Abstract: The practice of burying the solid waste under the ground is one of the waste disposal methods and dumping is known as an ultimate method in the fastest-growing cities like Rasht city in Iran. Some municipalities select the solid waste landfills without feasibility studies, programming, design and management plans. Therefore, several social and environmental impacts are created by these sites. In this study, the suitability of solid waste landfill in Rasht city, capital of Gilan Province is reviewed using Regional Screening Method (RSM), Geographic Information System (GIS) and Analytical Hierarchy Process (AHP). The results indicated that according to the suitability maps, the value of study site is midsuitable to suitable based on RSM and mid-suitable based on AHP.
Abstract: The RK1GL2X3 method is a numerical method for solving initial value problems in ordinary differential equations, and is based on the RK1GL2 method which, in turn, is a particular case of the general RKrGLm method. The RK1GL2X3 method is a fourth-order method, even though its underlying Runge-Kutta method RK1 is the first-order Euler method, and hence, RK1GL2X3 is considerably more efficient than RK1. This enhancement is achieved through an implementation involving triple-nested two-point Gauss- Legendre quadrature.
Abstract: This paper provides a flexible way of controlling
Variable-Bit-Rate (VBR) of compressed digital video, applicable to
the new H264 video compression standard. The entire video
sequence is assessed in advance and the quantisation level is then set
such that bit rate (and thus the frame rate) remains within
predetermined limits compatible with the bandwidth of the
transmission system and the capabilities of the remote end, while at
the same time providing constant quality similar to VBR encoding.
A process for avoiding buffer starvation by selectively eliminating
frames from the encoded output at times when the frame rate is slow
(large number of bits per frame) will be also described. Finally, the
problem of buffer overflow will be solved by selectively eliminating
frames from the received input to the decoder. The decoder detects
the omission of the frames and resynchronizes the transmission by
monitoring time stamps and repeating frames if necessary.
Abstract: Given a simple connected unweighted undirected graph G = (V (G), E(G)) with |V (G)| = n and |E(G)| = m, we present a new algorithm for the all-pairs shortest-path (APSP) problem. The running time of our algorithm is in O(n2 log n). This bound is an improvement over previous best known O(n2.376) time bound of Raimund Seidel (1995) for general graphs. The algorithm presented does not rely on fast matrix multiplication. Our algorithm with slight modifications, enables us to compute the APSP problem for unweighted directed graph in time O(n2 log n), improving a previous best known O(n2.575) time bound of Uri Zwick (2002).
Abstract: Turbine blade cooling is considered as the most
effective way of maintaining high operating temperature making use
of the available materials, and turbine systems with wet compression
have a potential for future power generation because of high efficiency
and high specific power with a relatively low cost. In this paper
performance analysis of wet-compression gas turbine cycle with
turbine blade cooling is carried out. The wet compression process is
analytically modeled based on non-equilibrium droplet evaporation.
Special attention is paid for the effects of pressure ratio and water
injection ratio on the important system variables such as ratio of
coolant fluid flow, fuel consumption, thermal efficiency and specific
power. Parametric studies show that wet compression leads to
insignificant improvement in thermal efficiency but significant
enhancement of specific power in gas turbine systems with turbine
blade cooling.
Abstract: Westudy a dual-channel supply chain under
decentralized setting in which manufacturer sells to retailer and to
customers directly usingan online channel. A customer chooses the
purchase-channel based on price and service quality. Also, to buy
product from the retail store, the customer incurs a transportation cost
influenced by the fluctuating gasoline cost. Both companies are under
the revenue sharing contract. In this contract the retailer share a
portion of the revenue to the manufacturer while the manufacturer
will charge the lower wholesales price. The numerical result shows
that the effects of gasoline costs, the revenue sharing ratio and the
wholesale price play an important role in determining optimal prices.
The result shows that when the gasoline price fluctuatesthe optimal
on-line priceis relatively stable while the optimal retail price moves
in the opposite direction of the gasoline prices.
Abstract: Proprietary sensor network systems are typically expensive, rigid and difficult to incorporate technologies from other vendors. When using competing and incompatible technologies, a non-proprietary system is complex to create because it requires significant technical expertise and effort, which can be more expensive than a proprietary product. This paper presents the Sensor Abstraction Layer (SAL) that provides middleware architectures with a consistent and uniform view of heterogeneous sensor networks, regardless of the technologies involved. SAL abstracts and hides the hardware disparities and specificities related to accessing, controlling, probing and piloting heterogeneous sensors. SAL is a single software library containing a stable hardware-independent interface with consistent access and control functions to remotely manage the network. The end-user has near-real-time access to the collected data via the network, which results in a cost-effective, flexible and simplified system suitable for novice users. SAL has been used for successfully implementing several low-cost sensor network systems.
