Abstract: In this study which has been conducted in Akçasu
Forest Range District of Devrek Forest Directorate; 3 methods (weed
control with labourer power, cover removal with Hitachi F20
Excavator, and weed control with agricultural equipment mounted on
a Ferguson 240S agriculture tractor) were utilized in weed control
efforts in regeneration of degraded oriental beech forests have been
compared. In this respect, 3 methods have been compared by
determining certain work hours and standard durations of unit areas
(1 hectare). For this purpose, evaluating the tasks made with human
and machine force from the aspects of duration, productivity and
costs, it has been aimed to determine the most productive method in
accordance with the actual ecological conditions of research field.
Within the scope of the study, the time studies have been conducted
for 3 methods used in weed control efforts. While carrying out those
studies, the performed implementations have been evaluated by
dividing them into business stages. Also, the actual data have been
used while calculating the cost accounts. In those calculations, the
latest formulas and equations which are also used in developed
countries have been utilized. The variance of analysis (ANOVA) was
used in order to determine whether there is any statistically
significant difference among obtained results, and the Duncan test
was used for grouping if there is significant difference. According to
the measurements and findings carried out within the scope of this
study, it has been found during living cover removal efforts in
regeneration efforts in demolished oriental beech forests that the
removal of weed layer in 1 hectare of field has taken 920 hours with
labourer force, 15.1 hours with excavator and 60 hours with an
equipment mounted on a tractor. On the other hand, it has been
determined that the cost of removal of living cover in unit area (1
hectare) was 3220.00 TL for labourer power, 1250 TL for excavator
and 1825 TL for equipment mounted on a tractor.
According to the obtained results, it has been found that the
utilization of excavator in weed control effort in regeneration of
degraded oriental beech regions under actual ecological conditions of
research field has been found to be more productive from both of
aspects of duration and costs. These determinations carried out
should be repeated in weed control efforts in degraded forest fields
with different ecological conditions, it is compulsory for finding the
most efficient weed control method. These findings will light the way
of technical staff of forestry directorate in determination of the most
effective and economic weed control method. Thus, the more actual
data will be used while preparing the weed control budgets, and there
will be significant contributions to national economy. Also the results of this and similar studies are very important for developing the policies for our forestry in short and long term.
Abstract: Many wireless sensor network applications require
K-coverage of the monitored area. In this paper, we propose a
scalable harmony search based algorithm in terms of execution
time, K-Coverage Enhancement Algorithm (KCEA), it attempts to
enhance initial coverage, and achieve the required K-coverage degree
for a specific application efficiently. Simulation results show that
the proposed algorithm achieves coverage improvement of 5.34%
compared to K-Coverage Rate Deployment (K-CRD), which achieves
1.31% when deploying one additional sensor. Moreover, the proposed
algorithm is more time efficient.
Abstract: The recommended limit for cadmium concentration in
potable water is less than 0.005 mg/L. A continuous biosorption
process using indigenous red seaweed, Gracilaria corticata, was
performed to remove cadmium from the potable water. The process
was conducted under fixed conditions and the breakthrough curves
were achieved for three consecutive sorption-desorption cycles. A
modeling based on Artificial Neural Network (ANN) was employed
to fit the experimental breakthrough data. In addition, a simplified
semi empirical model, Thomas, was employed for this purpose. It
was found that ANN well described the experimental data (R2>0.99)
while the Thomas prediction were a bit less successful with R2>0.97.
The adjusted design parameters using the nonlinear form of Thomas
model was in a good agreement with the experimentally obtained
ones. The results approve the capability of ANN to predict the
cadmium concentration in potable water.
Abstract: Nowadays, Photovoltaic-PV Farms/ Parks and large
PV-Smart Grid Interface Schemes are emerging and commonly
utilized in Renewable Energy distributed generation. However, PVhybrid-
Dc-Ac Schemes using interface power electronic converters
usually has negative impact on power quality and stabilization of
modern electrical network under load excursions and network fault
conditions in smart grid. Consequently, robust FACTS based
interface schemes are required to ensure efficient energy utilization
and stabilization of bus voltages as well as limiting switching/fault
onrush current condition. FACTS devices are also used in smart grid-
Battery Interface and Storage Schemes with PV-Battery Storage
hybrid systems as an elegant alternative to renewable energy
utilization with backup battery storage for electric utility energy and
demand side management to provide needed energy and power
capacity under heavy load conditions. The paper presents a robust
interface PV-Li-Ion Battery Storage Interface Scheme for
Distribution/Utilization Low Voltage Interface using FACTS
stabilization enhancement and dynamic maximum PV power tracking
controllers.
