Abstract: FW4 is a newly developed hot die material widely
used in Forging Dies manufacturing. The right selection of the
machining conditions is one of the most important aspects to take
into consideration in the Electrical Discharge Machining (EDM) of
FW4. In this paper an attempt has been made to develop
mathematical models for relating the Material Removal Rate (MRR),
Tool Wear Ratio (TWR) and surface roughness (Ra) to machining
parameters (current, pulse-on time and voltage). Furthermore, a study
was carried out to analyze the effects of machining parameters in
respect of listed technological characteristics. The results of analysis
of variance (ANOVA) indicate that the proposed mathematical
models, can adequately describe the performance within the limits of
the factors being studied.
Abstract: The Institute of Product Development is dealing
with the development, design and dimensioning of micro components
and systems as a member of the Collaborative Research
Centre 499 “Design, Production and Quality Assurance of
Molded micro components made of Metallic and Ceramic Materials".
Because of technological restrictions in the miniaturization
of conventional manufacturing techniques, shape and
material deviations cannot be scaled down in the same proportion
as the micro parts, rendering components with relatively
wide tolerance fields. Systems that include such components
should be designed with this particularity in mind, often requiring
large clearance. On the end, the output of such systems
results variable and prone to dynamical instability. To save
production time and resources, every study of these effects
should happen early in the product development process and
base on computer simulation to avoid costly prototypes. A
suitable method is proposed here and exemplary applied to a
micro technology demonstrator developed by the CRC499. It
consists of a one stage planetary gear train in a sun-planet-ring
configuration, with input through the sun gear and output
through the carrier. The simulation procedure relies on ordinary
Multi Body Simulation methods and subsequently adds
other techniques to further investigate details of the system-s
behavior and to predict its response. The selection of the relevant
parameters and output functions followed the engineering
standards for regular sized gear trains. The first step is to
quantify the variability and to reveal the most critical points of
the system, performed through a whole-mechanism Sensitivity
Analysis. Due to the lack of previous knowledge about the system-s
behavior, different DOE methods involving small and
large amount of experiments were selected to perform the SA.
In this particular case the parameter space can be divided into
two well defined groups, one of them containing the gear-s profile
information and the other the components- spatial location.
This has been exploited to explore the different DOE techniques
more promptly. A reduced set of parameters is derived for
further investigation and to feed the final optimization process,
whether as optimization parameters or as external perturbation
collective. The 10 most relevant perturbation factors and 4 to 6
prospective variable parameters are considered in a new, simplified
model. All of the parameters are affected by the mentioned
production variability. The objective functions of interest
are based on scalar output-s variability measures, so the
problem becomes an optimization under robustness and reliability constrains. The study shows an initial step on the development
path of a method to design and optimize complex micro
mechanisms composed of wide tolerated elements accounting
for the robustness and reliability of the systems- output.
Abstract: In this study Homotopy Perturbation Method (HPM) is employed to investigate free vibration of an Euler beam with variable stiffness resting on an elastic foundation. HPM is an easy-to-use and very efficient technique for the solution of linear or nonlinear problems. HPM produces analytical approximate expression which is continuous in the solution domain. This work shows that HPM is a promising method for free vibration analysis of nonuniform Euler beams on elastic foundation. Several case problems have been solved by using the technique and solutions have been compared with those available in the literature.
Abstract: Utilization of various sensors has made it possible to
extend capabilities of industrial robots. Among these are vision
sensors that are used for providing visual information to assist robot
controllers. This paper presents a method of integrating a vision
system and a simulation program with an industrial robot. The vision
system is employed to detect a target object and compute its location
in the robot environment. Then, the target object-s information is sent
to the robot controller via parallel communication port. The robot
controller uses the extracted object information and the simulation
program to control the robot arm for approaching, grasping and
relocating the object. This paper presents technical details of system
components and describes the methodology used for this integration.
It also provides a case study to prove the validity of the methodology
developed.
Abstract: After the development of the Internet a suitable
discipline for trading goods electronically has been emerged.
