Abstract: Asphalt surfaces are exposed to various weather
conditions and dynamic loading caused by passing trucks and
vehicles. In such situations, asphalt cement shows so different
rheological-mechanical behavior. If asphalt cement isn-t compatible
enough, asphalt layer will be damaged immediately and expensive
repairing procedures should be performed then. To overcome this
problem, researchers study on mechanical improved asphalt cement.
In this study, bentonite was used in order to modify bitumen
characteristics and the modified bitumen's characteristics were
investigated by asphalt cement tests. Then, the optimal bitumen
content in various compounds was determined and asphalt samples
with different contents of additives were prepared and tested. Results
show using this kind of additive not only has caused improvement in
bitumen mechanical properties, but also improvement in Marshall
Parameters was achieved.
Abstract: Stairway Ushtobin Village is one of the five villages with original and sustainable architecture in Northwest of Iran along the border of Armenia, which has been able to maintain its environment and sustainable ecosystem. Studying circulation, function and scale (grand, medium and minor) of space, ratio of full and empty spaces, number and height of stairs, ratio of compound volume to luxury spaces, openings, type of local masonry (stone, mud, wood) and form of covering elements have been carried out in four houses of this village comparatively as some samples in this article, and furthermore, this article analyzes that the architectural shapes and organic texture of the village meet the needs of cold and dry climate. Finally, some efficient plans are offered suiting the present needs of the village to have a sustainable architecture.
Abstract: An important goal of parboiling is a decrease of rice broken percentage and at the beginning Selected paddy of variety of rice Tarom and soaked at three different temperatures 45 Cº, 65 Cº and 80 Cº orderly for 5 hours, 4 hours and 1.5 hours to moisture of 40 % and then in steaming stage to operate these action two steaming methods are selected steaming under pressure condition and steaming in atmosphere pressure and In the first method after exerting air, the steam pressure is increase to 1 Kg/Cm2 which is done in two different duration times of 2.5 and 5 minutes and in second method used of three times of 5,10 and 15 minutes and dry to 8% moisture and decreases of rice broken percentage at best condition in variety of Tarom of 37.2 % to 7.3 % and increases yield percentage at best condition in variety of Tarom of 69.4 % to 75.93 % and bran percentage decreased in variety of Tarom of 9.53 % to 2.2-3.2 % and this issue cause increases yield percentage in rice and use of This method is very significant for our country because broken percentage of rice in our country is 23-33 %.
Abstract: Recently, there has been a considerable increase in the
number of procedures carried out under regional anesthesia.
However, percutaneous nephrolithotomy (PCNL) procedures are
usually performed under general anesthesia. The aim of this study
was to assess the safety and efficacy of PCNL under spinal anesthesia
in patients with renal calculi. We describe our 9 years experience of
performing PCNL under spinal anesthesia for 387 patients with large
stones of the upper urinary tract, with regard to the effectiveness and
side effects. All patients received spinal anesthetics (Lidocain 5%, or
Bupivacaine 0.75%) and underwent PCNL in prone position. The
success rate was 94.1%. The incidence of complications was 11.6%.
PCNL under spinal anesthesia is feasible, safe, and well-tolerated in
management of patients with renal stones.
Abstract: This paper explores the plant maintenance management system that has been used by giant oil and gas company in Malaysia. The system also called as PMMS used to manage the upstream operations for more than 100 plants of the case study company. Moreover, from the observations, focus group discussion with PMMS personnel and application through simulation (SAP R/3), the paper reviews the step-by-step approach and the elements that required for the PMMS. The findings show that the PMMS integrates the overall business strategy in upstream operations that consist of asset management, work management and performance management. In addition, PMMS roles are to help operations personnel organize and plan their daily activities, to improve productivity and reduce equipment downtime and to help operations management analyze the facilities and create performance, and to provide and maintain the operational effectiveness of the facilities.
Abstract: The polyfunctional and highly reactive bio-polymer,
the chitosan was first regioselectively converted into dialkylated
chitosan using dimsyl anionic solution(NaH in DMSO) and
bromodecane after protecting amino groups by phthalic anhydride.
The dibenzo-18-crown-6-ether, on the other hand, was converted into
its carbonyl derivatives via Duff reaction prior to incorporate into
chitosan by Schiff base formation. Thus formed diformylated
dibenzo-18-crown-6-ether was condensed with lipophilic chitosan to
prepare the novel solvent extraction reagent. The products were
characterized mainly by IR and 1H-NMR. Hence, the multidentate
crown ether-embedded polyfunctional bio-material was tested for
extraction of Pd(II) and Pt(IV) in aqueous solution.
