive methods for detecting deterioration should be used in order to substantiate decisions and increase the longevity of historical heritage. This work was carried out in order to perform non-destructive essays to infer about the integrity of a beam and a pillar of the original construction of the Sobrado Ramalho, a historical building of the city of Tiradentes, MG. The equipments utilized were the Stress Wave Timer and resistograph. Samples of the elements were taken for analysis of density. The results showed that, in both structures, to calculate the dynamic modulus of elasticity, there was no significant difference for the application of stress wave timer on the alignments studied. There was no significant difference between the directions of application of the resistograph on the pillar, due to its apparent entirety and regular sessions, practically square, and to not being loaded eccentrically. In the case of the beam, there was significant difference, presumably because it has cracks in its traction line. The equipments, unknown by professionals of heritage conservation allow promising methodologies for inspection of timber structures in service.

  15. Different methods of tomography in destructive pulmonary tuberculosis

    International Nuclear Information System (INIS)

    Volodina, G.I.; Semenov, V.M.

    1980-01-01

    Altogether 203 patients (186 with destructive pulmonary tuberculosis, 11 with other forms of tuberculosis of respiratory tract organs, 6 with lung malignant tumor) were examined with the use of different modifications of tomography: longitudinal and oblique blurring, zonography, selective tomography. Standardization in the use of different methods is proposed, depending on the intensity of the main syndromes of pulmonary tissue lesions: limited shading, foci, dissemination, caverns, etc. The informativeness is greatly increased when the proposed algorithm of examination is used both at the disease onset and during the follow-up of patients with destructive pulmonary tuberculosis

  16. Maximum-entropy networks pattern detection, network reconstruction and graph combinatorics

    CERN Document Server

    Squartini, Tiziano

    2017-01-01

    This book is an introduction to maximum-entropy models of random graphs with given topological properties and their applications. Its original contribution is the reformulation of many seemingly different problems in the study of both real networks and graph theory within the unified framework of maximum entropy. Particular emphasis is put on the detection of structural patterns in real networks, on the reconstruction of the properties of networks from partial information, and on the enumeration and sampling of graphs with given properties.  After a first introductory chapter explaining the motivation, focus, aim and message of the book, chapter 2 introduces the formal construction of maximum-entropy ensembles of graphs with local topological constraints. Chapter 3 focuses on the problem of pattern detection in real networks and provides a powerful way to disentangle nontrivial higher-order structural features from those that can be traced back to simpler local constraints. Chapter 4 focuses on the problem o...

  17. Inverse Problem and Variation Method to Optimize Cascade Heat Exchange Network in Central Heating System

    Institute of Scientific and Technical Information of China (English)

    ZHANG Yin; WEI Zhiyuan; ZHANG Yinping; WANG Xin

    2017-01-01

    Urban heating in northern China accounts for 40% of total building energy usage.In central heating systems,heat is often transfened from heat source to users by the heat network where several heat exchangers arc installed at heat source,substations and terminals respectively.For given overall heating capacity and heat source temperarure,increasing the terminal fluid temperature is an effective way to improve the thermal performance of such cascade heat exchange network for energy saving.In this paper,the mathematical optimization model of the cascade heat exchange network with three-stage heat exchangers in series is established.Aim at maximizing the cold fluid temperature for given hot fluid temperature and overall heating capacity,the optimal heat exchange area distribution and the medium fluids' flow rates are determined through inverse problem and variation method.The preliminary results show that the heat exchange areas should be distributed equally for each heat exchanger.It also indicates that in order to improve the thernmal performance of the whole system,more heat exchange areas should be allocated to the heat exchanger where flow rate difference between two fluids is relatively small.This work is important for guiding the optimization design of practical cascade heating systems.

  18. Destruction of chlorine-containing organic agents in a system plasma - liquid

    International Nuclear Information System (INIS)

    Chernyak, V.Ya.; Yukhymenko, V.V.; Babich, I.L.; Slyusarenko, Y.I.; Tarasova, Ya.B.

    2005-01-01

    The plasma chemical destruction of persistent toxic agent 1,1-di(4-chlorophenol)-2,2,2-threechlorethane (DDT) in water solutions is researched in this work. The destruction of agricultural pesticide containing DDT was carried out in water solution at atmospheric pressure with usage of plasma treatment on the basis of secondary discharges with a 'liquid' electrode, and of combination of a plasma method with reagent method. The comparative analysis of results of the physical-chemical analysis and biological test of toxicity of solutions is carried out and the optimum regimes for destruction and detoxication of DDT in water are determined

  19. Training Guidelines in Non-destructive Testing Techniques. 2013 Edition

    International Nuclear Information System (INIS)

