Abstract: In this study which has been conducted in Akçasu
Forest Range District of Devrek Forest Directorate; 3 methods (weed
control with labourer power, cover removal with Hitachi F20
Excavator, and weed control with agricultural equipment mounted on
a Ferguson 240S agriculture tractor) were utilized in weed control
efforts in regeneration of degraded oriental beech forests have been
compared. In this respect, 3 methods have been compared by
determining certain work hours and standard durations of unit areas
(1 hectare). For this purpose, evaluating the tasks made with human
and machine force from the aspects of duration, productivity and
costs, it has been aimed to determine the most productive method in
accordance with the actual ecological conditions of research field.
Within the scope of the study, the time studies have been conducted
for 3 methods used in weed control efforts. While carrying out those
studies, the performed implementations have been evaluated by
dividing them into business stages. Also, the actual data have been
used while calculating the cost accounts. In those calculations, the
latest formulas and equations which are also used in developed
countries have been utilized. The variance of analysis (ANOVA) was
used in order to determine whether there is any statistically
significant difference among obtained results, and the Duncan test
was used for grouping if there is significant difference. According to
the measurements and findings carried out within the scope of this
study, it has been found during living cover removal efforts in
regeneration efforts in demolished oriental beech forests that the
removal of weed layer in 1 hectare of field has taken 920 hours with
labourer force, 15.1 hours with excavator and 60 hours with an
equipment mounted on a tractor. On the other hand, it has been
determined that the cost of removal of living cover in unit area (1
hectare) was 3220.00 TL for labourer power, 1250 TL for excavator
and 1825 TL for equipment mounted on a tractor.
According to the obtained results, it has been found that the
utilization of excavator in weed control effort in regeneration of
degraded oriental beech regions under actual ecological conditions of
research field has been found to be more productive from both of
aspects of duration and costs. These determinations carried out
should be repeated in weed control efforts in degraded forest fields
with different ecological conditions, it is compulsory for finding the
most efficient weed control method. These findings will light the way
of technical staff of forestry directorate in determination of the most
effective and economic weed control method. Thus, the more actual
data will be used while preparing the weed control budgets, and there
will be significant contributions to national economy. Also the results of this and similar studies are very important for developing the policies for our forestry in short and long term.
Abstract: Liposome plays an important role in medical and
pharmaceutical science as e.g. nano scale drug carriers. Liposomes
are vesicles of varying size consisting of a spherical lipid bilayer and
an aqueous inner compartment. Magnet-driven liposome used for the
targeted delivery of drugs to organs and tissues. These liposome
preparations contain encapsulated drug components and finely
dispersed magnetic particles.
Liposomes are vesicles of varying size consisting of a spherical
lipid bilayer and an aqueous inner compartment that are generated in
vitro. These are useful in terms of biocompatibility, biodegradability,
and low toxicity, and can control biodistribution by changing the size,
lipid composition, and physical characteristics. Furthermore,
liposomes can entrap both hydrophobic and hydrophilic drugs and are
able to continuously release the entrapped substrate, thus being useful
drug carriers. Magnetic liposomes (MLs) are phospholipid vesicles
that encapsulate magneticor paramagnetic nanoparticles. They are
applied as contrast agents for magnetic resonance imaging (MRI).
The biological synthesis of nanoparticles using plant extracts plays
an important role in the field of nanotechnology. Green-synthesized
magnetite nanoparticles-protein hybrid has been produced by treating
Iron (III) / Iron (II) chloride with the leaf extract of Datura inoxia.
The phytochemicals present in the leaf extracts act as a reducing as
well stabilizing agents preventing agglomeration, which include
flavonoids, phenolic compounds, cardiac glycosides, proteins and
sugars.