However, this type of markets is not still mature enough in order to
become independent and get closer to seller/buyer-s needs.
Furthermore, the buyable and sellable goods in these markets still
don-t have essential standards for being well-defined. In this paper,
we will present a model for development of a market which can
contain goods with variable definitions and we will also investigate
its characteristics. Besides, by noticing the fact that people have
different discriminations, it-s figured out that the significance of each
attribute of a specific product may vary from different people-s view
points. Consequently we-ll present a model for weighting and
accordingly different people-s view points could be satisfied. These
two aspects will be discussed completely throughout this paper.
Abstract: Heating systems are a necessity for regions which
brace extreme cold weather throughout the year. To maintain a comfortable temperature inside a given place, heating systems
making use of- Hydronic boilers- are used. The principle of a single
pipe system serves as a base for their working. It is mandatory for these heating systems to control the room temperature, thus
maintaining a warm environment. In this paper, the concept of regulation of the room temperature over a wide range is established
by using an Adaptive Fuzzy Controller (AFC). This fuzzy controller automatically detects the changes in the outside temperatures and
correspondingly maintains the inside temperature to a palatial value. Two separate AFC's are put to use to carry out this function: one to
determine the quantity of heat needed to reach the prospective temperature required and to set the desired temperature; the other to control the position of the valve, which is directly proportional to the
error between the present room temperature and the user desired temperature. The fuzzy logic controls the position of the valve as per
the requirement of the heat. The amount by which the valve opens or closes is controlled by 5 knob positions, which vary from minimum to maximum, thereby regulating the amount of heat flowing through the valve. For the given test system data, different de-fuzzifier
methods have been implemented and the results are compared. In order to validate the effectiveness of the proposed approach, a fuzzy controller has been designed by obtaining a test data from a real time
system. The simulations are performed in MATLAB and are verified with standard system data. The proposed approach can be implemented for real time applications.
Abstract: Protein residue contact map is a compact
representation of secondary structure of protein. Due to the
information hold in the contact map, attentions from researchers in
related field were drawn and plenty of works have been done
throughout the past decade. Artificial intelligence approaches have
been widely adapted in related works such as neural networks,
genetic programming, and Hidden Markov model as well as support
vector machine. However, the performance of the prediction was not
generalized which probably depends on the data used to train and
generate the prediction model. This situation shown the importance
of the features or information used in affecting the prediction
performance. In this research, support vector machine was used to
predict protein residue contact map on different combination of
features in order to show and analyze the effectiveness of the
features.
Abstract: The effect of phosphorus supplementation of ammoniated rice straw was studied. The in vitro experiment was carried out following the first stage of Tilley and Terry method. The treatments consisting of four diets were A = 50% ammoniated rice straw + 50% concentrate (control), B = A + 0.2% Phosphor (P) supplement, C = A + 0.4% Phosphor (P) supplement, and D = A + 0.6% Phosphor (P) supplement of dry matter. Completely randomized design was used as the experimental design with differences among treatment means were examined using Duncan multiple range test. Variables measured were total bacterial and cellulolytic bacterial population, cellulolytic enzyme activity, ammonia (NH3) and volatile fatty acid (VFA) concentrations, as fermentability indicators and synthesized microbial protein, as well as degradability indicators including dry matter (DM), organic matter (OM), neutral detergent fibre (NDF), acid detergent fibre (ADF) and cellulose. The results indicated that fermentability and degradability of diets consisting ammoniated rice straw with P supplementation were significantly higher than the control diet (P< 0.05). It is concluded that P supplementation is important to improve fermentability and degradability of rations containing ammoniated RS and concentrate. In terms of the most effective level of P supplementation occurred at a supplementation rate of 0.4% of dry matter.
Abstract: This paper proposes an efficient method to classify
inverse synthetic aperture (ISAR) images. Because ISAR images can
be translated and rotated in the 2-dimensional image place, invariance
to the two factors is indispensable for successful classification. The
proposed method achieves invariance to translation and rotation of
ISAR images using a combination of two-dimensional Fourier
transform, polar mapping and correlation-based alignment of the
image. Classification is conducted using a simple matching score
classifier. In simulations using the real ISAR images of five scaled
models measured in a compact range, the proposed method yields
classification ratios higher than 97 %.
