Abstract: Having a very many number of pipelines all over the
country, Iran is one of the countries consists of various ecosystems
with variable degrees of fragility and robusticity as well as
geographical conditions. This study presents a state-of-the-art method
to estimate environmental risks of pipelines by recommending
rational equations including FES, URAS, SRS, RRS, DRS, LURS
and IRS as well as FRS to calculate the risks. This study was carried
out by a relative semi-quantitative approach based on land uses and
HVAs (High-Value Areas). GIS as a tool was used to create proper
maps regarding the environmental risks, land uses and distances. The
main logic for using the formulas was the distance-based approaches
and ESI as well as intersections. Summarizing the results of the
study, a risk geographical map based on the ESIs and final risk score
(FRS) was created. The study results showed that the most sensitive
and so of high risk area would be an area comprising of mangrove
forests located in the pipeline neighborhood. Also, salty lands were
the most robust land use units in the case of pipeline failure
circumstances. Besides, using a state-of-the-art method, it showed
that mapping the risks of pipelines out with the applied method is of
more reliability and convenience as well as relative
comprehensiveness in comparison to present non-holistic methods for
assessing the environmental risks of pipelines. The focus of the
present study is “assessment" than that of “management". It is
suggested that new policies are to be implemented to reduce the
negative effects of the pipeline that has not yet been constructed
completely
Abstract: The people are differed by their capabilities, skills and mental agilities. The evolution of human from childhood when they are completely dependent up to adultness the time they gradually set the dependency free is too complicated, by considering they have all started from almost one point but some become cleverer and some less. The main control command of a cybernetic hand should be posted by remaining healthy organs of disabled Person. These commands can be from several channels, which their recording and detecting are different and need complicated study. In this research, we suppose that, this stage has been done or in the other words, the command has been already sent and detected. So the main goal is to control a long hand, upper elbow hand missing, by an interest angle define by disabled. It means that, the system input is the position desired by disables and the output is the elbow-joint angle variation. Therefore the goal is a suitable control design based on neural network theory in order to meet the given mapping.
Abstract: European Rail Traffic Management System (ERTMS) is the European reference for interoperable and safer signaling systems to efficiently manage trains running. If implemented, it allows trains cross seamlessly intra-European national borders. ERTMS has defined a secure communication protocol, EURORADIO, based on open communication networks. Its RadioInfill function can improve the reaction of the signaling system to changes in line conditions, avoiding unnecessary braking: its advantages in terms of power saving and travel time has been analyzed. In this paper a software implementation of the EURORADIO protocol with RadioInfill for ERTMS Level 1 using GSM-R is illustrated as part of the SR-Secure Italian project. In this building-blocks architecture the EURORADIO layers communicates together through modular Application Programm Interfaces. Security coding rules and railway industry requirements specified by EN 50128 standard have been respected. The proposed implementation has successfully passed conformity tests and has been tested on a computer-based simulator.
Abstract: This study reports the preparation of soft magnetic ribbons of Fe-based amorphous alloys using the single-roller melt-spinning technique. Ribbon width varied from 142 mm to 213 mm and, with a thickness of approximately 22 μm 2 μm. The microstructure and magnetic properties of the ribbons were characterized by differential scanning calorimeter (DSC), X-ray diffraction (XRD), vibrating sample magnetometer (VSM), and electrical resistivity measurements (ERM). The amorphous material properties dependence of the cooling rate and nozzle pressure have uneven surface in ribbon thicknesses are investigated. Magnetic measurement results indicate that some region of the ribbon exhibits good magnetic properties, higher saturation induction and lower coercivity. However, due to the uneven surface of 213 mm wide ribbon, the magnetic responses are not uniformly distributed. To understand the transformer magnetic performances, this study analyzes the measurements of a three-phase 2 MVA amorphous-cored transformer. Experimental results confirm that the transformer with a ribbon width of 142 mm has better magnetic properties in terms of lower core loss, exciting power, and audible noise.
