Abstract: Nowadays, doping is an intricate dilemma. Wrestling
is the nationally popular sport in Iran. Also the prevalence of doping
may be high, due to its power demanding characteristics. So, we
aimed to assess the knowledge and attitudes toward doping among
the club wrestlers. In a cross sectional study, 426 wrestlers were
studied. For this reason, a researcher made questionnaire was used. In
this study, researchers selected the clubs by randomized clustered
sampling and distributed the questionnaire among wrestlers.
Knowledge of wrestlers in three categories of doping definitions,
recognition of prohibited drugs and side effects was poor or moderate
in 70.8%, 95.8% and 99.5%, respectively. Wrestlers have poor
knowledge in doping. Furthermore, they believe some myths which
are unfavorable. It seems necessary to design a comprehensive
educational program for all of the athletes and coaches.
Abstract: In this paper parametric analytical studies have been carried out to examine the intrinsic flow physics pertaining to the liftoff time of solid propellant rockets. Idealized inert simulators of solid rockets are selected for numerical studies to examining the preignition chamber dynamics. Detailed diagnostic investigations have been carried out using an unsteady two-dimensional k-omega turbulence model. We conjectured from the numerical results that the altered variations of the igniter jet impingement angle, turbulence level, time and location of the first ignition, flame spread characteristics, the overall chamber dynamics including the boundary layer growth history are having bearing on the time for nozzle flow chocking for establishing the required thrust for the rocket liftoff. We concluded that the altered flow choking time of strap-on motors with the pre-determined identical ignition time at the lift off phase will lead to the malfunctioning of the rocket. We also concluded that, in the light of the space debris, an error in predicting the liftoff time can lead to an unfavorable launch window amounts the satellite injection errors and/or the mission failures.
Abstract: Bus networks design is an important problem in
public transportation. The main step to this design, is determining the
number of required terminals and their locations. This is an especial
type of facility location problem, a large scale combinatorial
optimization problem that requires a long time to be solved.
The genetic algorithm (GA) is a search and optimization technique
which works based on evolutionary principle of natural
chromosomes. Specifically, the evolution of chromosomes due to the
action of crossover, mutation and natural selection of chromosomes
based on Darwin's survival-of-the-fittest principle, are all artificially
simulated to constitute a robust search and optimization procedure.
In this paper, we first state the problem as a mixed integer
programming (MIP) problem. Then we design a new crossover and
mutation for bus terminal location problem (BTLP). We tested the
different parameters of genetic algorithm (for a sample problem) and
obtained the optimal parameters for solving BTLP with numerical try
and error.
Abstract: This paper presents the approximate analytical solution of a Zakharov-Kuznetsov ZK(m, n, k) equation with the help of the differential transform method (DTM). The DTM method is a powerful and efficient technique for finding solutions of nonlinear equations without the need of a linearization process. In this approach the solution is found in the form of a rapidly convergent series with easily computed components. The two special cases, ZK(2,2,2) and ZK(3,3,3), are chosen to illustrate the concrete scheme of the DTM method in ZK(m, n, k) equations. The results demonstrate reliability and efficiency of the proposed method.
Abstract: This paper contributes to the field of Environmental
Awareness Training (EAT) evaluation in terms of military activities.
Environmental management of military activities is a growing concern
for defence forces worldwide and the importance of EAT is becoming
widely recognized. As one of Australia-s largest landowners, the
Australian Defence Force (ADF) is extremely mindful of its duty as a
joint environmental manager. It has an integrated Environmental
Management System (EMS) to assist environmental management and
EAT is an essential part of the ADF EMS model. This paper examines
how EAT was conducted during the exercise Talisman Saber in 2009
(TS09) and evaluates its effectiveness, using Shoalwater Bay Training
Area (SWBTA), one of the most significant military training areas and
a significant protected area in Australia, as a case study. A
questionnaire survey conducted showed, overall, that EAT was
effective from the perspective of a sample of participants.
Recommendations are made for the ADF to refine EAT for future
exercises.
