Abstract: Magnesium wastes are produced by many industrial activities. This waste problem is becoming a future problem for the world. Magnesium borates have many advantages such as; high corrosion resistance, heat resistance, high coefficient of elasticity and can also be used in the production of material against radiation. Addition, magnesium borates have great potential in sectors
including ceramic and detergents industry and superconducting materials.
In this study, using the starting materials of waste magnesium and H3BO3 the hydrothermal method was applied at a moderate
temperature of 70oC. Several mole ratios of waste magnesium to H3BO3 are selected as; 1:2, 1:4, 1:6, 1:8, 1:10. Reaction time was determined as 1 hour. After the synthesis, X-Ray Diffraction (XRD) and Fourier Transform Infrared Spectroscopy (FT-IR) techniques are applied to products. As a result the forms of mcallisterite “Mg2(B6O7(OH)6)2.9(H2O)”, admontite “MgO(B2O3)3.7(H2O)” and magnesium boron hydrate (MgO(B2O3)3.6(H2O)” are obtained.
Abstract: In this study, a comparison of two control methods,
Proportional Control (PC) and Fuzzy Logic Control (FLC), which
have been used to develop an ideal thermoelectric renal hypothermia
system in order to use in renal surgery, has been carried out. Since
the most important issues in long-lasting parenchymatous renal
surgery are to provide an operation medium free of blood and to
prevent renal dysfunction in the postoperative period, control of the
temperature has become very important in renal surgery. The final
product is seriously affected from the changes in temperature,
therefore, it is necessary to reach some desired temperature points
quickly and avoid large overshoot. PIC16F877 microcontroller has
been used as controller for both of these two methods. Each control
method can simply ensure extra renal hypothermia in the targeted
way. But investigation of advantages and disadvantages of every
control method to each other is aimed and carried out by the
experimental implementations. Shortly, investigation of the most
appropriate method to use for development of system and that can be
applied to people safely in the future, has been performed. In this
sense, experimental results show that fuzzy logic control gives out
more reliable responses and efficient performance.
Abstract: In data mining, the association rules are used to search
for the relations of items of the transactions database. Following the
data is collected and stored, it can find rules of value through
association rules, and assist manager to proceed marketing strategy
and plan market framework. In this paper, we attempt fuzzy partition
methods and decide membership function of quantitative values of
each transaction item. Also, by managers we can reflect the
importance of items as linguistic terms, which are transformed as
fuzzy sets of weights. Next, fuzzy weighted frequent pattern growth
(FWFP-Growth) is used to complete the process of data mining. The
method above is expected to improve Apriori algorithm for its better
efficiency of the whole association rules. An example is given to
clearly illustrate the proposed approach.
Abstract: The characterization and modeling of the dynamic
behavior of many built-up structures under vibration conditions is still
a subject of current research. The present study emphasizes the
theoretical investigation of slip damping in layered and jointed
welded cantilever structures using finite element approach.
Application of finite element method in damping analysis is relatively
recent, as such, some problems particularly slip damping analysis has
not received enough attention. To validate the finite element model
developed, experiments have been conducted on a number of mild
steel specimens under different initial conditions of vibration. Finite
element model developed affirms that the damping capacity of such
structures is influenced by a number of vital parameters such as;
pressure distribution, kinematic coefficient of friction and micro-slip
at the interfaces, amplitude, frequency of vibration, length and
thickness of the specimen. Finite element model developed can be
utilized effectively in the design of machine tools, automobiles,
aerodynamic and space structures, frames and machine members for
enhancing their damping capacity.
Abstract: An exploration in the competency of the optical
multilevel Mapping Multiplexing Technique (MMT) system in
tolerating to the impact of nonlinearities as Self Phase Modulation
(SPM) during the presence of dispersion compensation methods. The
existence of high energy pulses stimulates deterioration in the chirp
compression process attained by SPM which introduces an upper
power boundary limit. An evaluation of the post and asymmetric prepost
fiber compensation methods have been deployed on the MMT
system compared with others of the same bit rate modulation formats.
The MMT 40 Gb/s post compensation system has 1.4 dB
enhancements to the 40 Gb/s 4-Arysystem and less than 3.9 dB
penalty compared to the 40 Gb/s OOK-RZsystem. However, the
optimized Pre-Post asymmetric compensation has an enhancement of
4.6 dB compared to the Post compensation MMT configuration for a
30% pre compensation dispersion.
Abstract: The direct synthesis process of dimethyl ether (DME)
from syngas in slurry reactors is considered to be promising because
of its advantages in caloric transfer. In this paper, the influences of
operating conditions (temperature, pressure and weight hourly space
velocity) on the conversion of CO, selectivity of DME and methanol
were studied in a stirred autoclave over Cu-Zn-Al-Zr slurry catalyst,
which is far more suitable to liquid phase dimethyl ether synthesis
process than bifunctional catalyst commercially. A Langmuir-
Hinshelwood mechanism type global kinetics model for liquid phase
DME direct synthesis based on methanol synthesis models and a
methanol dehydration model has been investigated by fitting our
experimental data. The model parameters were estimated with
MATLAB program based on general Genetic Algorithms and
Levenberg-Marquardt method, which is suitably fitting experimental
data and its reliability was verified by statistical test and residual
error analysis.
