Abstract: Complex systems are composed of several plain interacting independent entities. Interaction between these entities creates a unified behavior at the global level that cannot be predicted by examining the behavior of any single individual component of the system. In this paper we consider a welded frame of an automobile trailer as a real example of Complex Technical Systems, The purpose of this paper is to introduce a Statistical method for predicting the life cycle of complex technical systems. To organize gathering of primary data for modeling the life cycle of complex technical systems an “Automobile Trailer Frame" were used as a prototype in this research. The prototype represents a welded structure of several pieces. Both information flows underwent a computerized analysis and classification for the acquisition of final results to reach final recommendations for improving the trailers structure and their operational conditions.
Abstract: The purposes of this study are 1) to study the over 20-year attempt of Mahakan fort community to negotiate with Bangkok Metropolitan Administration (BMA) to remain in their residential area belonging to the state, and 2) to apply the new social and cultural dimension between the state and the community as an alternative for local participation in keeping their residential area. This is a qualitative research, and the findings reveal that the community claimed their ancestors’ right as owners of this piece of land for over 200 years. The community, therefore, requested to take part in the preservation of land, culture and local intellect and the area management in terms of being a learning resource on the cultural road in Rattanakosin Island. However, BMA imposed the law concerning the community area relocation in Rattanakosin Island. The result of law enforcement led to the failure of the area relocation, and the hard hit on physical structure of the area including the overall deterioration of the cultural road renovated in the year 1982, the 200 years’ celebration of Bangkok. The enforcement of law by the state required the move of the community, and the landscape improvement based on the capital city plan. However, this enforcement resulted in the unending conflicts between the community and the state, and the solution of this problem was unclear. At the same time the community has spent a long time opposing the state’s action, and preparing themselves by administrating the community behind Mahakan fortress with community administrative committee under the suggestion of external organization by registering all community members, providing funds for community administration. At the meantime the state lacked the continuation of the enforcement due to political problem and BMA’s administration problem. It is, therefore, suggested that an alternative solution to this problem lie at the negotiation between the state and the community with the purpose of the collaboration between the two to develop the area under the protective law of each side.
Abstract: The Yazd-Ardakan basin in Central Iran has two separated aquifers. The shallow unconfined aquifer is supplies 40 Qanats. The deep saturated confined aquifer is the main water storage. Due to over-withdrawal, water table has been decreasing during last 25 years. Recent study shows that the shortage of the aquifer is about 16 meters and land subsidence is 0.5 - 1.2 meters. Long deep cracks are found just above the aquifer and devour the irrigation water and floods. Although the most cracks direction is NW-SE and could be compared to the main direction of YA basin, there is no direct evidence for relation between land subsidence and the huge cracks. Large-scale water pumping has been decreased the water pressure in aquifer. The pressure decline disturbed the balance and increased the pressure of overlying sediments. So porosity decreased and compaction started. Then, sediments compaction developed and made land subsidence and some huge cracks slowly.
Abstract: Large-scale systems such as Grids offer
infrastructures for both data distribution and parallel processing. The
use of Grid infrastructures is a more recent issue that is already
impacting the Distributed Database Management System industry. In
DBMS, distributed query processing has emerged as a fundamental
technique for ensuring high performance in distributed databases.
Database placement is particularly important in large-scale systems
because it reduces communication costs and improves resource
usage. In this paper, we propose a dynamic database placement
policy that depends on query patterns and Grid sites capabilities. We
evaluate the performance of the proposed database placement policy
using simulations. The obtained results show that dynamic database
placement can significantly improve the performance of distributed
query processing.
Abstract: Wireless sensor networks include small nodes which
have sensing ability; calculation and connection extend themselves
everywhere soon. Such networks have source limitation on
connection, calculation and energy consumption. So, since the nodes
have limited energy in sensor networks, the optimized energy
consumption in these networks is of more importance and has created
many challenges. The previous works have shown that by organizing
the network nodes in a number of clusters, the energy consumption
could be reduced considerably. So the lifetime of the network would
be increased. In this paper, we used the Queen-bee algorithm to
create energy efficient clusters in wireless sensor networks. The
Queen-bee (QB) is similar to nature in that the queen-bee plays a
major role in reproduction process. The QB is simulated with J-sim
simulator. The results of the simulation showed that the clustering by
the QB algorithm decreases the energy consumption with regard to
the other existing algorithms and increases the lifetime of the
network.