Abstract: In this paper three different approaches for person
verification and identification, i.e. by means of fingerprints, face and
voice recognition, are studied. Face recognition uses parts-based
representation methods and a manifold learning approach. The
assessment criterion is recognition accuracy. The techniques under
investigation are: a) Local Non-negative Matrix Factorization
(LNMF); b) Independent Components Analysis (ICA); c) NMF with
sparse constraints (NMFsc); d) Locality Preserving Projections
(Laplacianfaces). Fingerprint detection was approached by classical
minutiae (small graphical patterns) matching through image
segmentation by using a structural approach and a neural network as
decision block. As to voice / speaker recognition, melodic cepstral
and delta delta mel cepstral analysis were used as main methods, in
order to construct a supervised speaker-dependent voice recognition
system. The final decision (e.g. “accept-reject" for a verification
task) is taken by using a majority voting technique applied to the
three biometrics. The preliminary results, obtained for medium
databases of fingerprints, faces and voice recordings, indicate the
feasibility of our study and an overall recognition precision (about
92%) permitting the utilization of our system for a future complex
biometric card.
Abstract: Markov games are a generalization of Markov
decision process to a multi-agent setting. Two-player zero-sum
Markov game framework offers an effective platform for designing
robust controllers. This paper presents two novel controller design
algorithms that use ideas from game-theory literature to produce
reliable controllers that are able to maintain performance in presence
of noise and parameter variations. A more widely used approach for
controller design is the H∞ optimal control, which suffers from high
computational demand and at times, may be infeasible. Our approach
generates an optimal control policy for the agent (controller) via a
simple Linear Program enabling the controller to learn about the
unknown environment. The controller is facing an unknown
environment, and in our formulation this environment corresponds to
the behavior rules of the noise modeled as the opponent. Proposed
controller architectures attempt to improve controller reliability by a
gradual mixing of algorithmic approaches drawn from the game
theory literature and the Minimax-Q Markov game solution
approach, in a reinforcement-learning framework. We test the
proposed algorithms on a simulated Inverted Pendulum Swing-up
task and compare its performance against standard Q learning.
Abstract: The overlay approach has been widely used by many service providers for Traffic Engineering (TE) in large Internet backbones. In the overlay approach, logical connections are set up between edge nodes to form a full mesh virtual network on top of the physical topology. IP routing is then run over the virtual network. Traffic engineering objectives are achieved through carefully routing logical connections over the physical links. Although the overlay approach has been implemented in many operational networks, it has a number of well-known scaling issues. This paper proposes a new approach to achieve traffic engineering without full-mesh overlaying with the help of integrated approach and equal subset split method. Traffic engineering needs to determine the optimal routing of traffic over the existing network infrastructure by efficiently allocating resource in order to optimize traffic performance on an IP network. Even though constraint-based routing [1] of Multi-Protocol Label Switching (MPLS) is developed to address this need, since it is not widely tested or debugged, Internet Service Providers (ISPs) resort to TE methods under Open Shortest Path First (OSPF), which is the most commonly used intra-domain routing protocol. Determining OSPF link weights for optimal network performance is an NP-hard problem. As it is not possible to solve this problem, we present a subset split method to improve the efficiency and performance by minimizing the maximum link utilization in the network via a small number of link weight modifications. The results of this method are compared against results of MPLS architecture [9] and other heuristic methods.
Abstract: Background: Regular physical activity contributes
positively to physical and psychological health. In the present study,
the stages of change of physical activity and the total physical
Aims: The aim of this study was to investigate the proportion of
adolescent girls in each stages of change and the causative factors
associated with physical activity such as the related social support
and self efficacy in a sample of the high school students.
Methods: In this study, Social Cognitive Theory (SCT) and the
Transtheorical Model (TTM) guided instrument development. The
data regarding the demographics, psychosocial determinants of
physical activity, stage of change and physical activity was gathered
by questionnaires. Several measures of psychosocial determinants of
physical activity were translated from English into Persian using the
back-translation technique. These translated measures were
administered to 512 ninth and tenth-grade Iranian high school
students for factor analysis.
Results: The distribution of the stage of change for physical activity
was as follow: 18/5% in precontemplation, 23.4% in contemplation,
38.2% in preparation, 4.6% in action and 15.3% in maintenance.
They were in 80.1% pre-adoption stages (precontemplation stage,
contemplation stage and preparation stage) and 19.9% post-adoption
stages (action stage and maintenance stage) of physical activity.