Abstract: This qualitative, quantitative mixed-method study explores how students- motivation and interest in creative hands-on activities affected their conceptual understanding of science. The objectives of this research include developing a greater understanding about how creative activities, incorporated into the classroom as instructional strategies, increase student motivation and their learning or mastery of science concepts. The creative activities are viewed as a motivational tool, a specific type of task, which have an impact on student goals. Pre-and-post tests, pre-and-post interviews, and student responses measure motivational-goal theory variables, interest in the activity, and conceptual change. Implications for education and future research will be discussed.
Abstract: The international society focuses on the environment
protection and natural energy sources control for the global
cooperation against weather change and sustainable growth. The study
presents the overview of the water shortage status and the necessity of wastewater reuse facility in military facilities and for the possibility of
the introduction, compares the economics by means of cost-benefit
analysis. The military features such as the number of users of military barracks and the water use were surveyed by the design principles by
facility types, the application method of wastewater reuse facility was selected, the feed water, its application and the volume of reuse volume were defined and the expectation was estimated, confirming
the possibility of introducing a wastewater reuse possibility by means of cost-benefit analysis.
Abstract: HIV-1 genome is highly heterogeneous. Due to this
variation, features of HIV-I genome is in a wide range. For this
reason, the ability to infection of the virus changes depending on
different chemokine receptors. From this point of view, R5 HIV
viruses use CCR5 coreceptor while X4 viruses use CXCR5 and
R5X4 viruses can utilize both coreceptors. Recently, in
Bioinformatics, R5X4 viruses have been studied to classify by using
the experiments on HIV-1 genome.
In this study, R5X4 type of HIV viruses were classified using
Auto Regressive (AR) model through Artificial Neural Networks
(ANNs). The statistical data of R5X4, R5 and X4 viruses was
analyzed by using signal processing methods and ANNs. Accessible
residues of these virus sequences were obtained and modeled by AR
model since the dimension of residues is large and different from
each other. Finally the pre-processed data was used to evolve various
ANN structures for determining R5X4 viruses. Furthermore ROC
analysis was applied to ANNs to show their real performances. The
results indicate that R5X4 viruses successfully classified with high
sensitivity and specificity values training and testing ROC analysis
for RBF, which gives the best performance among ANN structures.
Abstract: Urban planning, in particular on protected landscape
areas, demands an increasing role of public participation within the
frame of the efficiency of sustainable planning process. The
development of urban planning actions in Protected Landscape areas,
as Sintra-Cascais Natural Park, should perform a methodological
process that is structured over distinct sequential stages, providing
the development of a continuous, interactive, integrated and
participative planning. From the start of Malveira da Serra and Janes
Plan process, several public participation actions were promoted, in
order to involve the local agents, stakeholders and the population in
the decision of specific local key issues and define the appropriate
priorities within the goals and strategies previously settled. As a
result, public participation encouraged an innovative process that
guarantees the efficiency of sustainable urban planning and promotes
a sustainable new way of living in community.
Abstract: Most of researches for conventional simulations were
studied focusing on flocks with a single species. While there exist the
flocking behaviors with a single species in nature, the flocking
behaviors are frequently observed with multi-species. This paper
studies on the flocking simulation for heterogeneous agents. In order
to simulate the flocks for heterogeneous agents, the conventional
method uses the identifier of flock, while the proposed method defines
the feature vector of agent and uses the similarity between agents by
comparing with those feature vectors. Based on the similarity, the
paper proposed the attractive force and repulsive force and then
executed the simulation by applying two forces. The results of
simulation showed that flock formation with heterogeneous agents is
very natural in both cases. In addition, it showed that unlike the
existing method, the proposed method can not only control the density
of the flocks, but also be possible for two different groups of agents to
flock close to each other if they have a high similarity.
Abstract: In this paper we present a substantiation of a new
Laguerre-s type iterative method for solving of a nonlinear
polynomial equations systems with real coefficients. The problems of
its implementation, including relating to the structural choice of
initial approximations, were considered. Test examples demonstrate
the effectiveness of the method at the solving of many practical
problems solving.
Abstract: ZnO nanostructure were synthesized via microwave
method using zinc acetate as starting material, guanidinium as
structure directing agents, and water as solvent.. This work
investigates the photodegradation of azo dyes using the ZnO Flowerlike
in aqueous solutions. As synthesized ZnO samples were
characterized using X-Ray powder diffraction (XRD), scanning
electron microscopy (SEM), and FTIR spectroscopy.In this work
photodecolorization of congored azo dye under UV irradiation by
nano ZnO was studied.