Abstract: In this paper, the effect of bolt clamping force on the fatigue behavior of bolted single lap joints of aluminum alloy 2024- T3 have been studied using numerical finite element method. To do so, a three dimensional model according to the bolted single lap joint has been created and numerical analysis has been carried out using finite element based package. Then the stress distribution and also the slip amplitudes have been calculated in the critical regions and the outcome have been compared with the available experimental fatigue tests results. The numerical results show that in low applied clamping force, the fatigue failure of the specimens occur around the stress concentration location (the bolted hole edge) due to the tensile stresses and thus fatigue crack propagation, but with increase of the clamping force, the fatigue life increases and the cracks nucleate and propagate far from the hole edge because of fretting fatigue. In other words, with the further increase of clamping force value of the joint, the fatigue life reduces due to occurrence of the fretting fatigue in the critical location where the slip amplitude is within its critical occurs earlier.
Abstract: Everyday the usages of the Internet increase and simply a world of the data become accessible. Network providers do not want to let the provided services to be used in harmful or terrorist affairs, so they used a variety of methods to protect the special regions from the harmful data. One of the most important methods is supposed to be the firewall. Firewall stops the transfer of such packets through several ways, but in some cases they do not use firewall because of its blind packet stopping, high process power needed and expensive prices. Here we have proposed a method to find a discriminate function to distinguish between usual packets and harmful ones by the statistical processing on the network router logs. So an administrator can alarm to the user. This method is very fast and can be used simply in adjacent with the Internet routers.
Abstract: A great deal of research works in the field information
systems security has been based on a positivist paradigm. Applying
the reductionism concept of the positivist paradigm for information
security means missing the bigger picture and thus, the lack of holism
which could be one of the reasons why security is still overlooked,
comes as an afterthought or perceived from a purely technical
dimension. We need to reshape our thinking and attitudes towards
security especially in a complex and dynamic environment such as e-
Business to develop a holistic understanding of e-Business security in
relation to its context as well as considering all the stakeholders in
the problem area. In this paper we argue the suitability and need for
more inductive interpretive approach and qualitative research method
to investigate e-Business security. Our discussion is based on a
holistic framework of enquiry, nature of the research problem, the
underling theoretical lens and the complexity of e-Business
environment. At the end we present a research strategy for
developing a holistic framework for understanding of e-Business
security problems in the context of developing countries based on an
interdisciplinary inquiry which considers their needs and
requirements.
Abstract: Flat double-layer grid is from category of space structures that are formed from two flat layers connected together with diagonal members. Increased stiffness and better seismic resistance in relation to other space structures are advantages of flat double layer space structures. The objective of this study is assessment and calculation of Behavior factor of flat double layer space structures. With regarding that these structures are used widely but Behavior factor used to design these structures against seismic force is not determined and exact, the necessity of study is obvious. This study is theoretical. In this study we used structures with span length of 16m and 20 m. All connections are pivotal. ANSYS software is used to non-linear analysis of structures.
Abstract: As computer network technology becomes
increasingly complex, it becomes necessary to place greater
requirements on the validity of developing standards and the
resulting technology. Communication networks are based on large
amounts of protocols. The validity of these protocols have to be
proved either individually or in an integral fashion. One strategy for
achieving this is to apply the growing field of formal methods.
Formal methods research defines systems in high order logic so that
automated reasoning can be applied for verification. In this research
we represent and implement a formerly announced multicast protocol
in Prolog language so that certain properties of the protocol can be
verified. It is shown that by using this approach some minor faults in
the protocol were found and repaired. Describing the protocol as
facts and rules also have other benefits i.e. leads to a process-able
knowledge. This knowledge can be transferred as ontology between
systems in KQML format. Since the Prolog language can increase its
knowledge base every time, this method can also be used to learn an
intelligent network.
Abstract: Green supply chain management is an increasingly recognized practice among companies that are seeking to improve environmental performance. Of particular concern is how to arouse organizational awareness and put green activities into practice in
order to enhance manufacturing performances. This paper investigates the correlation of green supply chain practices and
manufacturing performances in Malaysian certified MS ISO 14000 manufacturing firms. The findings shows that green supply chain
practices which that can be denominated product recycling, environmental compliance and optimization have significant influence to some of the manufacturing performances.
Abstract: As product life cycle becomes less and less every day,
having flexible manufacturing processes for any companies seems more demanding. In the assembling of closures, i.e. opening parts in
car body, hemming process is the one which needs more attention. This paper focused on the robot roller hemming process and how to
reduce its cycle time by introducing a fast roller hemming process. A
robot roller hemming process of a tailgate of Saab 93 SportCombi
model is investigated as a case study in this paper. By applying task
separation, robot coordination, and robot cell configuration principles in the roller hemming process, three alternatives are
proposed, developed, and remarkable reduction in cycle times achieved [1].