There was a significant relate between age and physical activity in
adolescent girls (age-related decline of physical activity) p
Abstract: Multivariate quality control charts show some advantages to monitor several variables in comparison with the simultaneous use of univariate charts, nevertheless, there are some disadvantages. The main problem is how to interpret the out-ofcontrol signal of a multivariate chart. For example, in the case of control charts designed to monitor the mean vector, the chart signals showing that it must be accepted that there is a shift in the vector, but no indication is given about the variables that have produced this shift. The MEWMA quality control chart is a very powerful scheme to detect small shifts in the mean vector. There are no previous specific works about the interpretation of the out-of-control signal of this chart. In this paper neural networks are designed to interpret the out-of-control signal of the MEWMA chart, and the percentage of correct classifications is studied for different cases.
Abstract: The sequence Analyze, Design, Develop, Implement, and Evaluate (ADDIE) provides a powerful methodology for designing computer-based educational materials. Helping students to understand this design process sequence may be achieved by providing them with direct, guided experience. This article examines such help and guidance and the overall learning process from a student-s personal experience.
Abstract: In this work we present the modelling of the induction
machine, taking into consideration the stator defects of the induction
machine. It is based on the theory of electromagnetic coupling of
electrical circuits. In fact, for the modelling of stationary defects such
as short circuit between turns in the same phase, we introduce only
in the matrix the coefficients of resistance and inductance of stator
and in the mutual inductance stator-rotor. These coefficients take
account the number of turns in short-circuit deducted from the total
number of turns in the same phase; in this way we obtain the number
of useful turns. In addition, all these faults involved, will be used for
the creation of the database that will be used to develop an automated
system failures of the induction machine.
Abstract: In this study, the transesterification of palm oil with methanol for biodiesel production was studied by using CaO–ZnO as a heterogeneous base catalyst prepared by incipient-wetness impregnation (IWI) and co-precipitation (CP) methods. The reaction parameters considered were molar ratio of methanol to oil, amount of catalyst, reaction temperature, and reaction time. The optimum conditions–15:1 molar ratio of methanol to oil, a catalyst amount of 6 wt%, reaction temperature of 60 °C, and reaction time of 8 h–were observed. The effects of Ca loading, calcination temperature, and catalyst preparation on the catalytic performance were studied. The fresh and spent catalysts were characterized by several techniques, including XRD, TPR, and XRF.
Abstract: The two cart inverted pendulum system is a good
bench mark for testing the performance of system dynamics and
control engineering principles. Devasia introduced this system to
study the asymptotic tracking problem for nonlinear systems. In this
paper the problem of asymptotic tracking of the two-cart with an
inverted-pendulum system to a sinusoidal reference inputs via
introducing a novel method for solving finite-horizon nonlinear
optimal control problems is presented. In this method, an iterative
method applied to state dependent Riccati equation (SDRE) to obtain
a reliable algorithm. The superiority of this technique has been shown
by simulation and comparison with the nonlinear approach.
Abstract: A kind of singularly perturbed boundary value problems is under consideration. In order to obtain its approximation, simple upwind difference discretization is applied. We use a moving mesh iterative algorithm based on equi-distributing of the arc-length function of the current computed piecewise linear solution. First, a maximum norm a posteriori error estimate on an arbitrary mesh is derived using a different method from the one carried out by Chen [Advances in Computational Mathematics, 24(1-4) (2006), 197-212.]. Then, basing on the properties of discrete Green-s function and the presented posteriori error estimate, we theoretically prove that the discrete solutions computed by the algorithm are first-order uniformly convergent with respect to the perturbation parameter ε.
Abstract: This paper highlights the importance of the selection
of the building-s wall material,and the shortcomings of the most
commonly used framed structures with masonry infills .The
objective of this study is investigating the behavior of infill walls as
structural components in existing structures.Structural infill walls are
very important in structural behavior under earthquake effects.
Structural capacity under the effect of earthquake,displacement and
relative story displacement are affected by the structural irregularities
.The presence of nonstructural masonry infill walls can modify
extensively the global seismic behavior of framed buildings .The
stability and integrity of reinforced concrete frames are enhanced by
masonry infill walls. Masonry infill walls alter displacement and
base shear of the frame as well. Short columns have great
importance during earthquakes,because their failure may lead to
additional structural failures and result in total building collapse.
Consequently the effects of short columns are considered in this
study.
Abstract: This research attempts to explore gaps in Information
Systems (IS) and innovation literatures by developing a model of
Information Technology (IT) capability in enabling innovation. The
research was conducted by using semi-structured interview with six
innovators in business consulting, financial, healthcare and academic
organizations. The interview results suggest four elements of ITenabled
innovation capability which are information (ability to
capture ideas and knowledge), connectivity (ability to bridge
geographical boundary and mobilize human resources),
communication (ability to attain and engage relationships between
human resources) and transformation (ability to change the functions
and process integrations) in defining IT-enabled innovation platform.
The results also suggests innovators- roles and IT capability.