    2014-12-01

    The IAEA promotes industrial applications of radiation technology, including non-destructive testing (NDT), through activities such as Technical Cooperation Projects (national and regional) and Coordinated Research Projects. Through this cooperation, Member States have initiated national programmes for the training and certification of NDT personnel. National certifying bodies have also been established based on International Organization for Standardization (ISO) standards. As part of these efforts, the IAEA has been actively involved in developing training materials. Consequently, IAEA-TECDOC-407, Training Guidelines in Non-destructive Testing Techniques, was published in 1987, then revised and expanded as IAEA-TECDOC-628 in 1991. Revisions of IAEA-TECDOC-628 were considered essential to meet the demands of end-user industries in Member States, and revised and expanded versions were issued in 2002 and 2008. These latter versions included work conducted by the International Committee for Non-Destructive Testing (ICNDT) and many national NDT societies. It is one of the publications referred to in ISO 9712:2005, Non-destructive Testing: Qualification and Certification of Personnel, which in turn is an internationally accepted standard, revised as ISO 9712:2012, Non-destructive Testing: Qualification and Certification of NDT Personnel. This publication is an updated version of IAEA-TECDOC-628. The content of which has been revised following the changes of ISO 9712 converging with EN 473 and becoming EN ISO 9712:2012, based on the experience of experts and comments from end-user industries. The details of the topics on each subject have been expanded to include the latest developments in the respective methods. The incorporated changes will assist the end-user industries to update their NDT qualification and certification schemes and course materials. This publication, like the previous versions, will continue to play an important role in international harmonization

  20. Resonant ultrasound spectroscopy and non-destructive testing

    Science.gov (United States)

    Migliori, A.; Darling, T. W.

    The use of mechanical resonances to test properties of materials is perhaps older than the industrial revolution. Early documented cases of British railroad engineers tapping the wheels of a train and using the sound to detect cracks perhaps mark the first real use of resonances to test the integrity of high-performance alloys. Attempts were made in the following years to understand the resonances of solids mathematically, based on the shape and composition. But Nobel Laureate Lord Rayleigh best summarized the state of affairs in 1894, stating 'the problem has, for the most part, resisted attack'. More recently, modern computers and electronics have enabled Anderson and co-workers with their work on minerals, and our work at Los Alamos on new materials and manufactured components to advance the use of resonances to a precision non-destructive testing tool that makes anisotropic modulus measurements, defect detection and geometry error detection routine. The result is that resonances can achieve the highest absolute accuracy for any dynamic modulus measurement technique, can be used on the smallest samples, and can also enable detection of errors in certain classes of precision manufactured components faster and more accurately than any other technique.

  1. ATM Tactical Network - a challenge for the military networks

    NARCIS (Netherlands)

    Waveren, C.J. van; Luiijf, H.A.M.; Burakowski, W.; Kopertowski, Z.

    1997-01-01

    The next generation of tactical networks will be based on the ATM technology. The POST-2000 tactical network is just in the designing phase. The objective of this paper is to point out the main problems which should be solved to adopt ATM technology into the tactical network environment. The

  2. Social networking sites and mental health problems in adolescents: The mediating role of cyberbullying victimization.

    Science.gov (United States)

    Sampasa-Kanyinga, H; Hamilton, H A

    2015-11-01

    Previous research has suggested an association between the use of social networking sites (SNSs) and mental health problems such as psychological distress, suicidal ideation and attempts in adolescents. However, little is known about the factors that might mediate these relationships. The present study examined the link between the use of social networking sites and psychological distress, suicidal ideation and suicide attempts, and tested the mediating role of cyberbullying victimization on these associations in adolescents. The sample consisted of a group of 11-to-20-year-old individuals (n=5126, 48% females; mean±SD age: 15.2±1.9 years) who completed the mental health portion of the Ontario Student Drug Use and Health Survey (OSDUHS) in 2013. Multiple logistic regression analyses were used to test the mediation models. After adjustment for age, sex, ethnicity, subjective socioeconomic status (SES), and parental education, use of SNSs was associated with psychological distress (adjusted odds ratio, 95% confidence interval=2.03, 1.22-3.37), suicidal ideation (3.44, 1.54-7.66) and attempts (5.10, 1.45-17.88). Cyberbullying victimization was found to fully mediate the relationships between the use of SNSs with psychological distress and attempts; whereas, it partially mediated the link between the use of SNSs and suicidal ideation. Findings provide supporting evidence that addressing cyberbullying victimization and the use of SNSs among adolescents may help reduce the risk of mental health problems. Copyright © 2015 Elsevier Masson SAS. All rights reserved.

  3. Medical problems of survivors of nuclear war

    International Nuclear Information System (INIS)

    Abrams, H.L.; Von Kaenel, W.E.

    1981-01-01

    The nature of the medical problems that may confront survivors of a nuclear war are discussed with emphasis on infection and the spread of communicable disease. Factors which will increase the risk and severity of infection include: radiation, trauma and burns, malnutrition and starvation, dehydration, exposure, and hardship. Factors which will increase the spread of disease include: crowded shelter conditions, poor sanitation, insects, corpses, free-roaming diseased animals. Shortages of physicians, the destruction of laboratories, and the general disorganization sure to follow the attack will also contribute to the problems. The authors recommend further study in this area

  4. Optimization of stochastic discrete systems and control on complex networks computational networks

    CERN Document Server

    Lozovanu, Dmitrii

    2014-01-01

    This book presents the latest findings on stochastic dynamic programming models and on solving optimal control problems in networks. It includes the authors' new findings on determining the optimal solution of discrete optimal control problems in networks and on solving game variants of Markov decision problems in the context of computational networks. First, the book studies the finite state space of Markov processes and reviews the existing methods and algorithms for determining the main characteristics in Markov chains, before proposing new approaches based on dynamic programming and combinatorial methods. Chapter two is dedicated to infinite horizon stochastic discrete optimal control models and Markov decision problems with average and expected total discounted optimization criteria, while Chapter three develops a special game-theoretical approach to Markov decision processes and stochastic discrete optimal control problems. In closing, the book's final chapter is devoted to finite horizon stochastic con...