The magnetite nanoparticles-protein hybrid has been trapped
inside the aqueous core of the liposome prepared by reversed phase
evaporation (REV) method using oleic and linoleic acid which has
been shown to be driven under magnetic field confirming the
formation magnetic liposome (ML). Chemical characterization of
stealth magnetic liposome has been performed by breaking the
liposome and release of magnetic nanoparticles. The presence iron
has been confirmed by colour complex formation with KSCN and
UV-Vis study using spectrophotometer Cary 60, Agilent.
This magnet driven liposome using nanoparticles-protein hybrid
can be a smart vesicles for the targeted drug delivery.
Abstract: Over the last few decades, oilfield service rolling
equipment has significantly increased in weight, primarily because of
emissions regulations, which require larger/heavier engines, larger
cooling systems, and emissions after-treatment systems, in some
cases, etc. Larger engines cause more vibration and shock loads,
leading to failure of electronics and control systems.
If the vibrating frequency of the engine matches the system
frequency, high resonance is observed on structural parts and mounts.
One such existing automated control equipment system comprising
wire rope mounts used for mounting computers was designed
approximately 12 years ago. This includes the use of an industrialgrade
computer to control the system operation. The original
computer had a smaller, lighter enclosure. After a few years, a newer
computer version was introduced, which was 10 lbm heavier. Some
failures of internal computer parts have been documented for cases in
which the old mounts were used. Because of the added weight, there
is a possibility of having the two brackets impact each other under
off-road conditions, which causes a high shock input to the computer
parts. This added failure mode requires validating the existing mount
design to suit the new heavy-weight computer.
This paper discusses the modal finite element method (FEM)
analysis and experimental modal analysis conducted to study the
effects of vibration on the wire rope mounts and the computer. The
existing mount was modelled in ANSYS software, and resultant
mode shapes and frequencies were obtained. The experimental modal
analysis was conducted, and actual frequency responses were
observed and recorded.
Results clearly revealed that at resonance frequency, the brackets
were colliding and potentially causing damage to computer parts. To
solve this issue, spring mounts of different stiffness were modeled in
ANSYS software, and the resonant frequency was determined.
Increasing the stiffness of the system increased the resonant
frequency zone away from the frequency window at which the engine
showed heavy vibrations or resonance. After multiple iterations in
ANSYS software, the stiffness of the spring mount was finalized,
which was again experimentally validated.
Abstract: Many wireless sensor network applications require
K-coverage of the monitored area. In this paper, we propose a
scalable harmony search based algorithm in terms of execution
time, K-Coverage Enhancement Algorithm (KCEA), it attempts to
enhance initial coverage, and achieve the required K-coverage degree
for a specific application efficiently. Simulation results show that
the proposed algorithm achieves coverage improvement of 5.34%
compared to K-Coverage Rate Deployment (K-CRD), which achieves
1.31% when deploying one additional sensor. Moreover, the proposed
algorithm is more time efficient.
Abstract: Background: Taiwan now is an aging society. Research
on the elderly should not be confined to caring for seniors, but should
also be focused on ways to improve health and the quality of life.
Senior citizens who participate in volunteer services could become
less lonely, have new growth opportunities, and regain a sense of
accomplishment. Thus, the question of how to get the elderly to
participate in volunteer service is worth exploring. Objective: Apply
the Transtheoretical Model to understand stages of change in regular
volunteer service and voluntary service behaviour among the seniors.
Methods: 1525 adults over the age of 65 from the Renai district of
Keelung City were interviewed. The research tool was a
self-constructed questionnaire, and individual interviews were
conducted to collect data. Then the data was processed and analyzed
using the IBM SPSS Statistics 20 (Windows version) statistical
software program. Results: In the past six months, research subjects
averaged 9.92 days of volunteer services. A majority of these elderly
individuals had no intention to change their regular volunteer services.