Abstract: Segmentation is an important step in medical image
analysis and classification for radiological evaluation or computer
aided diagnosis. The CAD (Computer Aided Diagnosis ) of lung CT
generally first segment the area of interest (lung) and then analyze
the separately obtained area for nodule detection in order to
diagnosis the disease. For normal lung, segmentation can be
performed by making use of excellent contrast between air and
surrounding tissues. However this approach fails when lung is
affected by high density pathology. Dense pathologies are present in
approximately a fifth of clinical scans, and for computer analysis
such as detection and quantification of abnormal areas it is vital that
the entire and perfectly lung part of the image is provided and no
part, as present in the original image be eradicated. In this paper we
have proposed a lung segmentation technique which accurately
segment the lung parenchyma from lung CT Scan images. The
algorithm was tested against the 25 datasets of different patients
received from Ackron Univeristy, USA and AGA Khan Medical
University, Karachi, Pakistan.
Abstract: Local Linear Neuro-Fuzzy Models (LLNFM) like other neuro- fuzzy systems are adaptive networks and provide robust learning capabilities and are widely utilized in various applications such as pattern recognition, system identification, image processing and prediction. Local linear model tree (LOLIMOT) is a type of Takagi-Sugeno-Kang neuro fuzzy algorithm which has proven its efficiency compared with other neuro fuzzy networks in learning the nonlinear systems and pattern recognition. In this paper, a dedicated reconfigurable and parallel processing hardware for LOLIMOT algorithm and its applications are presented. This hardware realizes on-chip learning which gives it the capability to work as a standalone device in a system. The synthesis results on FPGA platforms show its potential to improve the speed at least 250 of times faster than software implemented algorithms.
Abstract: This paper aims to address the new trend of social
commerce as electronic commerce leverages Web 2.0 technologies
and online social media. The infusions of new technologies on the
World Wide Web connect users in their homes and workplaces,
thus transforming social formations and business transactions. An
in-depth study of the growth and success of a social commerce site,
Facebook was conducted. The investigation is finalized with a triad
relational model which reflects socioeconomic life in the Internet
today. The following three concepts work jointly to form a global
community that has already started to take the place of traditional
commerce and socialization: Web 2.0 technology, E-commerce,
and online social media. A discussion of the research findings
indicates that social commerce networks are sustainable because of
the various incentives given to users as they collaborate with others
regardless of their identity and location. The focus of this article is
to increase understanding on quickly developing Web 2.0 based
social media and their subsequent effects on the emerging social
commerce.
Abstract: Because of architectural condition and structure application, sometimes mass source and stiffness source are not coincidence, and the structure is irregular. The structure is also might be asymmetric as an asymmetric bracing in plan which leads to unbalance distribution of stiffness or because of unbalance distribution of the mass. Both condition lead to eccentricity and torsion in the structure. The deficiency of ordinary code to evaluate the performance of steel structures against earthquake has been caused designing based on performance level or capacity spectrum be used. By using the mentioned methods it is possible to design a structure that its behavior against different earthquakes be predictive. In this article 5- story buildings with different percentage of asymmetric which is because of stiffness changes have been designed. The static and dynamic nonlinear analysis under three acceleration recording has been done. Finally performance level of the structure has been evaluated.
Abstract: Electron multiplying charge coupled devices (EMCCDs) have revolutionized the world of low light imaging by introducing on-chip multiplication gain based on the impact ionization effect in the silicon. They combine the sub-electron readout noise with high frame rates. Signal-to-noise Ratio (SNR) is an important performance parameter for low-light-level imaging systems. This work investigates the SNR performance of an EMCCD operated in Non-inverted Mode (NIMO) and Inverted Mode (IMO). The theory of noise characteristics and operation modes is presented. The results show that the SNR of is determined by dark current and clock induced charge at high gain level. The optimum SNR performance is provided by an EMCCD operated in NIMO in short exposure and strong cooling applications. In contrast, an IMO EMCCD is preferable.