Abstract: Emerging adulthood, the new period which is
especially prevalent in the developed or industrialized countries
during ages 18 to 29, is a new conceptualization proposed by Arnett.
Intimacy is a superordinate concept which includes intimate
interaction and intimate relationship. This study includes two
proceses which are scale development and conduction of gender
differences about markers of starting romantic intimacy among
Turkish emerging adults. In first process, Markers of Starting
Romantic Intimacy Scale, with 17 items and 5 factors, was developed
using by 220 participants. In the second step, the scale was
administered to 318 Turkish male and female emerging adults
between ages 22 and 25. Results show that there is no significant
difference between gender and total score of the scale. With respect
to gender, there are significant differences between gender and in
four subscales which are self perception, affective and cognitive
intimacy, self knowledge and romantic verbalizations. Moreover,
there is no significant relationship between gender and behavioral
intimacy subscale.
Abstract: Due to their high power-to-weight ratio and low cost,
pneumatic actuators are attractive for robotics and automation
applications; however, achieving fast and accurate control of their
position have been known as a complex control problem. A
methodology for obtaining high position accuracy with a linear
pneumatic actuator is presented. During experimentation with a
number of PID classical control approaches over many operations of
the pneumatic system, the need for frequent manual re-tuning of the
controller could not be eliminated. The reason for this problem is
thermal and energy losses inside the cylinder body due to the
complex friction forces developed by the piston displacements.
Although PD controllers performed very well over short periods, it
was necessary in our research project to introduce some form of
automatic gain-scheduling to achieve good long-term performance.
We chose a fuzzy logic system to do this, which proved to be an
easily designed and robust approach. Since the PD approach showed
very good behaviour in terms of position accuracy and settling time,
it was incorporated into a modified form of the 1st order Tagaki-
Sugeno fuzzy method to build an overall controller. This fuzzy gainscheduler
uses an input variable which automatically changes the PD
gain values of the controller according to the frequency of repeated
system operations. Performance of the new controller was
significantly improved and the need for manual re-tuning was
eliminated without a decrease in performance. The performance of
the controller operating with the above method is going to be tested
through a high-speed web network (GRID) for research purposes.
Abstract: The aim of this work is to study the elastic transfer
phenomenon which takes place in the elastic scattering of 16O on 12C
at energies near the Coulomb barrier. Where, the angular distribution
decrease steadily with increasing the scattering angle, then the cross
section will increase at backward angles due to the α-transfer process.
This reaction was also studied at different energies for tracking the
nuclear rainbow phenomenon. The experimental data of the angular
distribution at these energies were compared to the calculation
predictions. The optical potential codes such as SPIVAL and
Distorted Wave Born Approximation (DWUCK5) were used in
analysis.
Abstract: In this paper, we construct and implement a new
Steganography algorithm based on learning system to hide a large
amount of information into color BMP image. We have used adaptive
image filtering and adaptive non-uniform image segmentation with
bits replacement on the appropriate pixels. These pixels are selected
randomly rather than sequentially by using new concept defined by
main cases with sub cases for each byte in one pixel. According to
the steps of design, we have been concluded 16 main cases with their
sub cases that covere all aspects of the input information into color
bitmap image. High security layers have been proposed through four
layers of security to make it difficult to break the encryption of the
input information and confuse steganalysis too. Learning system has
been introduces at the fourth layer of security through neural
network. This layer is used to increase the difficulties of the statistical
attacks. Our results against statistical and visual attacks are discussed
before and after using the learning system and we make comparison
with the previous Steganography algorithm. We show that our
algorithm can embed efficiently a large amount of information that
has been reached to 75% of the image size (replace 18 bits for each
pixel as a maximum) with high quality of the output.