Abstract: Microtomographic images and thin section (TS)
images were analyzed and compared against some parameters of
geological interest such as porosity and its distribution along the
samples. The results show that microtomography (CT) analysis,
although limited by its resolution, have some interesting information
about the distribution of porosity (homogeneous or not) and can also
quantify the connected and non-connected pores, i.e., total porosity.
TS have no limitations concerning resolution, but are limited by the
experimental data available in regards to a few glass sheets for
analysis and also can give only information about the connected
pores, i.e., effective porosity. Those two methods have their own
virtues and flaws but when paired together they are able to
complement one another, making for a more reliable and complete
analysis.
Abstract: We present a method to create special domain
collections from news sites. The method only requires a single
sample article as a seed. No prior corpus statistics are needed and the
method is applicable to multiple languages. We examine various
similarity measures and the creation of document collections for
English and Japanese. The main contributions are as follows. First,
the algorithm can build special domain collections from as little as
one sample document. Second, unlike other algorithms it does not
require a second “general" corpus to compute statistics. Third, in our
testing the algorithm outperformed others in creating collections
made up of highly relevant articles.
Abstract: This study reports the preparation of soft magnetic ribbons of Fe-based amorphous alloys using the single-roller melt-spinning technique. Ribbon width varied from 142 mm to 213 mm and, with a thickness of approximately 22 μm 2 μm. The microstructure and magnetic properties of the ribbons were characterized by differential scanning calorimeter (DSC), X-ray diffraction (XRD), vibrating sample magnetometer (VSM), and electrical resistivity measurements (ERM). The amorphous material properties dependence of the cooling rate and nozzle pressure have uneven surface in ribbon thicknesses are investigated. Magnetic measurement results indicate that some region of the ribbon exhibits good magnetic properties, higher saturation induction and lower coercivity. However, due to the uneven surface of 213 mm wide ribbon, the magnetic responses are not uniformly distributed. To understand the transformer magnetic performances, this study analyzes the measurements of a three-phase 2 MVA amorphous-cored transformer. Experimental results confirm that the transformer with a ribbon width of 142 mm has better magnetic properties in terms of lower core loss, exciting power, and audible noise.
Abstract: A self-evolution algorithm for optimizing neural networks using a combination of PSO and JPSO is proposed. The algorithm optimizes both the network topology and parameters simultaneously with the aim of achieving desired accuracy with less complicated networks. The performance of the proposed approach is compared with conventional back-propagation networks using several synthetic functions, with better results in the case of the former. The proposed algorithm is also implemented on slope stability problem to estimate the critical factor of safety. Based on the results obtained, the proposed self evolving network produced a better estimate of critical safety factor in comparison to conventional BPN network.
Abstract: The aim of research project is to evaluate quantity and
quality for conjunctive use of groundwater and surface water in lower
in the Lower Nam Kam area, Thailand, even though there have been
hints of saline soil and water. The mathematical model named
WUSMO and MIKE Basin were applied for the calculation of crop
water utilization. Results of the study showed that, in irrigation
command area, water consumption rely on various sources; rain water
21.56%, irrigation water 78.29%, groundwater and some small surface
storage 0.15%. Meanwhile, for non-irrigation command area, water
consumption depends on the Nam Kam and Nambang stream 42%,
rain water 36.75% and groundwater and some small surface storage
19.18%. Samples of surface water and groundwater were collected for
2 seasons. The criterion was determined for the assessment of suitable
water for irrigation. It was found that this area has very limited sources
of suitable water for irrigation.
Abstract: Engineered nanoparticles’ usage rapidly increased in
various applications in the last decade due to their unusual properties.
However, there is an ever increasing concern to understand their
toxicological effect in human health. Particularly, metal and metal
oxide nanoparticles have been used in various sectors including
biomedical, food and agriculture. But their impact on human health is
yet to be fully understood. In this present investigation, we assessed
the toxic effect of engineered nanoparticles (ENPs) including Ag,
MgO and Co3O4 nanoparticles (NPs) on human mesenchymal stem
cells (hMSC) adopting cell viability and cellular morphological
changes as tools The results suggested that silver NPs are more toxic
than MgO and Co3O4NPs. The ENPs induced cytotoxicity and
nuclear morphological changes in hMSC depending on dose. The cell
viability decreases with increase in concentration of ENPs. The
cellular morphology studies revealed that ENPs damaged the cells.