Digital simulation and validation of the proposed scheme is done
using MATLAB/Simulink software environment for Low Voltage-
Distribution/Utilization system feeding a hybrid Linear-Motorized
inrush and nonlinear type loads from a DC-AC Interface VSC-6-
pulse Inverter Fed from the PV Park/Farm with a back-up Li-Ion
Storage Battery.
Abstract: In this work, neural networks methods MLP type were
applied to a database from an array of six sensors for the detection of
three toxic gases. The choice of the number of hidden layers and the
weight values are influential on the convergence of the learning
algorithm. We proposed, in this article, a mathematical formula to
determine the optimal number of hidden layers and good weight
values based on the method of back propagation of errors. The results
of this modeling have improved discrimination of these gases and
optimized the computation time. The model presented here has
proven to be an effective application for the fast identification of
toxic gases.
Abstract: The globalization of markets, the need to develop
competitive advantages and core competencies, among other things,
lead organizations to increasingly cross borders to operate in other
countries. The expatriation of professionals who go to work in
another country besides their own becomes increasingly common. In
order to generate data about this issue, research was conducted
concerning the perception of expatriate employees concerning
expatriation success. The research method used was case study
through a qualitative approach. This research was done through
interviews with five India expatriates and five China expatriates,
interview with expatriate department heads and analysis of company
documents. It was found that there are differences between the
organizational perception and perception of expatriates of what
constitutes mission success. The paper also provides suggestions for
further research and suggestions for future expatriates.
Abstract: The ad hoc networks are the future of wireless
technology as everyone wants fast and accurate error free information
so keeping this in mind Bit Error Rate (BER) and power is optimized
in this research paper by using the Genetic Algorithm (GA). The
digital modulation techniques used for this paper are Binary Phase
Shift Keying (BPSK), M-ary Phase Shift Keying (M-ary PSK), and
Quadrature Amplitude Modulation (QAM). This work is
implemented on Wireless Ad Hoc Networks (WLAN). Then it is
analyze which modulation technique is performing well to optimize
the BER and power of WLAN.
Abstract: The IEEE 802.22 working group aims to drive the
Digital Video Broadcasting-Terrestrial (DVB-T) bands for data
communication to the rural area without interfering the TV broadcast.
In this paper, we arrive at a closed-form expression for average
detection probability of Fusion center (FC) with multiple antenna
over the κ − μ fading channel model. We consider a centralized
cooperative multiple antenna network for reporting. The DVB-T
samples forwarded by the secondary user (SU) were combined using
Maximum ratio combiner at FC, an energy detection is performed
to make the decision. The fading effects of the channel degrades
the detection probability of the FC, a generalized independent and
identically distributed (IID) κ − μ and an additive white Gaussian
noise (AWGN) channel is considered for reporting and sensing
respectively. The proposed system performance is verified through
simulation results.
Abstract: Securing the confidential data transferred via wireless
network remains a challenging problem. It is paramount to ensure
that data are accessible only by the legitimate users rather than by the
attackers. One of the most serious threats to organization is jamming,
which disrupts the communication between any two pairs of nodes.
Therefore, designing an attack-defending scheme without any packet
loss in data transmission is an important challenge. In this paper,
Dependence based Malicious Route Defending DMRD Scheme has
been proposed in multi path routing environment to prevent jamming
attack. The key idea is to defend the malicious route to ensure
perspicuous transmission. This scheme develops a two layered
architecture and it operates in two different steps. In the first step,
possible routes are captured and their agent dependence values are
marked using triple agents. In the second step, the dependence values
are compared by performing comparator filtering to detect malicious
route as well as to identify a reliable route for secured data
transmission. By simulation studies, it is observed that the proposed
scheme significantly identifies malicious route by attaining lower
delay time and route discovery time; it also achieves higher
throughput.
Abstract: Femtocells are regarded as a milestone for next
generation cellular networks. As femtocells are deployed in an
unplanned manner, there is a chance of assigning same resource to
neighboring femtocells. This scenario may induce co-channel
interference and may seriously affect the service quality of
neighboring femtocells. In addition, the dominant transmit power of a
femtocell will induce co-tier interference to neighboring femtocells.