Abstract: The study of the generated defects on manufactured
parts shows the difficulty to maintain parts in their positions during
the machining process and to estimate them during the pre-process
plan. This work presents a contribution to the development of 3D
models for the optimization of the manufacturing tolerances. An
experimental study allows the measurement of the defects of part
positioning for the determination of ε and the choice of an optimal
setup of the part. An approach of 3D tolerance based on the small
displacements method permits the determination of the
manufacturing errors upstream. A developed tool, allows an
automatic generation of the tolerance intervals along the three axes.
Abstract: Titanium alloys like the modern alloy Ti 6Al 2Sn 4Zr 6Mo (Ti-6246) combine excellent specific mechanical properties and corrosion resistance. On the other hand,due to their material characteristics, machining of these alloys is difficult to perform. The aim of the current study is the analyses of wear mechanisms of coated cemented carbide tools applied in orthogonal cutting experiments of Ti-6246 alloy. Round bars were machined with standard coated tools in dry conditions on a CNC latheusing a wide range of cutting speeds and cutting depths. Tool wear mechanisms were afterwards investigated by means of stereo microscopy, optical microscopy, confocal microscopy and scanning electron microscopy. Wear mechanisms included fracture of the tool tip (total failure) and abrasion. Specific wear features like crater wear, micro cracks and built-up edgeformation appeared depending of the mechanical and thermal conditions generated in the workpiece surface by the cutting action.
Abstract: Biological evolution has generated a rich variety of
successful solutions; from nature, optimized strategies can be
inspired. One interesting example is the ant colonies, which are able
to exhibit a collective intelligence, still that their dynamic is simple.
The emergence of different patterns depends on the pheromone trail,
leaved by the foragers. It serves as positive feedback mechanism for
sharing information.
In this paper, we use the dynamic of TASEP as a model of
interaction at a low level of the collective environment in the ant-s
traffic flow. This work consists of modifying the movement rules of
particles “ants" belonging to the TASEP model, so that it adopts with
the natural movement of ants. Therefore, as to respect the constraints
of having no more than one particle per a given site, and in order to
avoid collision within a bidirectional circulation, we suggested two
strategies: decease strategy and waiting strategy. As a third work
stage, this is devoted to the study of these two proposed strategies-
stability. As a final work stage, we applied the first strategy to the
whole environment, in order to get to the emergence of traffic flow,
which is a way of learning.
Abstract: Pentachlorophenol (PCP) is a polychlorinated
aromatic compound that is widespread in industrial effluents and is
considered to be a serious pollutant. Among the variety of industrial
effluents encountered, effluents from tanning industry are very
important and have a serious pollution potential. PCP is also formed
unintentionally in effluents of paper and pulp industries. It is highly
persistent in soils and is lethal to a wide variety of beneficial
microorganisms and insects, human beings and animals. The natural
processes that breakdown toxic chemicals in the environment have
become the focus of much attention to develop safe and environmentfriendly
deactivation technologies. Microbes and plants are among
the most important biological agents that remove and degrade waste
materials to enable their recycling in the environment. The present
investigation was carried out with the aim of developing a microbial
system for bioremediation of PCP polluted soils. A number of plant
species were evaluated for their ability to tolerate different
concentrations of pentachlorophenol (PCP) in the soil. The
experiment was conducted for 30 days under pot culture conditions.
The toxic effect of PCP on plants was studied by monitoring seed
germination, plant growth and biomass. As the concentration of PCP
was increased to 50 ppm, the inhibition of seed germination, plant
growth and biomass was also increased. Although PCP had a
negative effect on all plant species tested, maize and groundnut
showed the maximum tolerance to PCP. Other tolerating crops
included wheat, safflower, sunflower, and soybean. From the
rhizosphere soil of the tolerant seedlings, as many as twenty seven
PCP tolerant bacteria were isolated. From soybean, 8; sunflower, 3;
safflower 8; maize 2; groundnut and wheat, 3 each isolates were
made. They were screened for their PCP degradation potentials.
HPLC analyses of PCP degradation revealed that the isolate MAZ-2
degraded PCP completely. The isolate MAZ-1 was the next best
isolate with 90 per cent PCP degradation. These strains hold promise
to be used in the bioremediation of PCP polluted soils.