  5. Stabilizing weighted complex networks

    International Nuclear Information System (INIS)

    Xiang Linying; Chen Zengqiang; Liu Zhongxin; Chen Fei; Yuan Zhuzhi

    2007-01-01

    Real networks often consist of local units which interact with each other via asymmetric and heterogeneous connections. In this paper, the V-stability problem is investigated for a class of asymmetric weighted coupled networks with nonidentical node dynamics, which includes the unweighted network as a special case. Pinning control is suggested to stabilize such a coupled network. The complicated stabilization problem is reduced to measuring the semi-negative property of the characteristic matrix which embodies not only the network topology, but also the node self-dynamics and the control gains. It is found that network stabilizability depends critically on the second largest eigenvalue of the characteristic matrix. The smaller the second largest eigenvalue is, the more the network is pinning controllable. Numerical simulations of two representative networks composed of non-chaotic systems and chaotic systems, respectively, are shown for illustration and verification

  6. Destructive and non-destructive methods of measuring the quantity and isotopic composition of fissile materials for purposes of national safeguards in the German Democratic Republic

    International Nuclear Information System (INIS)

    Villun, K.; Gruner, V.; Siebert, Kh.U.; Hoffmann, D.

    1979-01-01

    The authors give a brief description of the destructive and non-destructive methods of measuring the quantity and isotopic composition of fissile materials used in the nuclear materials accounting and control system of the German Democratic Republic. They cite examples of the use of gamma-spectrometry, X-ray fluorescence analysis, neutron activation, radiochemical techniques, mass-spectrometry and alpha-spectrometry. (author)

  7. Two problems in multiphase biological flows: Blood flow and particulate transport in microvascular network, and pseudopod-driven motility of amoeboid cells

    Science.gov (United States)

    Bagchi, Prosenjit

    2016-11-01

    In this talk, two problems in multiphase biological flows will be discussed. The first is the direct numerical simulation of whole blood and drug particulates in microvascular networks. Blood in microcirculation behaves as a dense suspension of heterogeneous cells. The erythrocytes are extremely deformable, while inactivated platelets and leukocytes are nearly rigid. A significant progress has been made in recent years in modeling blood as a dense cellular suspension. However, many of these studies considered the blood flow in simple geometry, e.g., straight tubes of uniform cross-section. In contrast, the architecture of a microvascular network is very complex with bifurcating, merging and winding vessels, posing a further challenge to numerical modeling. We have developed an immersed-boundary-based method that can consider blood cell flow in physiologically realistic and complex microvascular network. In addition to addressing many physiological issues related to network hemodynamics, this tool can be used to optimize the transport properties of drug particulates for effective organ-specific delivery. Our second problem is pseudopod-driven motility as often observed in metastatic cancer cells and other amoeboid cells. We have developed a multiscale hydrodynamic model to simulate such motility. We study the effect of cell stiffness on motility as the former has been considered as a biomarker for metastatic potential. Funded by the National Science Foundation.

  8. Avoiding shame: young LGBT people, homophobia and self-destructive behaviours.

    Science.gov (United States)

    McDermott, Elizabeth; Roen, Katrina; Scourfield, Jonathan

    2008-11-01

    This paper reports on findings from qualitative research conducted in the UK that sought to explore the connections between sexual identities and self-destructive behaviours in young people. International evidence demonstrates that there are elevated rates of suicide and alcohol abuse amongst lesbian, gay, bisexual and transgender (LGBT) youth. Rarely included in this body of research are investigations into young LGBT people's views and experiences of self-destructive behaviours. Data from interviews and focus groups with young LGBT participants suggest a strong link between homophobia and self-destructive behaviours. Utilising a discourse analytic approach, we argue that homophobia works to punish at a deep individual level and requires young LGBT people to manage being positioned, because of their sexual desire or gendered ways of being, as abnormal, dirty and disgusting. At the centre of the complex and multiple ways in which young LGBT people negotiate homophobia are 'modalities of shame-avoidance' such as: the routinization and minimizing of homophobia; maintaining individual 'adult' responsibility; and constructing 'proud' identities. The paper argues that these strategies of shame-avoidance suggest young LGBT people manage homophobia individually, without expectation of support and, as such, may make them vulnerable to self-destructive behaviours.

  9. Analysing destruction channels of interstellar hydrocarbon anions with a 22pol ion-trap

    Energy Technology Data Exchange (ETDEWEB)

    Endres, Eric; Lakhmanskaya, Olga; Best, Thorsten; Hauser, Daniel; Kumar, Sunil; Wester, Roland [Universitaet Innsbruck, Institut fuer Ionenphysik und Angewandte Physik (Austria)

    2014-07-01

    In the interstellar medium (ISM), ion-molecule reactions are considered to play a key role in the formation of complex molecules. The detection of the first interstellar anions, which happen to be carbon chain anions, has raised new interest in the quantitative composition of the ISM and the underlying reaction network. To understand the observed abundance of these carbon chain anions, a detailed analysis of the possible destruction channels is indispensable. A cryogenic 22-pol radio frequency ion trap is an ideal tool to observe reactions that take place slowly, such as carbon chain anions with molecular hydrogen. Furthermore, measurements over a large temperature scale are feasible. Longitudinal optical access to the trap also provides the possibility to make precise photodetachment measurements. Temperature dependent measurements of the reaction rates for the reaction between hydrocarbon chain anions and H{sub 2} are presented.