Abstract: A fast and efficient model of application development called user interface oriented application development (UIOAD) is proposed. This approach introduces a convenient way for users to develop a platform independent client-server application.
Abstract: Scarcity of water resources and huge costs of
establishing new hydraulic installations necessitate optimal
exploitation from existing reservoirs. Sustainable management and
efficient exploitation from existing finite water resources are
important factors in water resource management, particularly in the
periods of water insufficiency and in dry regions, and on account of
competitive allocations in the view of exploitation management. This
study aims to minimize reservoir water release from a determined
rate of demand. A numerical model for water optimal exploitation
has been developed using GAMS introduced by the World Bank and
applied to the case of Meijaran dam, northern Iran. The results
indicate that this model can optimize the function of reservoir
exploitation while required water for lower parts of the region will be
supplied. Further, allocating optimal water from reservoir, the
optimal rate of water allocated to any group of the users were
specified to increase benefits in curve dam exploitation.
Abstract: With the advance of information technology in the
new era the applications of Internet to access data resources has
steadily increased and huge amount of data have become accessible
in various forms. Obviously, the network providers and agencies,
look after to prevent electronic attacks that may be harmful or may
be related to terrorist applications. Thus, these have facilitated the
authorities to under take a variety of methods to protect the special
regions from harmful data. One of the most important approaches is
to use firewall in the network facilities. The main objectives of
firewalls are to stop the transfer of suspicious packets in several
ways. However because of its blind packet stopping, high process
power requirements and expensive prices some of the providers are
reluctant to use the firewall. In this paper we proposed a method to
find a discriminate function to distinguish between usual packets and
harmful ones by the statistical processing on the network router logs.
By discriminating these data, an administrator may take an approach
action against the user. This method is very fast and can be used
simply in adjacent with the Internet routers.
Abstract: Smoothing or filtering of data is first preprocessing step
for noise suppression in many applications involving data analysis.
Moving average is the most popular method of smoothing the data,
generalization of this led to the development of Savitzky-Golay filter.
Many window smoothing methods were developed by convolving
the data with different window functions for different applications;
most widely used window functions are Gaussian or Kaiser. Function
approximation of the data by polynomial regression or Fourier
expansion or wavelet expansion also gives a smoothed data. Wavelets
also smooth the data to great extent by thresholding the wavelet
coefficients. Almost all smoothing methods destroys the peaks and
flatten them when the support of the window is increased. In certain
applications it is desirable to retain peaks while smoothing the data
as much as possible. In this paper we present a methodology called
as peak-wise smoothing that will smooth the data to any desired level
without losing the major peak features.
Abstract: An adaptive neural network controller for
autonomous underwater vehicles (AUVs) is presented in this paper.
The AUV model is highly nonlinear because of many factors, such as
hydrodynamic drag, damping, and lift forces, Coriolis and centripetal
forces, gravity and buoyancy forces, as well as forces from thruster.
In this regards, a nonlinear neural network is used to approximate the
nonlinear uncertainties of AUV dynamics, thus overcoming some
limitations of conventional controllers and ensure good performance.
The uniform ultimate boundedness of AUV tracking errors and the
stability of the proposed control system are guaranteed based on
Lyapunov theory. Numerical simulation studies for motion control of
an AUV are performed to demonstrate the effectiveness of the
proposed controller.
Abstract: Analytical solution of the first-order and third-order
shear deformation theories are developed to study the free vibration
behavior of simply supported functionally graded plates. The
material properties of plate are assumed to be graded in the thickness
direction as a power law distribution of volume fraction of the
constituents. The governing equations of functionally graded plates
are established by applying the Hamilton's principle and are solved
by using the Navier solution method. The influence of side-tothickness
ratio and constituent of volume fraction on the natural
frequencies are studied. The results are validated with the known
data in the literature.
Abstract: Supplier selection is a multi criteria decision-making process that comprises tangible and intangible factors. The majority of previous supplier selection techniques do not consider strategic perspective. Besides, uncertainty is one of the most important obstacles in supplier selection. For the first, time in this paper, the idea of the algorithm " Knapsack " is used to select suppliers Moreover, an attempt has to be made to take the advantage of a simple numerical method for solving model .This is an innovation to resolve any ambiguity in choosing suppliers. This model has been tried in the suppliers selected in a competitive environment and according to all desired standards of quality and quantity to show the efficiency of the model, an industry sample has been uses.