We discovered that during the maintenance stage, the self-efficacy for
volunteer services was higher than during all other stages, but
self-perceived barriers were less during the preparation stage and
action stage. Self-perceived benefits were found to have an important
predictive power for those with regular volunteer service behaviors in
the previous stage, and self-efficacy was found to have an important
predictive power for those with regular volunteer service behaviors in
later stages. Conclusions/Implications for Practice: The research
results support the conclusion that community nursing staff should
group elders based on their regular volunteer services change stages
and design appropriate behavioral change strategies.
Abstract: This paper provides a comparative study on the
performances of standard PID and adaptive PID controllers tested on
travel angle of a 3-Degree-of-Freedom (3-DOF) Quanser bench-top
helicopter. Quanser, a well-known manufacturer of educational
bench-top helicopter has developed Proportional Integration
Derivative (PID) controller with Linear Quadratic Regulator (LQR)
for all travel, pitch and yaw angle of the bench-top helicopter. The
performance of the PID controller is relatively good; however, its
performance could also be improved if the controller is combined
with adaptive element. The objective of this research is to design
adaptive PID controller and then compare the performances of the
adaptive PID with the standard PID. The controller design and test is
focused on travel angle control only. Adaptive method used in this
project is self-tuning controller, which controller’s parameters are
updated online. Two adaptive algorithms those are pole-placement
and deadbeat have been chosen as the method to achieve optimal
controller’s parameters. Performance comparisons have shown that
the adaptive (deadbeat) PID controller has produced more desirable
performance compared to standard PID and adaptive (poleplacement).
The adaptive (deadbeat) PID controller attained very fast
settling time (5 seconds) and very small percentage of overshoot (5%
to 7.5%) for 10° to 30° step change of travel angle.
Abstract: Periventricular Leukomalacia (PVL) is a White Matter
Injury (WMI) of preterm neonatal brain. Objectives of the study were
to assess the neuro-developmental outcome at one year of age and to
determine a good protocol of cranial ultrasonography to detect PVL.
Two hundred and sixty four preterm neonates were included in the
study. Series of cranial ultrasound scans were done by using a
dedicated neonatal head probe 4-10 MHz of Logic e portable
ultrasound scanner. Clinical history of seizures, abnormal head
growth (hydrocephalus or microcephaly) and developmental
milestones were assessed and neurological examinations were done
until one year of age. Among live neonates, 57% who had cystic PVL
(Grades 2 and 3) manifested as cerebral palsy. In conclusion cystic
PVL has permanent neurological disabilities like cerebral palsy.
Good protocol of real time cranial ultrasonography to detect PVL is
to perform scans at least once a week until one month and at term (40
weeks of gestation).
Abstract: Science and technology has a major impact on many
societal domains such as communication, medicine, food,
transportation, etc. However, this dominance of modern technology
can have a negative unintended impact on indigenous systems, and in
particular on indigenous foods. This problem serves as a motivation
to this study whose aim is to examine the perceptions of learners on
the usefulness of Information and Communication Technologies
(ICTs) for learning about indigenous foods. This aim will be
subdivided into two types of research objectives. The design and
identification of theories and models will be achieved using literature
content analysis. The objective on the empirical testing of such
theories and models will be achieved through the survey of
Hospitality studies learners from different schools in the iLembe and
Umgungundlovu Districts of the South African Kwazulu-Natal
province. SPSS is used to quantitatively analyze the data collected by
the questionnaire of this survey using descriptive statistics and
Pearson correlations after the assessment of the validity and the
reliability of the data. The main hypothesis behind this study is that
there is a connection between the demographics of learners, their
perceptions on the usefulness of ICTs for learning about indigenous
foods, and the following personality and eLearning related theories
constructs: Computer self-efficacy, Trust in ICT systems, and
Conscientiousness; as suggested by existing studies on learning
theories. This hypothesis was fully confirmed by the survey
conducted by this study except for the demographic factors where
gender and age were not found to be determinant factors of learners’
perceptions on the usefulness of ICTs for learning about indigenous
foods.