  10. Academics and Social Networking Sites: Benefits, Problems and Tensions in Professional Engagement with Online Networking

    OpenAIRE

    Jordan, Katy; Weller, Martin

    2018-01-01

    The web has had a profound effect on the ways people interact, with online social networks arguably playing an important role in changing or augmenting how we connect with others. However, uptake of online social networking by the academic community varies, and needs to be understood. This paper presents an independent, novel analysis of a large-scale dataset published by Nature Publishing Group detailing the results of a survey about academics use of online social networking services. An ope...

  11. [Problems encountered by hospital pharmacists with information systems: Analysis of exchanges within social networks].

    Science.gov (United States)

    Charpiat, B; Mille, F; Fombeur, P; Machon, J; Zawadzki, E; Bobay-Madic, A

    2018-05-21

    The development of information systems in French hospitals is mandatory. The aim of this work was to analyze the content of exchanges carried out within social networks, dealing with problems encountered with hospital pharmacies information systems. Messages exchanged via the mailing list of the Association pour le Digital et l'Information en Pharmacie and abstracts of communications presented at hospital pharmacists trade union congresses were analyzed. Those referring to information systems used in hospital pharmacies were selected. From March 2015 to June 2016, 122 e-mails sent by 80 pharmacists concerned information systems. From 2002 to 2016, 45 abstracts dealt with this topic. Problems most often addressed in these 167 documents were "parameterization and/or functionalities" (n=116), interfaces and complexity of the hospital information systems (n=52), relationship with health information technologies vendors and poor reactivity (n=32), additional workload (n=32), ergonomics (n=30), insufficient user training (n=22). These problems are interdependent, lead to errors and in order to mitigate their consequences, they compel pharmacy professionals to divert a significant amount of working hours to the detriment of pharmaceutical care and dispensing and preparing drugs. Hospital pharmacists are faced with many problems of insecurity and inefficiency generated by information systems. Researches are warranted to determine their cost, specify their deleterious effects on care and identify the safest information systems. Copyright © 2018 Académie Nationale de Pharmacie. Published by Elsevier Masson SAS. All rights reserved.

  12. Network Design for Container Shipping Using Cutting Planes

    DEFF Research Database (Denmark)

    The network design problem in container shipping is of increasing importance in the strongly competitive markets where potential cost reductions are of the utmost importance. We combine the network design and fleet assignment problem into a mixed integer linear programming model minimizing the ov...... the fact that the route of a ship allows for subtours, we introduce the concept of pseudo-simple routes. To solve the problem we use a branch and cut solution method using clover and capacity cuts we defined for the problem.......The network design problem in container shipping is of increasing importance in the strongly competitive markets where potential cost reductions are of the utmost importance. We combine the network design and fleet assignment problem into a mixed integer linear programming model minimizing...... the overall cost. The real-life container shipping network design problem differs in several ways from the standard network design problem. Examples of these differences are the cyclic routes of vessels and the fact that a route is continuously sailed for a given forecast period. To model these real...

  13. The wet destruction of dry organic material in a closed quartz tube

    International Nuclear Information System (INIS)

    Faanhof, A.; Das, H.A.

    1977-01-01

    Quantitative, rapid destruction of dry organic materials is necessary in many cases. The application of wet mineralization in a closed quartz tube and the optimization of destruction conditions are described. The procedure takes approximately 3.5 hours for 20 samples. The method was checked by radiotracer and activation experiments. The ratio of the Hg-203 count-rates of spiked and destructed samples to that of standards is 0.991+-0.014. The results of the instrumental analysis for tobacco and standard kale are: tobacco (84+-13) ng.g -1 , standard kale (155+-7)ng.g -1 . The average of the data for kale, reported in literature, is (150+-8)ng.g -1 . Results after destruction are: tobacco (82+-6)ng.g -1 , standard kale (158+-16)ng.g -1 . (N.L.Gy.)

  14. [Physician's anxiety and physician's elegance. Problems in dealing with cost reduction, education of general practitioners and optimal size of practice networks in a cross-national comparison].

    Science.gov (United States)

    Behrens, J

    2000-03-01

    The key reason for physicians networking in managed care is to get a better coping with uncertainty on action (treatment) decisions. The second reason for networking in managed care are financial benefits grounds. But this reason is very ambivalent. Three different action problems (role conflicts) in managed care network are to solved, which was also in single practices. In the lecture the decision strategies and decision resources has been compared. Observations are done using expert interviews, patient interviews and analysis of documents in USA, Germany and Switzerland. The first problem is the choosing of a cost reduction strategy which is not reducing the effectiveness. Such "ugly" solution strategies like exclusion of "expensive" patients and a rationing of necessary medical services in a kind of McDonalds network of physicians will fail the target. The optimost way is a saving of all unnecessary medical even injourious performances. The chosen cost reduction strategy is not real visible from outside but in fact limited cognizable and controllable. Evidence based health care can be a resource of treatment decisions and could train such decisions but it will not substitute these decisions. The second problem is the making of real family practitioners as gatekeepers. Knowledge about the care system is still not making a real family practitioner, even if this is the minimum condition of their work. Also contractual relationships between insurance and doctor as a gatekeeper or financial incentives for patients are still making not a real family practitioner as a gatekpeeper. Only throughout the trust of patients supported by second opinions is making the real family practitioner as a gatekeeper. "Doctor hopping" could be the reaction by scarcity of trustworthy family practitioners as gatekeepers. The third problem is the choosing of the optimal scale of a network due to the very different optimal size of networks regarding the requirement of risk spreeds, of the

