Abstract: Reducing river sediments through path correction and
preservation of river walls leads to considerable reduction of
sedimentation at the pumping stations. Path correction and
preservation of walls is not limited to one particular method but,
depending on various conditions, a combination of several methods
can be employed. In this article, we try to review and evaluate
methods for preservation of river banks in order to reduce sediments.
Abstract: In this study, a new criterion for determining the number of classes an image should be segmented is proposed. This criterion is based on discriminant analysis for measuring the separability among the segmented classes of pixels. Based on the new discriminant criterion, two algorithms for recursively segmenting the image into determined number of classes are proposed. The proposed methods can automatically and correctly segment objects with various illuminations into separated images for further processing. Experiments on the extraction of text strings from complex document images demonstrate the effectiveness of the proposed methods.1
Abstract: Bridge is an architectural symbol in Iran as Badgir
(wind catcher); fire temples and arch are vaults are such. Therefore, from the very old ages, construction of bridges in Iran has mixed with
architecture, social customs, alms and charity and holiness. Since long ago, from Mad, Achaemenid, Parthian and Sassanid times which construction of bridges got an inseparable relation with social dependency and architecture, based on those dependency bridges and
dams got holy names; as Dokhtar castle and Dokhtar bridges were constructed. This method continued even after Islam and whenever
Iranians got free from political fights and the immunity of roads were established the bridge construction did also prospered. In ancient
times bridge construction passes through it growing and completion process and in Sassanid time in some way it reached to the peak of art
and glory; as after Islam especially during 4th. century (Arab calendar) it put behind a period of glory and in Safavid time it
reached to an exceptional glory and magnificence by constructing
glorious bridges on Zayandeh Roud River in Isfahan.
Having a combined style and changeability into bridge barrier, some of these bridges develop into magnificent constructions. The
sustainable structures, mentioned above, are constructed for various
reasons as follows: connecting two sides of a river, storing water,
controlling floods, using water energy to operate water windmills, making lanes of streams for farms- use, and building recreational
places for people, etc. These studies carried in bridges reveals the fact
that in construction and designing mentioned above, lots of
technological factors have been taken into consideration such as
exceeding floods in the rives, hydraulic and hydrology of the rivers and bridges, geology, foundation, structure, construction material, and adopting appropriate executing methods, all of which are being analyzed in this article.
Abstract: Tracing and locating the geographical location of users (Geolocation) is used extensively in todays Internet. Whenever we, e.g., request a page from google we are - unless there was a specific configuration made - automatically forwarded to the page with the relevant language and amongst others, dependent on our location identified, specific commercials are presented. Especially within the area of Network Security, Geolocation has a significant impact. Because of the way the Internet works, attacks can be executed from almost everywhere. Therefore, for an attribution, knowledge of the origination of an attack - and thus Geolocation - is mandatory in order to be able to trace back an attacker. In addition, Geolocation can also be used very successfully to increase the security of a network during operation (i.e. before an intrusion actually has taken place). Similar to greylisting in emails, Geolocation allows to (i) correlate attacks detected with new connections and (ii) as a consequence to classify traffic a priori as more suspicious (thus particularly allowing to inspect this traffic in more detail). Although numerous techniques for Geolocation are existing, each strategy is subject to certain restrictions. Following the ideas of Endo et al., this publication tries to overcome these shortcomings with a combined solution of different methods to allow improved and optimized Geolocation. Thus, we present our architecture for improved Geolocation, by designing a new algorithm, which combines several Geolocation techniques to increase the accuracy.
Abstract: Knowing about the customer behavior in a grocery has
been a long-standing issue in the retailing industry. The advent of
RFID has made it easier to collect moving data for an individual
shopper's behavior. Most of the previous studies used the traditional
statistical clustering technique to find the major characteristics of
customer behavior, especially shopping path. However, in using the
clustering technique, due to various spatial constraints in the store,
standard clustering methods are not feasible because moving data such
as the shopping path should be adjusted in advance of the analysis,
which is time-consuming and causes data distortion. To alleviate this
problem, we propose a new approach to spatial pattern clustering
based on the longest common subsequence. Experimental results using
real data obtained from a grocery confirm the good performance of the
proposed method in finding the hot spot, dead spot and major path
patterns of customer movements.
Abstract: Developed tool is one of system tools for easier access to various scientific areas and real time interactive learning between
lecturer and for hearing impaired students. There is no demand for the lecturer to know Sign Language (SL). Instead, the new software
tools will perform the translation of the regular speech into SL, after
which it will be transferred to the student. On the other side, the
questions of the student (in SL) will be translated and transferred to
the lecturer in text or speech. One of those tools is presented tool. It-s
too for developing the correct Speech Visemes as a root of total communication method for hearing impared students.