Abstract: Morgan-s refinement calculus (MRC) is one of the
well-known methods allowing the formality presented in the program
specification to be continued all the way to code. On the other hand,
Object-Z (OZ) is an extension of Z adding support for classes and
objects. There are a number of methods for obtaining code from OZ
specifications that can be categorized into refinement and animation
methods. As far as we know, only one refinement method exists
which refines OZ specifications into code. However, this method
does not have fine-grained refinement rules and thus cannot be
automated. On the other hand, existing animation methods do not
present mapping rules formally and do not support the mapping of
several important constructs of OZ, such as all cases of operation
expressions and most of constructs in global paragraph. In this paper,
with the aim of providing an automatic path from OZ specifications
to code, we propose an approach to map OZ specifications into their
counterparts in MRC in order to use fine-grained refinement rules of
MRC. In this way, having counterparts of our specifications in MRC,
we can refine them into code automatically using MRC tools such as
RED. Other advantages of our work pertain to proposing mapping
rules formally, supporting the mapping of all important constructs of
Object-Z, and considering dynamic instantiation of objects while OZ
itself does not cover this facility.
Abstract: Nowadays wireless technology plays an important
role in public and personal communication. However, the growth of
wireless networking has confused the traditional boundaries between
trusted and untrusted networks. Wireless networks are subject to a
variety of threats and attacks at present. An attacker has the ability to
listen to all network traffic which becoming a potential intrusion.
Intrusion of any kind may lead to a chaotic condition. In addition,
improperly configured access points also contribute the risk to
wireless network. To overcome this issue, a security solution that
includes an intrusion detection and prevention system need to be
implemented. In this paper, first the security drawbacks of wireless
network will be analyzed then investigate the characteristics and also
the limitations on current wireless intrusion detection and prevention
system. Finally, the requirement of next wireless intrusion prevention
system will be identified including some key issues which should be
focused on in the future to overcomes those limitations.
Abstract: Graduate attributes have received increasing attention
over recent years as universities incorporate these attributes into the
curriculum. Graduates who have adequate technical knowledge only
are not sufficiently equipped to compete effectively in the work
place; they also need non disciplinary skills ie, graduate attributes.
The purpose of this paper is to investigate the impact of an eportfolio
in a technical communication course to enhance engineering
students- graduate attributes: namely, learning of communication,
critical thinking and problem solving and teamwork skills. Two
questionnaires were used to elicit information from the students: one
on their preferred and the other on the actual learning process. In
addition, student perceptions of the use of eportfolio as a learning
tool were investigated. Preliminary findings showed that most of the
students- expectations have been met with their actual learning. This
indicated that eportfolio has the potential as a tool to enhance
students- graduate attributes.
Abstract: This article considers the main features of party
construction in the course of political modernization of Kazakhstan.
Along with consideration of party construction author analyzed how
the transformation of the party system was fulfilled in Kazakhstan.
Besides the basic stages in the course of party construction were
explained by the author. The statistical data is cited.
Abstract: The necessity of solving multi dimensional
complicated scientific problems beside the necessity of several
objective functions optimization are the most motive reason of born
of artificial intelligence and heuristic methods.
In this paper, we introduce a new method for multiobjective
optimization based on learning automata. In the proposed method,
search space divides into separate hyper-cubes and each cube is
considered as an action. After gathering of all objective functions
with separate weights, the cumulative function is considered as the
fitness function. By the application of all the cubes to the cumulative
function, we calculate the amount of amplification of each action and
the algorithm continues its way to find the best solutions. In this
Method, a lateral memory is used to gather the significant points of
each iteration of the algorithm. Finally, by considering the
domination factor, pareto front is estimated. Results of several
experiments show the effectiveness of this method in comparison
with genetic algorithm based method.
Abstract: A color image edge detection algorithm is proposed in
this paper using Pseudo-complement and matrix rotation operations.
First, pseudo-complement method is applied on the image for each
channel. Then, matrix operations are applied on the output image of
the first stage. Dominant pixels are obtained by image differencing
between the pseudo-complement image and the matrix operated
image. Median filtering is carried out to smoothen the image thereby
removing the isolated pixels. Finally, the dominant or core pixels
occurring in at least two channels are selected. On plotting the
selected edge pixels, the final edge map of the given color image is
obtained. The algorithm is also tested in HSV and YCbCr color
spaces. Experimental results on both synthetic and real world images
show that the accuracy of the proposed method is comparable to
other color edge detectors. All the proposed procedures can be
applied to any image domain and runs in polynomial time.