  15. National seminar on non-destructive evaluation techniques: proceedings cum souvenir

    International Nuclear Information System (INIS)

    Dutta, N.G.; Kulkarni, P.G.; Purushotham, D.S.C.

    1994-01-01

    This volume contains selected papers presented at the National Seminar on Non-Destructive Evaluation Techniques held at Bhabha Atomic Research Centre, Mumbai during December 8-9, 1994. The papers covered a wide spectrum of non-destructive evaluation activities including that for quality assurance of various nuclear components and structures with the focal theme being computerization and robotics. The papers relevant to INIS are indexed separately

  16. Efficacy of Cotton Root Destruction and Winter Cover Crops for Suppression of Hoplolaimus columbus.

    Science.gov (United States)

    Davis, R F; Baird, R E; McNeil, R D

    2000-12-01

    The efficacy of rye (Secale cereale) and wheat (Triticum aestivum) winter cover crops and cotton stalk and root destruction (i.e., pulling them up) were evaluated in field tests during two growing seasons for Hoplolaimus columbus management in cotton. The effect of removing debris from the field following root destruction also was evaluated. Wheat and rye produced similar amounts of biomass, and both crops produced more biomass (P Cover crops did not suppress H. columbus population levels or increase subsequent cotton yields. Cotton root destruction did not affect cotton stand or plant height the following year. Cotton root destruction lowered (P rye or wheat cover crop or cotton root destruction following harvest is ineffective for H. columbus management in cotton.

  17. Global Optimization for Transport Network Expansion and Signal Setting

    OpenAIRE

    Liu, Haoxiang; Wang, David Z. W.; Yue, Hao

    2015-01-01

    This paper proposes a model to address an urban transport planning problem involving combined network design and signal setting in a saturated network. Conventional transport planning models usually deal with the network design problem and signal setting problem separately. However, the fact that network capacity design and capacity allocation determined by network signal setting combine to govern the transport network performance requires the optimal transport planning to consider the two pr...

  18. Predicting Tropical Cyclone Destructive Potential by Integrated Kinetic Energy According to the Powell/Reinhold Scale

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — A method of predicting the destructive capacity of a tropical cyclone based on a new Wind Destructive Potential (WDP) and Storm Surge Destructive Potential (SDP)...

  19. Defining Weapons of Mass Destruction

    Science.gov (United States)

    2012-01-01

    Cyprus, Liberia, Malta, Marshall Islands , Mongolia, Panama, and St. Vin- cent and the Grenadines, according to a State Department summary available...1972 Biological and Toxin Weapons Convention, and the 1993 Chemical Weapons Convention. As such, NBC weapons represent a group of weapons that the...Development, Produc- tion and Stockpiling of Bacteriological (Biological) and Toxin Weapons and on Their Destruction contains two references to WMD

  20. Mechanism of radiation destruction of dyes in polymers

    International Nuclear Information System (INIS)

    Belichenko, A.S.; Dyumaev, K.M.; Maslyukov, A.P.; Matyushin, G.A.; Nechitailo, V.S.

    1991-01-01

    Considering the experimental results, it might be expected that the mechanism of radiation destruction of dyed polymers by UV-and γ-irradiation should also be associated with a chemical reaction between dye molecules and oxyradicals which appear either on destruction of polymer macromolecules or on oxidation of macroradicals by the oxygen dissolved in the matrix. Thus, the radiation stability of dyes should depend on the rate of formation of primary radicals in the polymer under the action of UV- and γ-irradiation. As has been demostrated, this rate can be influenced by 'resonant' low-molecular additives which perform oscillative cross-relaxation. (author) 8 refs.; 2 figs

  1. Destructive behavior of iron oxide in projectile impact

    Science.gov (United States)

    Shang, Wang; Xiaochen, Wang; Quan, Yang; Zhongde, Shan

    2017-12-01

    The damage strain values of Q235-A surface oxide scale were obtained by scanning electron microscopy (SEM/EDS) and universal tensile testing machine. The finite element simulation was carried out to study the destruction effects of oxidation at different impact rates. The results show that the damage value of the oxide strain is 0.08%. With the increase of the projectile velocity, the damage area of the oxide scale is increased, and the damage area is composed of the direct destruction area and the indirect failure area. The indirect damage area is caused by the stress/strain to the surrounding expansion after the impact of the steel body.