Abstract: Language Reforms and potential use of ICTs has been a focal area of Higher Education Commission of Pakistan. Efforts are being accelerated to incorporate fast expanding ICTs to bring qualitative improvement in language instruction in higher education. This paper explores how university teachers are benefitting from ICTs to make their English class effective and what type of problems they face in practicing ICTs during their lectures. An in-depth qualitative study was employed to understand why language teachers tend to use ICTs in their instruction and how they are practicing it. A sample of twenty teachers from five universities located in Islamabad, three from public sector and two from private sector, was selected on non-random (Snowball) sampling basis. An interview with 15 semi-structured items was used as research instruments to collect data. The findings reveal that business English teaching is facilitated and improved through the use of ICTs. The language teachers need special training regarding the practices and implementation of ICTs. It is recommended that initiatives might be taken to equip university language teachers with modern methodology incorporating ICTs as focal area and efforts might be made to remove barriers regarding the training of language teachers and proper usage of ICTs.
Abstract: In wireless and mobile communications, this progress
provides opportunities for introducing new standards and improving
existing services. Supporting multimedia traffic with wireless networks
quality of service (QoS). In this paper, a grey-fuzzy controller for radio
resource management (GF-RRM) is presented to maximize the number
of the served calls and QoS provision in wireless networks. In a
wireless network, the call arrival rate, the call duration and the
communication overhead between the base stations and the control
center are vague and uncertain. In this paper, we develop a method to
predict the cell load and to solve the RRM problem based on the
GF-RRM, and support the present facility has been built on the
application-level of the wireless networks. The GF-RRM exhibits the
better adaptability, fault-tolerant capability and performance than other
algorithms. Through simulations, we evaluate the blocking rate, update
overhead, and channel acquisition delay time of the proposed method.
The results demonstrate our algorithm has the lower blocking rate, less
updated overhead, and shorter channel acquisition delay.
Abstract: Intrusion detection systems (IDS)are crucial components
of the security mechanisms of today-s computer systems.
Existing research on intrusion detection has focused on sequential
intrusions. However, intrusions can also be formed by concurrent
interactions of multiple processes. Some of the intrusions caused
by these interactions cannot be detected using sequential intrusion
detection methods. Therefore, there is a need for a mechanism that
views the distributed system as a whole. L-BIDS (Lattice-Based
Intrusion Detection System) is proposed to address this problem. In
the L-BIDS framework, a library of intrusions and distributed traces
are represented as lattices. Then these lattices are compared in order
to detect intrusions in the distributed traces.
Abstract: The fluid flow and the properties of the hydraulic
fluid inside a torque converter are the main topics of interest in this
research. The primary goal is to investigate the applicability of
various viscous fluids inside the torque converter. The Taguchi
optimization method is adopted to analyse the fluid flow in a torque
converter from a design perspective. Calculations are conducted in
maximizing the pressure since greater the pressure, greater the torque
developed. Using the values of the S/N ratios obtained, graphs are
plotted. Computational Fluid Dynamics (CFD) analysis is also
conducted.
Abstract: In this paper we apply one of approaches in category of heuristic methods as Genetic Algorithms for obtaining approximate solution of optimal control problems. The firs we convert optimal control problem to a quasi Assignment Problem by defining some usual characters as defined in Genetic algorithm applications. Then we obtain approximate optimal control function as an piecewise constant function. Finally the numerical examples are given.
Abstract: Objective: The objective of this paper is to assess the
hospitals preparedness for emergency using WHO standards.
Method: This is a cross-sectional study, consisted of site visit,
questionnaire survey, 16 health facilities were included. The WHO
standard for emergency preparedness of health facilities was used to
evaluate and assess the hospitals preparedness of health facilities.
Result: 13 hospitals were responded. They scored below average
in all measure >75%), while above average score was in 7 out 9 nine
measure with a range of 8%-25%. Un acceptable below average was
noted in two measures only.
Discussion: The biggest challenge facing the hospitals in their
emergency intervention is the lack of pre-emergency and emergency
preparedness plans as well as the coordination of the hospitals
response mechanisms.
Conclusion: The studied hospitals presently are far from
international disasters preparedness protocols. That necessitates
improvements in emergency preparedness, as well as in physician
skills for injury management.
Abstract: At present, dictionary attack has been the basic tool for
recovering key passwords. In order to avoid dictionary attack, users
purposely choose another character strings as passwords. According to
statistics, about 14% of users choose keys on a keyboard (Kkey, for
short) as passwords. This paper develops a framework system to attack
the password chosen from Kkeys and analyzes its efficiency. Within
this system, we build up keyboard rules using the adjacent and parallel
relationship among Kkeys and then use these Kkey rules to generate
password databases by depth-first search method. According to the
experiment results, we find the key space of databases derived from
these Kkey rules that could be far smaller than the password databases
generated within brute-force attack, thus effectively narrowing down
the scope of attack research. Taking one general Kkey rule, the
combinations in all printable characters (94 types) with Kkey adjacent
and parallel relationship, as an example, the derived key space is about
240 smaller than those in brute-force attack. In addition, we
demonstrate the method's practicality and value by successfully
cracking the access password to UNIX and PC using the password
databases created