Abstract: Realistic systems generally are systems with various
inputs and outputs also known as Multiple Input Multiple Output
(MIMO). Such systems usually prove to be complex and difficult to
model and control purposes. Therefore, decomposition was used to
separate individual inputs and outputs. A PID is assigned to each
individual pair to regulate desired settling time. Suitable parameters
of PIDs obtained from Genetic Algorithm (GA), using Mean of
Squared Error (MSE) objective function.
Abstract: This research was undertaken to study enzymatic activity in the shoots, roots, and rhizosphere of alfalfa (Medicago sativa L.) grown in quartz sand that was uncontaminated and
contaminated with phenanthrene at concentrations of 10 and 100 mg kg-1. The higher concentration of phehanthrene had a distinct
phytotoxic effect on alfalfa, inhibiting seed germination energy, plant survival, and biomass accumulation. The plant stress response to the
environmental pollution was an increase in peroxidase activity. Peroxidases were the predominant enzymes in the alfalfa shoots and
roots. The peroxidase profile in the shoots differed from that in the roots and had different isoenzyme numbers. 2,2'-Azinobis-(3-ethylbenzo-thiazoline-6-sulphonate) (ABTS) peroxidase was
predominant in the shoots, and 2,7-diaminofluorene (2,2-DAF)
peroxidase was predominant in the roots. Under the influence of
phenanthrene, the activity of 2,7-DAF peroxidase increased in the
shoots, and the activity of ABTS peroxidase increased in the roots.
Alfalfa root peroxidases were the prevalent enzyme systems in the
rhizosphere sand. Examination of the activity of alfalfa root
peroxidase toward phenanthrene revealed the possibility of
involvement of the plant enzyme in rhizosphere degradation of the
PAH.
Abstract: This paper presents comparison among methods of
determination of the characteristic polynomial coefficients. First, the
resultant systems from the methods are compared based on frequency
criteria such as the closed loop bandwidth, gain and phase margins.
Then the step responses of the resultant systems are compared on the
basis of the transient behavior criteria including overshoot, rise time,
settling time and error (via IAE, ITAE, ISE and ITSE integral
indices). Also relative stability of the systems is compared together.
Finally the best choices in regards to the above diverse criteria are
presented.
Abstract: This paper proposes the use of metrics in design space exploration that highlight where in the structure of the model and at what point in the behaviour, prevention is needed against transient faults. Previous approaches to tackle transient faults focused on recovery after detection. Almost no research has been directed towards preventive measures. But in real-time systems, hard deadlines are performance requirements that absolutely must be met and a missed deadline constitutes an erroneous action and a possible system failure. This paper proposes the use of metrics to assess the system design to flag where transient faults may have significant impact. These tools then allow the design to be changed to minimize that impact, and they also flag where particular design techniques – such as coding of communications or memories – need to be applied in later stages of design.
Abstract: Generalization is one of the most challenging issues
of Learning Classifier Systems. This feature depends on the
representation method which the system used. Considering the
proposed representation schemes for Learning Classifier System, it
can be concluded that many of them are designed to describe the
shape of the region which the environmental states belong and the
other relations of the environmental state with that region was
ignored. In this paper, we propose a new representation scheme
which is designed to show various relationships between the
environmental state and the region that is specified with a particular
classifier.
Abstract: This paper summarizes and compares approaches to
solving the knapsack problem and its known application in capital
budgeting. The first approach uses deterministic methods and can be
applied to small-size tasks with a single constraint. We can also
apply commercial software systems such as the GAMS modelling
system. However, because of NP-completeness of the problem, more
complex problem instances must be solved by means of heuristic
techniques to achieve an approximation of the exact solution in a
reasonable amount of time. We show the problem representation and
parameter settings for a genetic algorithm framework.
Abstract: The purpose of this study is to reveal the principles, which have the highest impact on determining the Strategic Quality Management (SQM) implementation perceptions of managers. In order to accomplish this goal, first of all, a factor analysis is conducted on the attitudes of managers at 80 large-scale firms in Turkey for SQM principles. Secondly, utilizing t tests and discriminant analysis, the most effective items are determined. The results show that “process improvement" and “assessment of competitiveness" are the management principles, which have the highest impact on determining the SQM implementation perceptions of Turkish managers.
Abstract: Unmanned Aerial Vehicles (UAVs) have gained tremendous importance, in both Military and Civil, during first decade of this century. In a UAV, onboard computer (autopilot) autonomously controls the flight and navigation of the aircraft. Based on the aircraft role and flight envelope, basic to complex and sophisticated controllers are used to stabilize the aircraft flight parameters. These controllers constitute the autopilot system for UAVs. The autopilot systems, most commonly, provide lateral and longitudinal control through Proportional-Integral-Derivative (PID) controllers or Phase-lead or Lag Compensators. Various techniques are commonly used to ‘tune’ gains of these controllers. Some techniques used are, in-flight step-by-step tuning, software-in-loop or hardware-in-loop tuning methods. Subsequently, numerous in-flight tests are required to actually ‘fine-tune’ these gains. However, an optimization-based tuning of these PID controllers or compensators, as presented in this paper, can greatly minimize the requirement of in-flight ‘tuning’ and substantially reduce the risks and cost involved in flight-testing.