These preliminary findings have implications for the use of these
nanoparticles in food industry with systematic regulations.
Abstract: The Boundary Representation of a 3D manifold contains
FACES (connected subsets of a parametric surface S : R2 -!
R3). In many science and engineering applications it is cumbersome
and algebraically difficult to deal with the polynomial set and
constraints (LOOPs) representing the FACE. Because of this reason, a
Piecewise Linear (PL) approximation of the FACE is needed, which is
usually represented in terms of triangles (i.e. 2-simplices). Solving the
problem of FACE triangulation requires producing quality triangles
which are: (i) independent of the arguments of S, (ii) sensitive to the
local curvatures, and (iii) compliant with the boundaries of the FACE
and (iv) topologically compatible with the triangles of the neighboring
FACEs. In the existing literature there are no guarantees for the point
(iii). This article contributes to the topic of triangulations conforming
to the boundaries of the FACE by applying the concept of parameterindependent
Gabriel complex, which improves the correctness of the
triangulation regarding aspects (iii) and (iv). In addition, the article
applies the geometric concept of tangent ball to a surface at a point to
address points (i) and (ii). Additional research is needed in algorithms
that (i) take advantage of the concepts presented in the heuristic
algorithm proposed and (ii) can be proved correct.
Abstract: In this paper, a two factor scheme is proposed to
generate cryptographic keys directly from biometric data, which
unlike passwords, are strongly bound to the user. Hash value of the
reference iris code is used as a cryptographic key and its length
depends only on the hash function, being independent of any other
parameter. The entropy of such keys is 94 bits, which is much higher
than any other comparable system. The most important and distinct
feature of this scheme is that it regenerates the reference iris code by
providing a genuine iris sample and the correct user password. Since
iris codes obtained from two images of the same eye are not exactly
the same, error correcting codes (Hadamard code and Reed-Solomon
code) are used to deal with the variability. The scheme proposed here
can be used to provide keys for a cryptographic system and/or for
user authentication. The performance of this system is evaluated on
two publicly available databases for iris biometrics namely CBS and
ICE databases. The operating point of the system (values of False
Acceptance Rate (FAR) and False Rejection Rate (FRR)) can be set
by properly selecting the error correction capacity (ts) of the Reed-
Solomon codes, e.g., on the ICE database, at ts = 15, FAR is 0.096%
and FRR is 0.76%.
Abstract: Video watermarking is usually considered as watermarking of a set of still images. In frame-by-frame watermarking approach, each video frame is seen as a single watermarked image, so collusion attack is more critical in video watermarking. If the same or redundant watermark is used for embedding in every frame of video, the watermark can be estimated and then removed by watermark estimate remodolulation (WER) attack. Also if uncorrelated watermarks are used for every frame, these watermarks can be washed out with frame temporal filtering (FTF). Switching watermark system or so-called SS-N system has better performance against WER and FTF attacks. In this system, for each frame, the watermark is randomly picked up from a finite pool of watermark patterns. At first SS-N system will be surveyed and then a new collusion attack for SS-N system will be proposed using a new algorithm for separating video frame based on watermark pattern. So N sets will be built in which every set contains frames carrying the same watermark. After that, using WER attack in every set, N different watermark patterns will be estimated and removed later.
Abstract: This paper provides the design steps of a robust Linear
Matrix Inequality (LMI) based iterative multivariable PID controller
whose duty is to drive a sample power system that comprises a
synchronous generator connected to a large network via a step-up
transformer and a transmission line. The generator is equipped with
two control-loops, namely, the speed/power (governor) and voltage
(exciter). Both loops are lumped in one where the error in the
terminal voltage and output active power represent the controller
inputs and the generator-exciter voltage and governor-valve position
represent its outputs. Multivariable PID is considered here because of
its wide use in the industry, simple structure and easy
implementation. It is also preferred in plants of higher order that
cannot be reduced to lower ones. To improve its robustness to
variation in the controlled variables, H∞-norm of the system transfer
function is used. To show the effectiveness of the controller, divers
tests, namely, step/tracking in the controlled variables, and variation
in plant parameters, are applied. A comparative study between the
proposed controller and a robust H∞ LMI-based output feedback is
given by its robustness to disturbance rejection. From the simulation
results, the iterative multivariable PID shows superiority.