Abstract: Large metal and concrete structures suffer by various kinds of deterioration, and accurate prediction of the remaining life is important. This paper informs about two methods for its assessment. One method, suitable for steel bridges and other constructions exposed to fatigue, monitors the loads and damage accumulation using information systems for the operation and the finite element model of the construction. In addition to the operation load, the dead weight of the construction and thermal stresses can be included into the model. The second method is suitable for concrete bridges and other structures, which suffer by carbonatation and other degradation processes, driven by diffusion. The diffusion constant, important for the prediction of future development, can be determined from the depth-profile of pH, obtained by pH measurement at various depths. Comparison with measurements on real objects illustrates the suitability of both methods.
Abstract: Air conditioning systems of houses consume large
quantity of electricity. To reducing energy consumption for air
conditioning purposes it is becoming attractive the use of evaporative
cooling air conditioning which is less energy consuming compared to
air chillers. But, it is obvious that higher energy efficiency of
evaporative cooling is not enough to judge whether evaporative
cooling economically is competitive with other types of cooling
systems. To proving the higher energy efficiency and cost
effectiveness of the evaporative cooling competitive analysis of
various types of cooling system should be accomplished. For noted
purpose optimization mathematical model for each system should be
composed based on system approach analysis. In this paper different
types of evaporative cooling-heating systems are discussed and
methods for increasing their energy efficiency and as well as
determining of their design parameters are developed. The
optimization mathematical models for each of them are composed
with help of which least specific costs for each of them are reviled.
The comparison of specific costs proved that the most efficient and
cost effective is considered the “direct evaporating" system if it is
applicable for given climatic conditions. Next more universal and
applicable for many climatic conditions system providing least cost
of heating and cooling is considered the “direct evaporating" system.
Abstract: This paper is a review on the aspects and approaches of design an image cryptosystem. First a general introduction given for cryptography and images encryption and followed by different techniques in image encryption and related works for each technique surveyed. Finally, general security analysis methods for encrypted images are mentioned.
Abstract: Requirement engineering has been the subject of large
volume of researches due to the significant role it plays in the
software development life cycle. However, dynamicity of software
industry is much faster than advances in requirements engineering
approaches. Therefore, this paper aims to systematically review and
evaluate the current research in requirement engineering and identify
new research trends and direction in this field. In addition, various
research methods associated with the Evaluation-based techniques
and empirical study are highlighted for the requirements engineering
field. Finally, challenges and recommendations on future directions
research are presented based on the research team observations
during this study.
Abstract: The intrusion detection problem has been frequently studied, but intrusion detection methods are often based on a single point of view, which always limits the results. In this paper, we introduce a new intrusion detection model based on the combination of different current methods. First we use a notion of distance to unify the different methods. Second we combine these methods using the Pearson correlation coefficients, which measure the relationship between two methods, and we obtain a combined distance. If the combined distance is greater than a predetermined threshold, an intrusion is detected. We have implemented and tested the combination model with two different public data sets: the data set of masquerade detection collected by Schonlau & al., and the data set of program behaviors from the University of New Mexico. The results of the experiments prove that the combination model has better performances.
Abstract: Modeling of the distributed systems allows us to
represent the whole its functionality. The working system instance
rarely fulfils the whole functionality represented by model; usually
some parts of this functionality should be accessible periodically.
The reporting system based on the Data Warehouse concept seams to
be an intuitive example of the system that some of its functionality is
required only from time to time. Analyzing an enterprise risk
associated with the periodical change of the system functionality, we
should consider not only the inaccessibility of the components
(object) but also their functions (methods), and the impact of such a
situation on the system functionality from the business point of view.
In the paper we suggest that the risk attributes should be estimated
from risk attributes specified at the requirements level (Use Case in
the UML model) on the base of the information about the structure of
the model (presented at other levels of the UML model). We argue
that it is desirable to consider the influence of periodical changes in
requirements on the enterprise risk estimation. Finally, the
proposition of such a solution basing on the UML system model is
presented.
Abstract: The advances in location-based data collection
technologies such as GPS, RFID etc. and the rapid reduction of their
costs provide us with a huge and continuously increasing amount of
data about movement of vehicles, people and goods in an urban area.
This explosive growth of geospatially-referenced data has far
outpaced the planner-s ability to utilize and transform the data into
insightful information thus creating an adverse impact on the return
on the investment made to collect and manage this data. Addressing
this pressing need, we designed and developed DIVAD, a dynamic
and interactive visual analytics dashboard to allow city planners to
explore and analyze city-s transportation data to gain valuable
insights about city-s traffic flow and transportation requirements. We
demonstrate the potential of DIVAD through the use of interactive
choropleth and hexagon binning maps to explore and analyze large
taxi-transportation data of Singapore for different geographic and
time zones.
Abstract: This paper reports a new pattern recognition approach for face recognition. The biological model of light receptors - cones and rods in human eyes and the way they are associated with pattern vision in human vision forms the basis of this approach. The functional model is simulated using CWD and WPD. The paper also discusses the experiments performed for face recognition using the features extracted from images in the AT & T face database. Artificial Neural Network and k- Nearest Neighbour classifier algorithms are employed for the recognition purpose. A feature vector is formed for each of the face images in the database and recognition accuracies are computed and compared using the classifiers. Simulation results show that the proposed method outperforms traditional way of feature extraction methods prevailing for pattern recognition in terms of recognition accuracy for face images with pose and illumination variations.