Abstract: Attack graph is an integral part of modeling the
overview of network security. System administrators use attack graphs to determine how vulnerable their systems are and to determine
what security measures to deploy to defend their systems. Previous methods on AGG(attack graphs generation) are aiming at
the whole network, which makes the process of AGG complex and
non-scalable. In this paper, we propose a new approach which is
simple and scalable to AGG by decomposing the whole network into atomic domains. Each atomic domain represents a host with a specific privilege. Then the process for AGG is achieved by communications
among all the atomic domains. Our approach simplifies the process
of design for the whole network, and can gives the attack graphs including each attack path for each host, and when the network changes we just carry on the operations of corresponding atomic
domains which makes the process of AGG scalable.
Abstract: Business Process Reengineering (BPR) is an essential tool before an information system project implementation. Enterprise Resource Planning (ERP) projects definitely require the standardization and fixation of business processes from customer order to shipment. Therefore, ERP implementations are well proven to be coupled with BPR, although the extend and timing of BPR with respect to ERP implementation differ. This study aims at analyzing the effects of BPR on ERP implementation success. Basing on two Turkish ERP implementations in pharmaceutical sector, a comparative study is performed. One of the ERP implementations took place after a BPR implementation, whereas the other implementation was without a prior BPR application. Both implementations have been realized with the same consultant team, the case with prior BPR implementation going live first. The results of the case study reveal that if business processes are not optimized and improved before an ERP implementation, ERP live system would face with disharmony problems of processes and processes automated by ERP. This suggests a definite precedence relationship between BPR and ERP applications
Abstract: A block backward differentiation formula of uniform
order eight is proposed for solving first order stiff initial value
problems (IVPs). The conventional 8-step Backward Differentiation
Formula (BDF) and additional methods are obtained from the same
continuous scheme and assembled into a block matrix equation which
is applied to provide the solutions of IVPs on non-overlapping
intervals. The stability analysis of the method indicates that the
method is L0-stable. Numerical results obtained using the proposed
new block form show that it is attractive for solutions of stiff problems
and compares favourably with existing ones.
Abstract: Ants are fascinating creatures that demonstrate the
ability to find food and bring it back to their nest. Their ability as a
colony, to find paths to food sources has inspired the development of
algorithms known as Ant Colony Systems (ACS). The principle of
cooperation forms the backbone of such algorithms, commonly used
to find solutions to problems such as the Traveling Salesman
Problem (TSP). Ants communicate to each other through chemical
substances called pheromones. Modeling individual ants- ability to
manipulate this substance can help an ACS find the best solution.
This paper introduces a Dynamic Ant Colony System with threelevel
updates (DACS3) that enhance an existing ACS. Experiments
were conducted to observe single ant behavior in a colony of
Malaysian House Red Ants. Such behavior was incorporated into the
DACS3 algorithm. We benchmark the performance of DACS3 versus
DACS on TSP instances ranging from 14 to 100 cities. The result
shows that the DACS3 algorithm can achieve shorter distance in
most cases and also performs considerably faster than DACS.
Abstract: In this paper, self-starting block hybrid method of
order (5,5,5,5)T is proposed for the solution of the special second
order ordinary differential equations with associated initial or
boundary conditions. The continuous hybrid formulations enable us
to differentiate and evaluate at some grids and off – grid points to
obtain four discrete schemes, which were used in block form for
parallel or sequential solutions of the problems. The computational
burden and computer time wastage involved in the usual reduction of
second order problem into system of first order equations are avoided
by this approach. Furthermore, a stability analysis and efficiency of
the block method are tested on stiff ordinary differential equations,
and the results obtained compared favorably with the exact solution.
Abstract: Paleoclimate was reconstructed by the clay mineral
assemblages of shale units of Pabdeh (Paleocene- Oligocene), Gurpi
(Upper Cretaceous), Kazhdumi (Albian-Cenomanian) and Gadvan
(Aptian-Neocomian) formations in the Bangestan anticline. To
compare with clay minerals assemblages in these formations,
selected samples also taken from available formations in drilled wells
in Ahvaz, Marun, Karanj, and Parsi oil fields. Collected samples
prepared using standard clay mineral methodology. They were
treated as normal, glycolated and heated oriented glass slides. Their
identification was made on X-Ray diffractographs. Illite % varies
from 8 to 36. Illite quantity increased from Pabdeh to Gurpi
Formation. This may be due to dominant dry climate. Kaolinite is in
range of 12-49%. Its variation style in different formations could be a
marker of climate changes from wet to dry which is supported by the
lithological changes. Chlorite (4-28%) can also be detected in those
samples without any kaolinite. Mixed layer minerals as the mixture
of illite-chlorite and illite-vermiculite-montmorillonite are varied
from 6 to 36%, decreased during Kazhdumi deposition from the base
to the top. This result may be according to decreasing of illite
leaching process. Vermiculite was also determined in very less
quantity and found in those units without kaolinite. Montmorillonite
varies from 8 to 43%, and its presence is due to terrestrial
depositional condition. Stratigraphical documents is also supported
this idea that clay mineral distribution is a function of the climate
changes. It seems, thus, the present results can be indicated a possible
procedure for ancient climate changes evaluation.
