Performance Evaluation of Travelling Salesman Problem Based on Artificial Simulated Annealing Algorithm
Given a collection of cities and the cost of travel between each pair of them, the traveling salesman problem, or TSP for short, is to find the cheapest way of visiting all of the cities and returning to your starting point. In the standard version we study, the travel costs are symmetric in the sense that traveling from city X to city Y costs just as much as traveling from Y to X. The Traveling Salesman Problem is typical of a large class of "hard" optimization problems that have intrigued mathematicians and computer scientists for years. Most important, it has applications in science and engineering I attempt to apply simulated annealing to find (Sub-Optimal) solutions to TSP with 100-200 cities randomly. The performance by changing the parameter values and try to understand how fast and effective simulated annealing algorithm can generate a solution to TSP problem.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Prediction of bubble lift-off diameter in subcooled flow boiling using AVL fire
Subcooled nucleate flow boiling is a very efficient heat transfer mechanism and therefore applied in many technical applications. A numerical simulation was conducted to predict the bubble lift-off size in a BWR-scaled vertical upward annular channel, which had been compared with some experimental results. A force balance analysis of a growing bubble was performed to predict the bubble lift-off size.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Protein misfolding and neurodegeneration; new approaches to combat toxic misfolded proteins
Important molecular pathways implicated in diverse neurodegenerative diseases are the misfolding, aggregation, and accumulation of the proteins in the brain. Accumulation and misfolding of proteins leads to synaptic dysfunction, neuronal apoptosis, brain damage and disease. The mechanisms which lead to protein misfolding and subsequent neurodegeneration are not clearly understood. The techniques for combating neurodegeneration due to toxic proteins are being investigated. The approach can be two pronged i.e to either do the gene repair using novel techniques like the usage of peptide nucleic acid or to alter the sensitivity or conformation of the receptor proteins or enhancement of enzymes responsible for degradation of these misfolded proteins for e.g ubiquitin-proteosome.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Public water infrastructure in property prices: an environmental valuation approach
Public infrastructure is very vital for the functioning of an urban area. Potable water specifically remains a major United Nations target conveyed through the Millennium development goals. It is crucial for health, safety, environmental sustainability as well as for economic growth and development. Evidence from literature suggests that infrastructure services generally have positive effects on housing values, as they constitute positive externalities to surrounding properties. To this end, an investigation was made on the relative contribution of public water infrastructure on housing rental values in a residential neighborhood in Lagos, Nigeria using a hedonic regression model. Findings from the study revealed the relative impact of public water supply on property rental values. The application of the findings of this study will help direct policy formulation in the areas of urban infrastructure planning and development for investment returns and cost recovery. This is particularly necessary in a region characterized by incoherent institutional arrangements and poor financing strategies for urban infrastructure delivery and maintenance.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Pyruvate kinase and haemoglobin levels in breast carcinoma patients
Breast cancer is the second leading cancer among the women in the world. India is the one of the country having the highest breast cancer patients. In breast cancer patients the glycolysis rate is very high when compare to normal glycolysis rate in normal women. The enzymes like pyruvate kinase, hexokinase, phosphpfructkinase levels are different concentrations among the breast cancer patients. The high rate of glycolysis observed in cancer at anaerobic conditions is known as Warburg effect. The Warburg effect is the enhanced conversion of glucose to lactate observed in tumor cells, even in the presence of normal levels of oxygen. The pyruvate kinase level in tumors are high optimum density values when compared to normal tissues values. The mean values of pyruvate kinse enzyme is 0.278 in tumor tissue and 0.200 in normal tissues. There is a significant effect of haemoglobin on pyruvatekinase values. There may be some significant effect of pyruvate kinase on haemoglobin and vice versa.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Quantum Chemical Computational Method for finding the Survival and Hazard rate for a demonstration of ovarian pituitary feedback loop in women