Thus to jointly handle co-tier and co-channel interference, we
propose an interference-free power and resource block allocation
(IFPRBA) algorithm for closely located, closed access femtocells.
Based on neighboring list, inter-femto-base station distance and
uplink noise power, the IFPRBA algorithm assigns non-interfering
power and resource to femtocells. The IFPRBA algorithm also
guarantees the quality of service to femtouser based on the
knowledge of resource requirement, connection type, and the
tolerable delay budget. Simulation result shows that the interference
power experienced in IFPRBA algorithm is below the tolerable
interference power and hence the overall service success ratio, PRB
efficiency and network throughput are maximum when compared to
conventional resource allocation framework for femtocell (RAFF)
algorithm.
Abstract: Cloud computing has provided the impetus for change
in the demand, sourcing, and consumption of IT-enabled services.
The technology developed from an emerging trend towards a ‘musthave’.
Many organizations harnessed on the quick-wins of cloud
computing within the last five years but nowadays reach a plateau
when it comes to sustainable savings and performance. This study
aims to investigate what is needed from an organizational perspective
to make cloud computing a sustainable success. The study was
carried out in Germany among senior IT professionals, both in
management and delivery positions. Our research shows that IT
executives must be prepared to realign their IT workforce to sustain
the advantage of cloud computing for today and the near future.
While new roles will undoubtedly emerge, roles alone cannot ensure
the success of cloud deployments. What is needed is a change in the
IT workforce’s business behaviour, or put more simply, the ways in
which the IT personnel works. It gives clear guidance on which
dimensions of an employees’ working behaviour need to be adapted.
The practical implications are drawn from a series of semi-structured
interviews, resulting in a high-level workforce enablement plan.
Lastly, it elaborates on tools and gives clear guidance on which
pitfalls might arise along the proposed workforce enablement
process.
Abstract: Software Architecture is the basic structure of
software that states the development and advancement of a software
system. Software architecture is also considered as a significant tool
for the construction of high quality software systems. A clean design
leads to the control, value and beauty of software resulting in its
longer life while a bad design is the cause of architectural erosion
where a software evolution completely fails. This paper discusses the
occurrence of software architecture erosion and presents a set of
methods for the detection, declaration and prevention of architecture
erosion. The causes and symptoms of architecture erosion are
observed with the examples of prescriptive and descriptive
architectures and the practices used to stop this erosion are also
discussed by considering different types of software erosion and their
affects. Consequently finding and devising the most suitable
approach for fighting software architecture erosion and in some way
reducing its affect is evaluated and tested on different scenarios.
Abstract: This work presents a new planar multiband antenna
based on fractal geometry. This structure is optimized and validated
into simulation by using CST-MW Studio. To feed this antenna we
have used a CPW line which makes it easy to be incorporated with
integrated circuits. The simulation results presents a good matching
input impedance and radiation pattern in the GSM band at 900 MHz
and ISM band at 2.4 GHz. The final structure is a dual band fractal
antenna with 70 x 70 mm² as a total area by using an FR4 substrate.
Abstract: This paper presents observations on the early
supervised internships in Psychology, currently called basic
internships in Brazil, and its importance in professional training. The
work is an experience report and focuses on the Professional training,
illustrated by the reality of a Brazilian institution, used as a case
study. It was developed from the authors' experience as academic
supervisors of this kind of practice throughout this undergraduate
course, combined with aspects investigated in the post-doctoral
research of one of them. Theoretical references on the subject and
related national legislation are analyzed, as well as reports of students
who experienced at least one semester of this type of practice,
articulated to the observations of the authors. The results demonstrate
the importance of the early supervised internships as a way of
creating opportunities for the students of a first contact with the
professional reality and the practice of psychologists in different
fields of insertion, preparing them for further experiments that require
more involvement in activities of training and practices in
Psychology.
Abstract: The star network is one of the promising
interconnection networks for future high speed parallel computers, it
is expected to be one of the future-generation networks. The star
network is both edge and vertex symmetry, it was shown to have
many gorgeous topological proprieties also it is owns hierarchical
structure framework. Although much of the research work has been
done on this promising network in literature, it still suffers from
having enough algorithms for load balancing problem. In this paper
we try to work on this issue by investigating and proposing an
efficient algorithm for load balancing problem for the star network.