Abstract: In this paper we present a new approach to detecting a
flaw in T.O.F.D (Time Of Flight Diffraction) type ultrasonic image
based on texture features. Texture is one of the most important
features used in recognizing patterns in an image. The paper
describes texture features based on 2D Gabor functions, i.e.,
Gaussian shaped band-pass filters, with dyadic treatment of the radial
spatial frequency range and multiple orientations, which represent an
appropriate choice for tasks requiring simultaneous measurement in
both space and frequency domains. The most relevant features are
used as input data on a Fuzzy c-mean clustering classifier. The
classes that exist are only two: 'defects' or 'no defects'. The proposed
approach is tested on the T.O.F.D image achieved at the laboratory
and on the industrial field.
Abstract: For gamma radiation detection, assemblies having
scintillation crystals and a photomultiplier tube, also there is a
preamplifier connected to the detector because the signals from
photomultiplier tube are of small amplitude. After pre-amplification
the signals are sent to the amplifier and then to the multichannel
analyser. The multichannel analyser sorts all incoming electrical
signals according to their amplitudes and sorts the detected photons
in channels covering small energy intervals. The energy range of
each channel depends on the gain settings of the multichannel
analyser and the high voltage across the photomultiplier tube. The
exit spectrum data of the two main isotopes studied ,putting data in
biomass program ,process it by Matlab program to get the solid
holdup image (solid spherical nuclear fuel)
Abstract: The new semi-experimental method for simulation of
the turbine flow meters rotation in the transitional flow has been
developed. The method is based on the experimentally established
exponential low of changing of dimensionless relative turbine gas
meter rotation frequency and meter inertia time constant. For
experimental evaluation of the meter time constant special facility
has been developed. The facility ensures instant switching of turbine
meter under test from one channel to the other channel with different
flow rate and measuring the meter response. The developed method
can be used for evaluation and predication of the turbine meters
response and dynamic error in the transitional flow with any arbitrary
law of flow rate changing. The examples of the method application
are presented.
Abstract: The article examines the methods of protection of
citizens' personal data on the Internet using biometric identity
authentication technology. It`s celebrated their potential danger due
to the threat of loss of base biometric templates. To eliminate the
threat of compromised biometric templates is proposed to use neural
networks large and extra-large sizes, which will on the one hand
securely (Highly reliable) to authenticate a person by his biometrics,
and on the other hand make biometrics a person is not available for
observation and understanding. This article also describes in detail
the transformation of personal biometric data access code. It`s formed
the requirements for biometrics converter code for his work with the
images of "Insider," "Stranger", all the "Strangers". It`s analyzed the
effect of the dimension of neural networks on the quality of
converters mystery of biometrics in access code.
Abstract: The software system goes through a number of stages
during its life and a software process model gives a standard format
for planning, organizing and running a project. The article presents a
new software development process model named as “Divide and
Conquer Process Model", based on the idea first it divides the things
to make them simple and then gathered them to get the whole work
done. The article begins with the backgrounds of different software
process models and problems in these models. This is followed by a
new divide and conquer process model, explanation of its different
stages and at the end edge over other models is shown.
Abstract: In historical science and social science, the influence
of natural disaster upon society is a matter of great interest. In
recent years, some archives are made through many hands for natural
disasters, however it is inefficiency and waste. So, we suppose a
computer system to create a historical natural disaster archive. As
the target of this analysis, we consider newspaper articles. The news
articles are considered to be typical examples that prescribe the
temporal relations of affairs for natural disaster. In order to do this
analysis, we identify the occurrences in newspaper articles by some
index entries, considering the affairs which are specific to natural
disasters, and show the temporal relation between natural disasters.
We designed and implemented the automatic system of “extraction
of the occurrences of natural disaster" and “temporal relation table
for natural disaster."
Abstract: Exposure to radon occurs when breathing airborne
radon while using water: showering, washing dishes, cooking, and
drinking water that contain radon. The results of radon activity
measurements in water from public drinking fountain in city of Novi
Sad, Serbia is presented in this paper. Radon level in some samples
exceeded EPA (Environmental Protection Agency) recommendation
for maximum contaminant level (MCL) for radon in drinking water
of 11.1 Bq/l.