Abstract: The practice of burying the solid waste under the ground is one of the waste disposal methods and dumping is known as an ultimate method in the fastest-growing cities like Rasht city in Iran. Some municipalities select the solid waste landfills without feasibility studies, programming, design and management plans. Therefore, several social and environmental impacts are created by these sites. In this study, the suitability of solid waste landfill in Rasht city, capital of Gilan Province is reviewed using Regional Screening Method (RSM), Geographic Information System (GIS) and Analytical Hierarchy Process (AHP). The results indicated that according to the suitability maps, the value of study site is midsuitable to suitable based on RSM and mid-suitable based on AHP.
Abstract: This paper analyzes different techniques of the fine grained security of relational databases for the two variables-data accessibility and inference. Data accessibility measures the amount of data available to the users after applying a security technique on a table. Inference is the proportion of information leakage after suppressing a cell containing secret data. A row containing a secret cell which is suppressed can become a security threat if an intruder generates useful information from the related visible information of the same row. This paper measures data accessibility and inference associated with row, cell, and column level security techniques. Cell level security offers greatest data accessibility as it suppresses secret data only. But on the other hand, there is a high probability of inference in cell level security. Row and column level security techniques have least data accessibility and inference. This paper introduces cell plus innocent security technique that utilizes the cell level security method but suppresses some innocent data to dodge an intruder that a suppressed cell may not necessarily contain secret data. Four variations of the technique namely cell plus innocent 1/4, cell plus innocent 2/4, cell plus innocent 3/4, and cell plus innocent 4/4 respectively have been introduced to suppress innocent data equal to 1/4, 2/4, 3/4, and 4/4 percent of the true secret data inside the database. Results show that the new technique offers better control over data accessibility and inference as compared to the state-of-theart security techniques. This paper further discusses the combination of techniques together to be used. The paper shows that cell plus innocent 1/4, 2/4, and 3/4 techniques can be used as a replacement for the cell level security.
Abstract: In this paper, we focused primarily on Istanbul data
that is gathered by using intelligent transportation systems (ITS), and
considered the developments in traffic information delivery and
future applications that are being planned for implementation. Since
traffic congestion is increasing and travel times are becoming less
consistent and less predictable, traffic information delivery has
become a critical issue. Considering the fuel consumption and wasted
time in traffic, advanced traffic information systems are becoming
increasingly valuable which enables travelers to plan their trips more
accurately and easily.
Abstract: The objective of this research was to study influence
parameters affecting to mechanical property of austenitic stainless
steel grade 304 (AISI 304) with Gas Metal Arc Welding (GMAW).
The research was applying factorial design experiment, which have
following interested parameters: welding current at 80, 90, and 100
Amps, welding speeds at 250, 300, and 350 mm/min, and shield gas
of 75% Ar + 25% CO2, 70% Ar + 25% CO2 + 5% O2 and 69.5% Ar +
25% CO2 + 5% O2 + 0.5% He gas. The study was done in following
aspects: ultimate tensile strength and elongation. A research study of
ultimate tensile strength found that main factor effect, which had the
highest strength to AISI 304 welding was shield gas of 70% Ar +
25% CO2 + 5% O2 at average of 954.81 N/mm2. Result of the highest
elongation was showed significantly different at interaction effect
between shield gas of 69.5%Ar+25%CO2+5%O2+.5%He and
welding speed at 250 mm/min at 47.94%.
Abstract: Due to some reasons, observed images are degraded which are mainly caused by noise. Recently image denoising using the wavelet transform has been attracting much attention. Waveletbased approach provides a particularly useful method for image denoising when the preservation of edges in the scene is of importance because the local adaptivity is based explicitly on the values of the wavelet detail coefficients. In this paper, we propose several methods of noise removal from degraded images with Gaussian noise by using adaptive wavelet threshold (Bayes Shrink, Modified Bayes Shrink and Normal Shrink). The proposed thresholds are simple and adaptive to each subband because the parameters required for estimating the threshold depend on subband data. Experimental results show that the proposed thresholds remove noise significantly and preserve the edges in the scene.