The proposed algorithm is called Star Clustered Dimension Exchange
Method SCDEM to be implemented on the star network. The
proposed algorithm is based on the Clustered Dimension Exchange
Method (CDEM). The SCDEM algorithm is shown to be efficient in
redistributing the load balancing as evenly as possible among all
nodes of different factor networks.
Abstract: Supply chain (SC) is an operational research (OR)
approach and technique which acts as catalyst within central nervous
system of business today. Without SC, any type of business is at
doldrums, hence entropy. SC is the lifeblood of business today
because it is the pivotal hub which provides imperative competitive
advantage. The paper present a conceptual framework dubbed as
Homomorphic Conceptual Framework for Effective Supply Chain
Strategy (HCEFSC).The term Homomorphic is derived from abstract
algebraic mathematical term homomorphism (same shape) which
also embeds the following mathematical application sets:
monomorphisms, isomorphism, automorphisms, and endomorphism.
The HCFESC is intertwined and integrated with wide and broad sets
of elements.
Abstract: This work was one of the tasks of the
Manufacturing2Client project, whose objective was to develop a
frontal deflector to be commercialized in the automotive industry,
using new project and manufacturing methods. In this task, in
particular, it was proposed to develop the ability to predict
computationally the aerodynamic influence of flow in vehicles, in an
effort to reduce fuel consumption in vehicles from class 3 to 8. With
this aim, two deflector models were developed and their aerodynamic
performance analyzed. The aerodynamic study was done using the
Computational Fluid Dynamics (CFD) software Ansys CFX and
allowed the calculation of the drag coefficient caused by the vehicle
motion for the different configurations considered. Moreover, the
reduction of diesel consumption and carbon dioxide (CO2) emissions
associated with the optimized deflector geometry could be assessed.
Abstract: Self-compacting concrete (SCC) developed in Japan
in the late 80s has enabled the construction industry to reduce
demand on the resources, improve the work condition and also
reduce the impact of environment by elimination of the need for
compaction. Fuzzy logic (FL) approaches has recently been used to
model some of the human activities in many areas of civil
engineering applications. Especially from these systems in the model
experimental studies, very good results have been obtained. In the
present study, a model for predicting compressive strength of SCC
containing various proportions of fly ash, as partial replacement of
cement has been developed by using Fuzzy Inference System (FIS).
For the purpose of building this model, a database of experimental
data were gathered from the literature and used for training and
testing the model. The used data as the inputs of fuzzy logic models
are arranged in a format of five parameters that cover the total binder
content, fly ash replacement percentage, water content,
superplasticizer and age of specimens. The training and testing results
in the fuzzy logic model have shown a strong potential for predicting
the compressive strength of SCC containing fly ash in the considered
range.
Abstract: Fuzzy inference method based approach to the
forming of modular intellectual system of assessment the quality of
communication services is proposed. Developed under this approach
the basic fuzzy estimation model takes into account the
recommendations of the International Telecommunication Union in
respect of the operation of packet switching networks based on IPprotocol.
To implement the main features and functions of the fuzzy
control system of quality telecommunication services it is used
multilayer feedforward neural network.
Abstract: Red blood cells (RBC) are the most common types of
blood cells and are the most intensively studied in cell biology. The
lack of RBCs is a condition in which the amount of hemoglobin level
is lower than normal and is referred to as “anemia”. Abnormalities in
RBCs will affect the exchange of oxygen. This paper presents a
comparative study for various techniques for classifying the RBCs as
normal or abnormal (anemic) using WEKA. WEKA is an open
source consists of different machine learning algorithms for data
mining applications. The algorithms tested are Radial Basis Function
neural network, Support vector machine, and K-Nearest Neighbors
algorithm. Two sets of combined features were utilized for
classification of blood cells images. The first set, exclusively consist
of geometrical features, was used to identify whether the tested blood
cell has a spherical shape or non-spherical cells. While the second
set, consist mainly of textural features was used to recognize the
types of the spherical cells. We have provided an evaluation based on
applying these classification methods to our RBCs image dataset
which were obtained from Serdang Hospital - Malaysia, and
measuring the accuracy of test results. The best achieved
classification rates are 97%, 98%, and 79% for Support vector
machines, Radial Basis Function neural network, and K-Nearest
Neighbors algorithm respectively.