The objective of this study was to do a comparative study of Follicular and letual phase of inhibins, estrogen, progesterone, LH and FSH. For women in both phases, levels of inhibin A, inhibin B, estradiol and progesterone decreased after the removal of the ovaries. Correlation analysis showed that inhibin , estrogen were significantly negatively correlated in both phases with FSH concentration. Inhibin had negatively correlated in follicular phase and progesterone had a negative correlation in the luteal phase. In this paper we consider the exponentiated Weibull family which has a scale parameter and two shape parameters for the application part. The Weibull family and the exponentiated exponential family are the particular cases of this family. The distribution has been compared with the two-parameter Weibull and Gamma distributions with respect to failure rates. This study showed that ovarian inhibin A and B were cleared from the circulation within 12 h of oophorectomy, whereas E2 and progesterone remain in the circulation for longer. Negative correlation between FSH, inhibin suggests that inhibins may contribute to the observed early rise in FSH after the surgical menopause.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Quantum chemical, DFT and Electron density studies on nano-organic semiconductor for field effect transistors (OFETs):2-phenyl-3Hpyrrole molecule
The electron density and charge transport studies of organic field effect transistors (OFETs) based 2-phenyl-3Hpyrrole molecule have been calculated from the quantum chemical and DFT methods. Density functional theory calculations with B3LYP/aug-cc-PVDZ basis sets was used to determine ground state gas space molecular geometries (bond lengths and bond angles), electron density and bonding features of this molecule. The electron densities at the bond critical point (BCP) of aromatic Car–Car bonds are much stronger than the other bonds in the molecule. The calculated HOMO and LUMO energies is ~5.50 eV [B3LYP/aug-cc-PVDZ], this shows that charge transfer occurs within the molecule. The HOMO–LUMO gap calculated from quantum chemical calculations has been compared with the value calculated from the density of states. The negative electrostatic potential (ESP) is concentrated solely around the N atoms, whereas in the rest of the region a positive ESP to dominate.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Securing Node Identities and Route Identities using alert in Manets
MANETs use various anonymous routing protocols for hiding node identities and/or route identities from the outside observers in order to provide anonymity protection. Perhaps, existing anonymous routing protocols generate high cost or cannot offer complete anonymity protection to sources, destination and routes. To suggest high anonymity protection at a low cost, one of the proposed system is ALERT. ALERT energetically partitions the network field into zones and arbitrarily chooses nodes in zones as intermediate relay nodes, which form a nontraceable anonymous route. This partition process is called as hierarchical zone partition. In addition ALERT hides the data initiator or receiver among many initiators or receiver to reinforce the source as well as destination anonymity protection. Thus, ALERT offers anonymity protection to sources, destinations, and routes. It also has strategies to effectively encounter the intersection and timing attacks. Experimental results display stability with the theoretical analysis, and show that ALERT achieves better route anonymity protection in a low cost which it is compared with the other anonymous routing protocols.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Several types of defined attacks on cryptographic hash function
Hash functions, also called message digests and one-way encryption, are algorithms that, in some sense, use no key. Instead, a fixed-length hash value is computed based upon the plaintext that makes it impossible for either the contents or length of the plaintext to be recovered. Hash algorithms are typically used to provide a digital fingerprint of a file's contents, often used to ensure that the file has not been altered by an intruder or virus. Hash functions are also commonly employed by many operating systems to encrypt passwords. Hash functions, then, provide a measure of the integrity of a file. The goal of this paper is to give an overview of the known methods of attack on hash functions.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Simultaneous opposite bilateral fracture dislocation of shoulders after an electrocution
Bilateral dislocation of the shoulders (anterior or posterior) is a known event after epileptic seizure or electrocution. However this pathology is rare when one side is anterior and the other is posterior. We describe a case of bilateral fracture dislocation of the shoulders after electrocution in a 45 year old woman. Asymmetrical presentation of lesion is exceptional, caused by opposing mechanisms. The diagnosis was made in emergency, and the patient underwent surgical treatment. We review these fracture dislocation types, and we also examine their mechanisms.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]