Abstract: Cross flow water tube heat exchanger can be designed
and made operational using methods of model building and
simulation of the system. This paper projects the design and
development of a model of cross flow water tube heat-exchanger
system, simulation and validation of control analysis of different
tuning methods. Feedback and override control system is developed
using inputs acquired with the help of sensory system. A
mathematical model is formulated for analysis of system behaviour.
The temperature is regulated at the desired set point automatically.
Abstract: Nowadays, Photovoltaic-PV Farms/ Parks and large
PV-Smart Grid Interface Schemes are emerging and commonly
utilized in Renewable Energy distributed generation. However, PVhybrid-
Dc-Ac Schemes using interface power electronic converters
usually has negative impact on power quality and stabilization of
modern electrical network under load excursions and network fault
conditions in smart grid. Consequently, robust FACTS based
interface schemes are required to ensure efficient energy utilization
and stabilization of bus voltages as well as limiting switching/fault
onrush current condition. FACTS devices are also used in smart grid-
Battery Interface and Storage Schemes with PV-Battery Storage
hybrid systems as an elegant alternative to renewable energy
utilization with backup battery storage for electric utility energy and
demand side management to provide needed energy and power
capacity under heavy load conditions. The paper presents a robust
interface PV-Li-Ion Battery Storage Interface Scheme for
Distribution/Utilization Low Voltage Interface using FACTS
stabilization enhancement and dynamic maximum PV power tracking
controllers.
Digital simulation and validation of the proposed scheme is done
using MATLAB/Simulink software environment for Low Voltage-
Distribution/Utilization system feeding a hybrid Linear-Motorized
inrush and nonlinear type loads from a DC-AC Interface VSC-6-
pulse Inverter Fed from the PV Park/Farm with a back-up Li-Ion
Storage Battery.
Abstract: In this work, neural networks methods MLP type were
applied to a database from an array of six sensors for the detection of
three toxic gases. The choice of the number of hidden layers and the
weight values are influential on the convergence of the learning
algorithm. We proposed, in this article, a mathematical formula to
determine the optimal number of hidden layers and good weight
values based on the method of back propagation of errors. The results
of this modeling have improved discrimination of these gases and
optimized the computation time. The model presented here has
proven to be an effective application for the fast identification of
toxic gases.
Abstract: Container handling problems at container terminals
are NP-hard problems. This paper presents an approach using
discrete-event simulation modeling to optimize solution for storage
space allocation problem, taking into account all various interrelated
container terminal handling activities. The proposed approach is
applied on a real case study data of container terminal at Alexandria
port. The computational results show the effectiveness of the
proposed model for optimization of storage space allocation in
container terminal where 54% reduction in containers handling time
in port is achieved.
Abstract: In this paper a new design of a broadband microwave
power limiter is presented and validated into simulation by using
ADS software (Advanced Design System) from Agilent technologies.
The final circuit is built on microstrip lines by using identical Zero
Bias Schottky diodes. The power limiter is designed by Associating 3
stages Schottky diodes. The obtained simulation results permit to
validate this circuit with a threshold input power level of 0 dBm until
a maximum input power of 30 dBm.
Abstract: The ad hoc networks are the future of wireless
technology as everyone wants fast and accurate error free information
so keeping this in mind Bit Error Rate (BER) and power is optimized
in this research paper by using the Genetic Algorithm (GA). The
digital modulation techniques used for this paper are Binary Phase
Shift Keying (BPSK), M-ary Phase Shift Keying (M-ary PSK), and
Quadrature Amplitude Modulation (QAM). This work is
implemented on Wireless Ad Hoc Networks (WLAN). Then it is
analyze which modulation technique is performing well to optimize
the BER and power of WLAN.
Abstract: In this paper, we present a robust algorithm to recognize extracted text from grocery product images captured by mobile phone cameras. Recognition of such text is challenging since text in grocery product images varies in its size, orientation,
style, illumination, and can suffer from perspective distortion.