  2. The Creation and Destruction of Social Capital

    DEFF Research Database (Denmark)

    Svendsen, Gunnar Lind Haase; Svendsen, Gert Tinggaard

    ‘A welcome contribution to scholarly economic and public policy debates, The Creation and Destruction of Social Capital is written for advanced students yet offers insights critical to better understanding micro and macro economics alike.' - Willis M. Buhle, The Midwest Book Review ‘The Svendsens...... in to crafting this study.' - From the foreword by Elinor Ostrom Is social capital the ‘missing link' in economics? In this vital new book, the authors argue that the ‘forgotten' production factor of social capital is as crucial in economic decision-making as the other more traditional factors of production...... such as physical, financial and human capital. They attempt to bridge the gap between theory and reality by examining the main factors that determine entrepreneurship, co-operative movements and the creation and destruction of social capital....

  3. Non-destructive elecrochemical monitoring of reinforcement corrosion

    DEFF Research Database (Denmark)

    Nygaard, Peter Vagn

    been widely accepted as a non-destructive ”state of the art” technique for detection of corrosion in concrete structures. And, over the last decade, the trend in corrosion monitoring has moved towards quantitative non-destructive monitoring of the corrosion rate of the steel reinforcement. A few...... corrosion rate measurement instruments have been developed and are commercially available. The main features of these instruments are the combined use of an electrochemical technique for determining the corrosion rate and a so-called ”confinement technique”, which in principle controls the polarised surface...... area of the reinforcement, i.e. the measurement area. Both on-site investigations and laboratory studies have shown that varying corrosion rates are obtained when the various commercially available instruments are used. And in the published studies, conflicting explanations are given illustrating...

  4. Leadership, Social Capital and Coastal Community Resource Governance: the Case of the Destructive Seaweed Harvest in West Bali.

    Science.gov (United States)

    Warren, Carol

    This paper concerns resource governance in a remote Balinese coastal community, which faces severe environmental challenges due to overexploitation and habitat destruction. It explores some of the issues raised in 'social capital' debates regarding leadership and public participation toward sustainable natural resource governance. Given the strength of Balinese customary law and the high degree of participation required in the ritual-social domain, Bali represents a model context for examining these issues. Through a case study of destructive resource exploitation and evolving rules-in-use, this paper analyses the ambiguous role of 'bonding' social capital and the complexities of negotiating collective action on environmental problems where conflicting interests and dense social ties make local action difficult. The paper finds that a more complex appreciation of vertical (authority) and horizontal (solidarity) relationships between leaders and ordinary villagers is required, and that a more nuanced institutional bricolage and exploratory scenario approach to analysis of evolving rules in use would enhance associated policy interventions.

  5. Locating a tree in a phylogenetic network

    OpenAIRE

    van Iersel, Leo; Semple, Charles; Steel, Mike

    2010-01-01

    Phylogenetic trees and networks are leaf-labelled graphs that are used to describe evolutionary histories of species. The Tree Containment problem asks whether a given phylogenetic tree is embedded in a given phylogenetic network. Given a phylogenetic network and a cluster of species, the Cluster Containment problem asks whether the given cluster is a cluster of some phylogenetic tree embedded in the network. Both problems are known to be NP-complete in general. In this article, we consider t...

  6. Inverse problems in eddy current testing using neural network

    Science.gov (United States)

    Yusa, N.; Cheng, W.; Miya, K.

    2000-05-01

    Reconstruction of crack in conductive material is one of the most important issues in the field of eddy current testing. Although many attempts to reconstruct cracks have been made, most of them deal with only artificial cracks machined with electro-discharge. However, in the case of natural cracks like stress corrosion cracking or inter-granular attack, there must be contact region and therefore their conductivity is not necessarily zero. In this study, an attempt to reconstruct natural cracks using neural network is presented. The neural network was trained through numerical simulated data obtained by the fast forward solver that calculated unflawed potential data a priori to save computational time. The solver is based on A-φ method discretized by using FEM-BEM A natural crack was modeled as an area whose conductivity was less than that of a specimen. The distribution of conductivity in that area was reconstructed as well. It took much time to train the network, but the speed of reconstruction was extremely fast after once it was trained. Well-trained network gave good reconstruction result.

  7. Stochastic network interdiction optimization via capacitated network reliability modeling and probabilistic solution discovery

    International Nuclear Information System (INIS)

    Ramirez-Marquez, Jose Emmanuel; Rocco S, Claudio M.

    2009-01-01

    This paper introduces an evolutionary optimization approach that can be readily applied to solve stochastic network interdiction problems (SNIP). The network interdiction problem solved considers the minimization of the cost associated with an interdiction strategy such that the maximum flow that can be transmitted between a source node and a sink node for a fixed network design is greater than or equal to a given reliability requirement. Furthermore, the model assumes that the nominal capacity of each network link and the cost associated with their interdiction can change from link to link and that such interdiction has a probability of being successful. This version of the SNIP is for the first time modeled as a capacitated network reliability problem allowing for the implementation of computation and solution techniques previously unavailable. The solution process is based on an evolutionary algorithm that implements: (1) Monte-Carlo simulation, to generate potential network interdiction strategies, (2) capacitated network reliability techniques to analyze strategies' source-sink flow reliability and, (3) an evolutionary optimization technique to define, in probabilistic terms, how likely a link is to appear in the final interdiction strategy. Examples for different sizes of networks are used throughout the paper to illustrate the approach

  8. Performance verification of network function virtualization in software defined optical transport networks

    Science.gov (United States)