Abstract: The performance of ground to deep space optical
communication systems is degraded by distortion of the beam as it
propagates through the turbulent atmosphere. Turbulence causes
fluctuations in the intensity of the received signal which ultimately
affects the acquisition time required to acquire and locate the spaceborne
target using narrow laser beam. In this paper, performance of
free-space optical (FSO) communication system in atmospheric
turbulence has been analyzed in terms of acquisition time for
coherent and non-coherent modulation schemes. Numerical results
presented in graphical and tabular forms show that the acquisition
time increases with the increase in turbulence level. This is true for
both schemes. The BPSK has lowest acquisition time among all
schemes. In non-coherent schemes, M-PPM performs better than the
other schemes. With the increase in M, acquisition time becomes
lower, but at the cost of increase in system complexity.
Abstract: In space during functioning, a satellite will be heated
up due to the behavior of its components such as power electronics.
In order to prevent problems in the satellite, this heat has to be
released in space thanks to the cooling system. This system consists
of a loop heat pipe (LHP), in which a fluid streams through an
evaporator and a condenser. In the evaporator, the fluid captures the
heat from the satellite and evaporates. Then it flows to the condenser
where it releases the heat and it condenses. In this project, the two
mains parts of a cooling system are studied: the evaporator and the
condenser. The study of the diphasic loop was done starting from
digital simulations carried out under Matlab and Femlab.
Abstract: Finding suitable non-supersingular elliptic curves for
pairing-based cryptosystems becomes an important issue for the
modern public-key cryptography after the proposition of id-based
encryption scheme and short signature scheme. In previous work
different algorithms have been proposed for finding such elliptic
curves when embedding degree k ∈ {3, 4, 6} and cofactor h ∈ {1, 2, 3,
4, 5}. In this paper a new method is presented to find more
non-supersingular elliptic curves for pairing-based cryptosystems with
general embedding degree k and large values of cofactor h. In
addition, some effective parameters of these non-supersingular elliptic
curves are provided in this paper.
Abstract: Urban problems are problems of organized complexity. Thus, many models and scientific methods to resolve urban problems are failed. This study is concerned with proposing of a fuzzy system driven approach for classification and solving urban problems. The proposed study investigated mainly the selection of the inputs and outputs of urban systems for classification of urban problems. In this research, five categories of urban problems, respect to fuzzy system approach had been recognized: control, polytely, optimizing, open and decision making problems. Grounded Theory techniques were then applied to analyze the data and develop new solving method for each category. The findings indicate that the fuzzy system methods are powerful processes and analytic tools for helping planners to resolve urban complex problems. These tools can be successful where as others have failed because both incorporate or address uncertainty and risk; complexity and systems interacting with other systems.
Abstract: Tufting carpet is a very suitable substrate for growing
microorganism such as pathogenic microbes, due to the direct touch
with human body, long washing periods and laying on the floor; in
fact there are 3 major problems: To risk human health, Prepare bad
odors and Destruction of the products.. In the presented research, for
investigation of presence most common microbes on polyester
tufting, first goods laid in a public place (in the corridor fair) for 30
days and the existence of some microbes were investigate on it with
two methods of enrichment in nutrient environments such as
thioglycolate and noutrunt brath, and shake the dust off the polyester
tufting onto cultivation mediums such as blood agar and noutrunt
agar. After the microorganism colonics are grown, the colonies were
separated and six microbial tests such as cataloes and sitrat were
carried out in five phases on the colonics for identifying the varieties
of bacteria. As a result of tests, 5 type of bacteria, such as
Escherichia coli, staphylococcus saprophytic as were identified. Each
of the mentioned bacteria can be seriously harmful for the heath of
human.
Abstract: Voice Over IP (VoIP) is a technology that could pass
the voice traffic and data packet form over an IP network. Network
can be used for intranet or Internet. Phone calls using VoIP has
advantages in terms of cheaper cost of PSTN phone to more than
half, because the cost is calculated by the cost of the global nature of
the Internet. Session Initiation Protocol (SIP) is a signaling protocol
at the application layer which serves to establish, modify, and
terminate a multimedia session involving one or more users. This SIP
signaling has SIP message in text form that is used for session
management by the SIP components, such as User Agent, Registrar,
Redirect Server, and Proxy Server. To build a SIP communication is
required SIP Express Router (SER) to be able to receive SIP
messages, for handling the basic functions of SIP messages.
Problems occur when the NAT through which affects the voice
communication will be blocked starting from the sound that is not
sent or one side of the sound are sent (half duplex). How that could
be used to penetrate NAT is to use a given mediaproxy random RTP
port to penetrate NAT.