Abstract: Many researchers are working on information hiding
techniques using different ideas and areas to hide their secrete data.
This paper introduces a robust technique of hiding secret data in
image based on LSB insertion and RSA encryption technique. The
key of the proposed technique is to encrypt the secret data. Then the
encrypted data will be converted into a bit stream and divided it into
number of segments. However, the cover image will also be divided
into the same number of segments. Each segment of data will be
compared with each segment of image to find the best match
segment, in order to create a new random sequence of segments to be
inserted then in a cover image. Experimental results show that the
proposed technique has a high security level and produced better
stego-image quality.
Abstract: In parallel, broadcasting has changed rapidly with the
changing of the world at the same area. Broadcasting is also
influenced and reshaped in terms of the emergence of new
communication technologies. These developments have resulted a lot
of economic and social consequences. The most important
consequences of these results are those of the powers of the
governments to control over the means of communication and control
mechanisms related to the descriptions of the new issues. For this
purpose, autonomous and independent regulatory bodies have been
established by the state. One of these regulatory bodies is the Radio
and Television Supreme Council, which to be established in 1994,
with the Code no 3984. Today’s Radio and Television Supreme
Council which is responsible for the regulation of the radio and
television broadcasts all across Turkey has an important and effective
position as autonomous and independent regulatory body. The Radio
and Television Supreme Council acts as being a remarkable organizer
for a sensitive area of radio and television broadcasting on one hand,
and the area of democratic, liberal and keep in mind the concept of
the public interest by putting certain principles for the functioning of
the Board control, in the context of media policy as one of the central
organs, on the other hand.
In this study, the role of the Radio and Television Supreme
Council is examined in accordance with the Code no 3894 in order to
control over the communication and control mechanisms as well as
the examination of the changes in the duties of the Code No. 6112,
dated 2011.
Abstract: The IEEE 802.11e which is an enhanced version of the 802.11 WLAN standards incorporates the Quality of Service (QoS) which makes it a better choice for multimedia and real time applications. In this paper we study various aspects concerned with 802.11e standard. Further, the analysis results for this standard are compared with the legacy 802.11 standard. Simulation results show that IEEE 802.11e out performs legacy IEEE 802.11 in terms of quality of service due to its flow differentiated channel allocation and better queue management architecture. We also propose a method to improve the unfair allocation of bandwidth for downlink and uplink channels by varying the medium access priority level.
Abstract: A prototype for audio and video capture and compression in real time on a Linux platform has been developed. It is able to visualize both the captured and the compressed video at the same time, as well as the captured and compressed audio with the goal of comparing their quality. As it is based on free code, the final goal is to run it in an embedded system running Linux. Therefore, we would implement a node to capture and compress such multimedia information. Thus, it would be possible to consider the project within a larger one aimed at live broadcast of audio and video using a streaming server which would communicate with our node. Then, we would have a very powerful and flexible system with several practical applications.
Abstract: In this paper we have proposed a methodology to
develop an amperometric biosensor for the analysis of glucose
concentration using a simple microcontroller based data acquisition
system. The work involves the development of Detachable
Membrane Unit (enzyme based biomembrane) with immobilized
glucose oxidase on the membrane and interfacing the same to the
signal conditioning system. The current generated by the biosensor
for different glucose concentrations was signal conditioned, then
acquired and computed by a simple AT89C51-microcontroller. The
optimum operating parameters for the better performance were found
and reported. The detailed performance evaluation of the biosensor
has been carried out. The proposed microcontroller based biosensor
system has the sensitivity of 0.04V/g/dl, with a resolution of
50mg/dl. It has exhibited very good inter day stability observed up to
30 days. Comparing to the reference method such as HPLC, the
accuracy of the proposed biosensor system is well within ± 1.5%.
The system can be used for real time analysis of glucose
concentration in the field such as, food and fermentation and clinical
(In-Vitro) applications.