    Zhao, Yongli; Hu, Liyazhou; Wang, Wei; Li, Yajie; Zhang, Jie

    2017-01-01

    With the continuous opening of resource acquisition and application, there are a large variety of network hardware appliances deployed as the communication infrastructure. To lunch a new network application always implies to replace the obsolete devices and needs the related space and power to accommodate it, which will increase the energy and capital investment. Network function virtualization1 (NFV) aims to address these problems by consolidating many network equipment onto industry standard elements such as servers, switches and storage. Many types of IT resources have been deployed to run Virtual Network Functions (vNFs), such as virtual switches and routers. Then how to deploy NFV in optical transport networks is a of great importance problem. This paper focuses on this problem, and gives an implementation architecture of NFV-enabled optical transport networks based on Software Defined Optical Networking (SDON) with the procedure of vNFs call and return. Especially, an implementation solution of NFV-enabled optical transport node is designed, and a parallel processing method for NFV-enabled OTN nodes is proposed. To verify the performance of NFV-enabled SDON, the protocol interaction procedures of control function virtualization and node function virtualization are demonstrated on SDON testbed. Finally, the benefits and challenges of the parallel processing method for NFV-enabled OTN nodes are simulated and analyzed.

  9. Achieving Network Level Privacy in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Sungyoung Lee

    2010-02-01

    Full Text Available Full network level privacy has often been categorized into four sub-categories: Identity, Route, Location and Data privacy. Achieving full network level privacy is a critical and challenging problem due to the constraints imposed by the sensor nodes (e.g., energy, memory and computation power, sensor networks (e.g., mobility and topology and QoS issues (e.g., packet reach-ability and timeliness. In this paper, we proposed two new identity, route and location privacy algorithms and data privacy mechanism that addresses this problem. The proposed solutions provide additional trustworthiness and reliability at modest cost of memory and energy. Also, we proved that our proposed solutions provide protection against various privacy disclosure attacks, such as eavesdropping and hop-by-hop trace back attacks.

  10. Eddy currents non-destructive testing. use of a numeric/symbolic method to separate and characterize the transitions of a signal

    International Nuclear Information System (INIS)

    Benas, J.C.; Lefevre, F.; Gaillard, P.; Georgel, B.

    1995-01-01

    This paper presents an original numeric/symbolic method for solving an inverse problem in the field of non-destructive testing. The purpose of this method is to characterize the transitions of a signal even when they are superimposed. Its principle is to solve as many direct problems as necessary to obtain the solution, and to use some hypothesis to manage the reasoning of the process. The direct problem calculation yields to a 'model signal', and the solution is reached when the model signal is close to the measured one. This method calculates the directions of minimization thanks to a symbolic reasoning based on the peaks of the residual signal. The results of the method are good and seem very promising. (authors). 13 refs., 13 figs., 5 tabs

  11. Modeling a four-layer location-routing problem

    Directory of Open Access Journals (Sweden)

    Mohsen Hamidi

    2012-01-01

    Full Text Available Distribution is an indispensable component of logistics and supply chain management. Location-Routing Problem (LRP is an NP-hard problem that simultaneously takes into consideration location, allocation, and vehicle routing decisions to design an optimal distribution network. Multi-layer and multi-product LRP is even more complex as it deals with the decisions at multiple layers of a distribution network where multiple products are transported within and between layers of the network. This paper focuses on modeling a complicated four-layer and multi-product LRP which has not been tackled yet. The distribution network consists of plants, central depots, regional depots, and customers. In this study, the structure, assumptions, and limitations of the distribution network are defined and the mathematical optimization programming model that can be used to obtain the optimal solution is developed. Presented by a mixed-integer programming model, the LRP considers the location problem at two layers, the allocation problem at three layers, the vehicle routing problem at three layers, and a transshipment problem. The mathematical model locates central and regional depots, allocates customers to plants, central depots, and regional depots, constructs tours from each plant or open depot to customers, and constructs transshipment paths from plants to depots and from depots to other depots. Considering realistic assumptions and limitations such as producing multiple products, limited production capacity, limited depot and vehicle capacity, and limited traveling distances enables the user to capture the real world situations.

  12. New tasks for non-destructive testing

    International Nuclear Information System (INIS)

    1990-01-01

    The proceedings contain 29 lectures and 43 posters which were presented in Trier at the annual meeting of the DGZfP in May 1990. The contributions report on further development of non-destructive testing methods towards more reliability, both of inspections and with regard to interpretation of the results. (MM) [de

  13. Dynamically Partitionable Autoassociative Networks as a Solution to the Neural Binding Problem

    Directory of Open Access Journals (Sweden)

    Kenneth Jeffrey Hayworth

    2012-09-01

    Full Text Available An outstanding question in theoretical neuroscience is how the brain solves the neural binding problem. In vision, binding can be summarized as the ability to represent that certain properties belong to one object while other properties belong to a different object. I review the binding problem in visual and other domains, and review its simplest proposed solution – the anatomical binding hypothesis. This hypothesis has traditionally been rejected as a true solution because it seems to require a type of one-to-one wiring of neurons that would be impossible in a biological system (as opposed to an engineered system like a computer. I show that this requirement for one-to-one wiring can be loosened by carefully considering how the neural representation is actually put to use by the rest of the brain. This leads to a solution where a symbol is represented not as a particular pattern of neural activation but instead as a piece of a global stable attractor state. I introduce the Dynamically Partitionable AutoAssociative Network (DPAAN as an implementation of this solution and show how DPANNs can be used in systems which perform perceptual binding and in systems that implement syntax-sensitive rules. Finally I show how the core parts of the cognitive architecture ACT-R can be neurally implemented using a DPAAN as ACT-R’s global workspace. Because the DPAAN solution to the binding problem requires only ‘flat’ neural representations (as opposed to the phase encoded representation hypothesized in neural synchrony solutions it is directly compatible with the most well developed neural models of learning, memory, and pattern recognition.