Abstract: Wireless sensor networks have been used in wide
areas of application and become an attractive area for researchers in
recent years. Because of the limited energy storage capability of
sensor nodes, Energy consumption is one of the most challenging
aspects of these networks and different strategies and protocols deals
with this area. This paper presents general methods for designing low
power wireless sensor network. Different sources of energy
consumptions in these networks are discussed here and techniques for
alleviating the consumption of energy are presented.
Abstract: Semisolid metal processing uses solid–liquid slurries
containing fine and globular solid particles uniformly distributed in a
liquid matrix, which can be handled as a solid and flow like a liquid.
In the recent years, many methods have been introduced for the
production of semisolid slurries since it is scientifically sound and
industrially viable with such preferred microstructures called
thixotropic microstructures as feedstock materials. One such process
that needs very low equipment investment and running costs is the
cooling slope. In this research by using a mechanical stirrer slurry
maker constructed by the authors, the effects of mechanical stirring
parameters such as: stirring time, stirring temperature and stirring
Speed on micro-structure and mechanical properties of A360
aluminum alloy in semi-solid forming, are investigated. It is
determined that mold temperature and holding time of part in
temperature of 580ºC have a great effect on micro-structure and
mechanical properties(stirring temperature of 585ºC, stirring time of
20 minutes and stirring speed of 425 RPM). By optimizing the
forming parameters, dendrite microstructure changes to globular and
mechanical properties improves. This is because of breaking and
globularzing dendrites of primary α-AL.
Abstract: In this report, an OTA which is used in fully
differential pipelined ADC was described. Using gain-boost
architecture with difference-ended amplifier, this OTA achieve
high-gain and high-speed. Besides, the CMFB circuit is also used, and
some methods are concerned to improve the performance. Then, by
optimization the layout design, OTA-s mismatch was reduced. This
design was using TSMC 0.18um CMOS process and simulation both
schematic and layout in Cadence. The result of the simulation shows
that the OTA has a gain up to 80dB,a unity gain bandwidth of about
1.437GHz for a 2pF load, a slew rate is about 428V/μs, a output swing
is 0.2V~1.35V, with the power supply of 1.8V, the power
consumption is 88mW. This amplifier was used in a 10bit 150MHz
pipelined ADC.
Abstract: Forecasting the values of the indicators, which
characterize the effectiveness of performance of organizations is of
great importance for their successful development. Such forecasting
is necessary in order to assess the current state and to foresee future
developments, so that measures to improve the organization-s
activity could be undertaken in time. The article presents an
overview of the applied mathematical and statistical methods for
developing forecasts. Special attention is paid to artificial neural
networks as a forecasting tool. Their strengths and weaknesses are
analyzed and a synopsis is made of the application of artificial neural
networks in the field of forecasting of the values of different
education efficiency indicators. A method of evaluation of the
activity of universities using the Balanced Scorecard is proposed and
Key Performance Indicators for assessment of e-learning are
selected. Resulting indicators for the evaluation of efficiency of the
activity are proposed. An artificial neural network is constructed and
applied in the forecasting of the values of indicators for e-learning
efficiency on the basis of the KPI values.
Abstract: In this work we investigated the behavior of methane
hydrates dispersed in crude oils from different fields at temperatures
below 0°C. In case of crude oil emulsion the size of water droplets is
in the range of 50e100"m. The size of hydrate particles formed from
droplets is the same. The self-preservation is not expected in this
field. However, the self-preservation of hydrates with the size of
particles 24±18"m (electron microscopy data) in suspensions is
observed. Similar results were obtained for four different kinds of
crude oil and model system such as asphaltenes, resins and wax in ndecane.
This result can allow developing effective methods to prevent
the formation and elimination of gas-hydrate plugs in pipelines under
low temperature conditions (e. g. in Eastern Siberia). There is a
prospective to use experiment results for working out the technology
of associated petroleum gas recovery.
Abstract: Assembly line balancing is a very important issue in
mass production systems due to production cost. Although many
studies have been done on this topic, but because assembly line
balancing problems are so complex they are categorized as NP-hard
problems and researchers strongly recommend using heuristic
methods. This paper presents a new heuristic approach called the
critical task method (CTM) for solving U-shape assembly line
balancing problems. The performance of the proposed heuristic
method is tested by solving a number of test problems and comparing
them with 12 other heuristics available in the literature to confirm the
superior performance of the proposed heuristic. Furthermore, to
prove the efficiency of the proposed CTM, the objectives are
increased to minimize the number of workstation (or equivalently
maximize line efficiency), and minimizing the smoothness index.
Finally, it is proven that the proposed heuristic is more efficient than
the others to solve the U-shape assembly line balancing problem.