Pre-processing is performed to make the characters scale and
rotation invariant. Since text degradations can not be appropriately
defined using well-known geometric transformations such
as translation, rotation, affine transformation and shearing, we
use the whole character black pixels as our feature vector.
Classification is performed with minimum distance classifier
using the maximum likelihood criterion, which delivers very
promising Character Recognition Rate (CRR) of 89%. We
achieve considerably higher Word Recognition Rate (WRR) of
99% when using lower level linguistic knowledge about product
words during the recognition process.
Abstract: In this paper, we present preconditioned generalized
accelerated overrelaxation (GAOR) methods for solving certain
nonsingular linear system. We compare the spectral radii of the
iteration matrices of the preconditioned and the original methods. The
comparison results show that the preconditioned GAOR methods
converge faster than the GAOR method whenever the GAOR method
is convergent. Finally, we give two numerical examples to confirm our
theoretical results.
Abstract: Taking the design tolerance into account, this paper
presents a novel efficient approach to generate iso-scallop tool path for
five-axis strip machining with a barrel cutter. The cutter location is
first determined on the scallop surface instead of the design surface,
and then the cutter is adjusted to locate the optimal tool position based
on the differential rotation of the tool axis and satisfies the design
tolerance simultaneously. The machining strip width and error are
calculated with the aid of the grazing curve of the cutter. Based on the
proposed tool positioning algorithm, the tool paths are generated by
keeping the scallop height formed by adjacent tool paths constant. An
example is conducted to confirm the validity of the proposed method.
Abstract: The IEEE 802.22 working group aims to drive the
Digital Video Broadcasting-Terrestrial (DVB-T) bands for data
communication to the rural area without interfering the TV broadcast.
In this paper, we arrive at a closed-form expression for average
detection probability of Fusion center (FC) with multiple antenna
over the κ − μ fading channel model. We consider a centralized
cooperative multiple antenna network for reporting. The DVB-T
samples forwarded by the secondary user (SU) were combined using
Maximum ratio combiner at FC, an energy detection is performed
to make the decision. The fading effects of the channel degrades
the detection probability of the FC, a generalized independent and
identically distributed (IID) κ − μ and an additive white Gaussian
noise (AWGN) channel is considered for reporting and sensing
respectively. The proposed system performance is verified through
simulation results.
Abstract: E-learning has become an efficient and widespread
means of education at all levels of human activities. Statistics is no
exception. Unfortunately the main focus in statistics teaching is
usually paid to the substitution in formulas. Suitable websites can
simplify and automate calculations and provide more attention and
time to the basic principles of statistics, mathematization of real-life
situations and following interpretation of results. We now introduce
our own web-site for hypothesis testing. Its didactic aspects, the
technical possibilities of the individual tools, the experience of use
and the advantages or disadvantages are discussed in this paper. This
web-site is not a substitute for common statistical software but should
significantly improve the teaching of statistics at universities.
Abstract: Securing the confidential data transferred via wireless
network remains a challenging problem. It is paramount to ensure
that data are accessible only by the legitimate users rather than by the
attackers. One of the most serious threats to organization is jamming,
which disrupts the communication between any two pairs of nodes.
Therefore, designing an attack-defending scheme without any packet
loss in data transmission is an important challenge. In this paper,
Dependence based Malicious Route Defending DMRD Scheme has
been proposed in multi path routing environment to prevent jamming
attack. The key idea is to defend the malicious route to ensure
perspicuous transmission. This scheme develops a two layered
architecture and it operates in two different steps. In the first step,
possible routes are captured and their agent dependence values are
marked using triple agents. In the second step, the dependence values
are compared by performing comparator filtering to detect malicious
route as well as to identify a reliable route for secured data
transmission. By simulation studies, it is observed that the proposed
scheme significantly identifies malicious route by attaining lower
delay time and route discovery time; it also achieves higher
throughput.