Abstract: In this paper, we propose a direct method based on the
real Schur factorization for solving the projected Sylvester equation
with relatively small size. The algebraic formula of the solution of
the projected continuous-time Sylvester equation is presented. The
computational cost of the direct method is estimated. Numerical
experiments show that this direct method has high accuracy.
Abstract: Vehicle which are turning or maneuvering at high speeds
are susceptible to sliding and subsequently deviate from desired path. In
this paper the dynamics governing the Yaw/Roll behavior of a vehicle
has been simulated. Two different simulations have been used one for
the real vehicle, for which a fuzzy controller is designed to increase its
directional stability property. The other simulation is for a hypothetical
vehicle with much higher tire cornering stiffness which is capable of
developing the required lateral forces at the tire-ground patch contact to
attain the desired lateral acceleration for the vehicle to follow the
desired path without slippage. This simulation model is our reference
model.
The logic for keeping the vehicle on the desired track in the cornering
or maneuvering state is to have some braking forces on the inner or
outer tires based on the direction of vehicle deviation from the desired
path. The inputs to our vehicle simulation model is steer angle δ and
vehicle velocity V , and the outputs can be any kinematical parameters
like yaw rate, yaw acceleration, side slip angle, rate of side slip angle
and so on. The proposed fuzzy controller is a feed forward controller.
This controller has two inputs which are steer angle δ and vehicle
velocity V, and the output of the controller is the correcting moment M,
which guides the vehicle back to the desired track. To develop the
membership functions for the controller inputs and output and the fuzzy
rules, the vehicle simulation has been run for 1000 times and the
correcting moment have been determined by trial and error. Results of
the vehicle simulation with fuzzy controller are very promising
and show the vehicle performance is enhanced greatly over the
vehicle without the controller. In fact the vehicle performance
with the controller is very near the performance of the reference
ideal model.
Abstract: Dengue virus is transmitted from person to person
through the biting of infected Aedes Aegypti mosquitoes. DEN-1,
DEN-2, DEN-3 and DEN-4 are four serotypes of this virus. Infection
with one of these four serotypes apparently produces permanent
immunity to it, but only temporary cross immunity to the others. The
length of time during incubation of dengue virus in human and
mosquito are considered in this study. The dengue patients are
classified into infected and infectious classes. The infectious human
can transmit dengue virus to susceptible mosquitoes but infected
human can not. The transmission model of this disease is formulated.
The human population is divided into susceptible, infected, infectious
and recovered classes. The mosquito population is separated into
susceptible, infected and infectious classes. Only infectious
mosquitoes can transmit dengue virus to the susceptible human. We
analyze this model by using dynamical analysis method. The
threshold condition is discussed to reduce the outbreak of this
disease.
Abstract: Organizational culture fosters innovation, and
innovation is the main engine to be sustained within the uncertainty
market. Like other countries, the construction industry significantly
contributes to the economy, society and technology of Malaysia, yet,
innovation is still considered slow compared to other industries such
as manufacturing. Given the important role of an architect as the key
player and the contributor of new ideas in the construction industry,
there is a call to identify the issue and improve the current situation
by focusing on the architectural firms. In addition, the existing
studies tend to focus only on a few dimensions of organizational
culture and very few studies consider whether innovation is being
generated or adopted. Hence, the present research tends to fill in the
gap by identifying the organizational cultures that foster or hinder
innovation generation and/or innovation adoption, and propose a
model of organizational culture and innovation generation and/or
adoption.
Abstract: There are increasingly plagiarism offences for
students in higher education in the digital educational world. On the
other hand, various and competitive online assessment and
plagiarism detection tools are available in the market. Taking the
University of Glamorgan as a case study, this paper describes and
introduces an institutional journey on electronic plagiarism detection
to inform the initial experience of an innovative tool and method
which could be further explored in the future research. The
comparative study and system workflow for e-plagiarism detection
tool are discussed. Benefits for both academics and students are also
presented. Electronic plagiarism detection tools brought great
benefits to both academics and students in Glamorgan. On the other
hand, the debates raised in such initial experience are discussed.