Abstract: Many water supply systems in Australia are currently
undergoing significant reconfiguration due to reductions in long term
average rainfall and resulting low inflows to water supply reservoirs
since the second half of the 20th century. When water supply systems
undergo change, it is necessary to develop new operating rules,
which should consider climate, because the climate change is likely
to further reduce inflows. In addition, water resource systems are
increasingly intended to be operated to meet complex and multiple
objectives representing social, economic, environmental and
sustainability criteria. This is further complicated by conflicting
preferences on these objectives from diverse stakeholders. This paper
describes a methodology to develop optimum operating rules for
complex multi-reservoir systems undergoing significant change,
considering all of the above issues. The methodology is demonstrated
using the Grampians water supply system in northwest Victoria,
Australia. Initial work conducted on the project is also presented in
this paper.
Abstract: Quantitative methods of economic decision-making as
the methodological base of the so called operational research
represent an important set of tools for managing complex economic
systems,both at the microeconomic level and on the macroeconomic
scale. Mathematical models of controlled and controlling processes
allow, by means of artificial experiments, obtaining information
foroptimalor optimum approaching managerial decision-making.The
quantitative methods of economic decision-making usually include a
methodology known as structural analysis -an analysisof
interdisciplinary production-consumption relations.
Abstract: Nowadays data backup format doesn-t cease to appear raising so the anxiety on their accessibility and their perpetuity. XML is one of the most promising formats to guarantee the integrity of data. This article suggests while showing one thing man can do with XML. Indeed XML will help to create a data backup model. The main task will consist in defining an application in JAVA able to convert information of a database in XML format and restore them later.
Abstract: The aim of this work was to detect genetic variability among the set of 40 castor genotypes using 8 RAPD markers. Amplification of genomic DNA of 40 genotypes, using RAPD analysis, yielded in 66 fragments, with an average of 8.25 polymorphic fragments per primer. Number of amplified fragments ranged from 3 to 13, with the size of amplicons ranging from 100 to 1200 bp. Values of the polymorphic information content (PIC) value ranged from 0.556 to 0.895 with an average of 0.784 and diversity index (DI) value ranged from 0.621 to 0.896 with an average of 0.798. The dendrogram based on hierarchical cluster analysis using UPGMA algorithm was prepared and analyzed genotypes were grouped into two main clusters and only two genotypes could not be distinguished. Knowledge on the genetic diversity of castor can be used for future breeding programs for increased oil production for industrial uses.
Abstract: Heart sound is an acoustic signal and many techniques
used nowadays for human recognition tasks borrow speech recognition
techniques. One popular choice for feature extraction of accoustic
signals is the Mel Frequency Cepstral Coefficients (MFCC) which
maps the signal onto a non-linear Mel-Scale that mimics the human
hearing. However the Mel-Scale is almost linear in the frequency
region of heart sounds and thus should produce similar results with
the standard cepstral coefficients (CC). In this paper, MFCC is
investigated to see if it produces superior results for PCG based
human identification system compared to CC. Results show that the
MFCC system is still superior to CC despite linear filter-banks in
the lower frequency range, giving up to 95% correct recognition rate
for MFCC and 90% for CC. Further experiments show that the high
recognition rate is due to the implementation of filter-banks and not
from Mel-Scaling.
Abstract: In this paper, we design an integration security system
that provides authentication service, authorization service, and
management service of security data and a unified interface for the
management service. The interface is originated from XKMS protocol
and is used to manage security data such as XACML policies, SAML
assertions and other authentication security data including public keys.
The system includes security services such as authentication,
authorization and delegation of authentication by employing SAML
and XACML based on security data such as authentication data,
attributes information, assertions and polices managed with the
interface in the system. It also has SAML producer that issues
assertions related on the result of the authentication and the
authorization services.