  14. Destructive distillation: oils

    Energy Technology Data Exchange (ETDEWEB)

    West, J; Glover, S

    1918-01-31

    Canned and other coals are destructively distilled in continuously operated vertical retorts which at their upper portions are maintained at temperatures suitable for low temperature oil distillation such as about 700/sup 0/C, and at their lower portions the temperature is higher and such as to be suitable for the production of gas, e.g., about 1400/sup 0/C. Superheated steam is introduced into the lower portion of the retort, preferably by means of the arrangement described in Specification 120,458, and this is converted into blue water gas which assists the distillation in the center of the coal charge. The retorts are preferably such as are described in Specifications 2663/07 and 7757/14.

  15. Hierarchical Network Design Using Simulated Annealing

    DEFF Research Database (Denmark)

    Thomadsen, Tommy; Clausen, Jens

    2002-01-01

    networks are described and a mathematical model is proposed for a two level version of the hierarchical network problem. The problem is to determine which edges should connect nodes, and how demand is routed in the network. The problem is solved heuristically using simulated annealing which as a sub......-algorithm uses a construction algorithm to determine edges and route the demand. Performance for different versions of the algorithm are reported in terms of runtime and quality of the solutions. The algorithm is able to find solutions of reasonable quality in approximately 1 hour for networks with 100 nodes....

  16. Periodontium destruction associated with oncology therapy. Five case reports

    International Nuclear Information System (INIS)

    Wright, W.E.

    1987-01-01

    Radiation treatment to the head and neck and cytotoxic chemotherapy can produce deleterious side effects to the periodontium that are generally transient in nature, reversible, and do not result in permanently visible defects. However, combinations of the malignant disease itself, the direct and indirect effects of medical therapy and associated oral infections, along with local trauma can lead to periodontal tissue destruction with resulting permanent architectural defects. Five case reports illustrate destructive alterations of the periodontium that were associated with oncology therapy. Proposed guidelines for periodontal treatment of compromised individuals undergoing oncology therapies are suggested

  17. The problem 7 forming triangular geometric line field

    Directory of Open Access Journals (Sweden)

    Travush Vladimir Iljich

    2016-01-01

    Full Text Available Investigated a method of formation of triangular networks in the field. Delivered conditions the problem of locating a triangular network in the area. The criterion for assessing the effectiveness of the solution of the problem is the minimum number of sizes of the dome elements, the possibility of pre-assembly and pre-stressing. The solution of the problem of one embodiment of a triangular network of accommodation in a compatible spherical triangle and, accordingly, on the sphere. Optimization of triangular geometric network on a sphere on the criterion of minimum sizes of elements can be solved by placing the system in an irregular hexagon inscribed in a circle of minimal size, maximum regular hexagons.

  18. Network Monitoring as a Streaming Analytics Problem

    KAUST Repository

    Gupta, Arpit; Birkner, Rü diger; Canini, Marco; Feamster, Nick; Mac-Stoker, Chris; Willinger, Walter

    2016-01-01

    , processing such network monitoring queries at high traffic rates requires both the switches and the stream processors to filter the traffic iteratively and adaptively so as to extract only that traffic that is of interest to the query at hand. Others have

  19. Bio-inspired networking

    CERN Document Server

    Câmara, Daniel

    2015-01-01

    Bio-inspired techniques are based on principles, or models, of biological systems. In general, natural systems present remarkable capabilities of resilience and adaptability. In this book, we explore how bio-inspired methods can solve different problems linked to computer networks. Future networks are expected to be autonomous, scalable and adaptive. During millions of years of evolution, nature has developed a number of different systems that present these and other characteristics required for the next generation networks. Indeed, a series of bio-inspired methods have been successfully used to solve the most diverse problems linked to computer networks. This book presents some of these techniques from a theoretical and practical point of view. Discusses the key concepts of bio-inspired networking to aid you in finding efficient networking solutions Delivers examples of techniques both in theoretical concepts and practical applications Helps you apply nature's dynamic resource and task management to your co...

  20. Nonlinear dynamics of the complex multi-scale network

    Science.gov (United States)

    Makarov, Vladimir V.; Kirsanov, Daniil; Goremyko, Mikhail; Andreev, Andrey; Hramov, Alexander E.

    2018-04-01

    In this paper, we study the complex multi-scale network of nonlocally coupled oscillators for the appearance of chimera states. Chimera is a special state in which, in addition to the asynchronous cluster, there are also completely synchronous parts in the system. We show that the increase of nodes in subgroups leads to the destruction of the synchronous interaction within the common ring and to the narrowing of the chimera region.