Abstract: This paper is concerned with studying the forgetting factor of the recursive least square (RLS). A new dynamic forgetting factor (DFF) for RLS algorithm is presented. The proposed DFF-RLS is compared to other methods. Better performance at convergence and tracking of noisy chirp sinusoid is achieved. The control of the forgetting factor at DFF-RLS is based on the gradient of inverse correlation matrix. Compared with the gradient of mean square error algorithm, the proposed approach provides faster tracking and smaller mean square error. In low signal-to-noise ratios, the performance of the proposed method is superior to other approaches.
Abstract: Natural pozzolan (NP) is one of the potential
prehistoric alternative binders in the construction industry. It has
been investigated as cement replacement in ordinary concrete by
several researchers for many purposes. Various supplementary
cementitious materials (SCMs) such as fly ash, limestone dust and
silica fume are widely used in the production of SCC; however,
limited studies to address the effect of NP on the properties of SCC
are documented. The current research is composed of different SCC
paste and concrete mixtures containing different replacement levels
of local NP as an alternative SCM. The effect of volume of paste
containing different amounts of local NP related to W/B ratio and
cement content on SCC fresh properties was assessed. The variations
in the fresh properties of SCC paste and concrete represented by
slump flow (flowability) and the flow rate were determined and
discussed. The results indicated that the flow properties of SCC paste
and concrete mixtures, at their optimized superplasticizer dosages,
were affected by the binder content of local NP and the total volume
fraction of SCC paste.
Abstract: Because of the reservoir effect, dynamic analysis of concrete dams is more involved than other common structures. This problem is mostly sourced by the differences between reservoir water, dam body and foundation material behaviors. To account for the reservoir effect in dynamic analysis of concrete gravity dams, two methods are generally employed. Eulerian method in reservoir modeling gives rise to a set of coupled equations, whereas in Lagrangian method, the same equations for dam and foundation structure are used. The Purpose of this paper is to evaluate and study possible advantages and disadvantages of both methods. Specifically, application of the above methods in the analysis of dam-foundationreservoir systems is leveraged to calculate the hydrodynamic pressure on dam faces. Within the frame work of dam- foundationreservoir systems, dam displacement under earthquake for various dimensions and characteristics are also studied. The results of both Lagrangian and Eulerian methods in effects of loading frequency, boundary condition and foundation elasticity modulus are quantitatively evaluated and compared. Our analyses show that each method has individual advantages and disadvantages. As such, in any particular case, one of the two methods may prove more suitable as presented in the results section of this study.
Abstract: Nowadays, power systems, energy generation by wind
has been very important. Noting that the production of electrical
energy by wind turbines on site to several factors (such as wind speed
and profile site for the turbines, especially off the wind input speed,
wind rated speed and wind output speed disconnect) is dependent. On
the other hand, several different types of turbines in the market there.
Therefore, selecting a turbine that its capacity could also answer the
need for electric consumers the efficiency is high something is
important and necessary. In this context, calculating the amount of
wind power to help optimize overall network, system operation, in
determining the parameters of wind power is very important.
In this article, to help calculate the amount of wind power plant,
connected to the national network in the region Manjil wind,
selecting the best type of turbine and power delivery profile
appropriate to the network using Monte Carlo method has been.
In this paper, wind speed data from the wind site in Manjil, as minute
and during the year has been. Necessary simulations based on
Random Numbers Simulation method and repeat, using the software
MATLAB and Excel has been done.
Abstract: The internet has become an attractive avenue for
global e-business, e-learning, knowledge sharing, etc. Due to
continuous increase in the volume of web content, it is not practically
possible for a user to extract information by browsing and integrating
data from a huge amount of web sources retrieved by the existing
search engines. The semantic web technology enables advancement
in information extraction by providing a suite of tools to integrate
data from different sources. To take full advantage of semantic web,
it is necessary to annotate existing web pages into semantic web
pages. This research develops a tool, named OWIE (Ontology-based
Web Information Extraction), for semantic web annotation using
domain specific ontologies. The tool automatically extracts
information from html pages with the help of pre-defined ontologies
and gives them semantic representation. Two case studies have been
conducted to analyze the accuracy of OWIE.
Abstract: The need to have standards has always been a priority
of all the disciplines in the world. Today, standards such as XML and
USB are trying to create a universal interface for their respective
areas. The information regarding every family in the discipline
addressed, must have a lot in common, known as Metadata. A lot of
work has been done in specific domains such as IEEE LOM and
MPEG-7 but they do not appeal to the universality of creating
Metadata for all entities, where we take an entity (object) as, not
restricted to Software Terms. This paper tries to address this problem
of universal Metadata Definition which may lead to increase in
precision of search.
Abstract: Protein and Esterase electrophoresis were used to
genetically identify two Saudi tick species. Engorged females of the
camel tick Hyalomma dromedarii (Koch) (Acari: Ixodidae) and the
cattle tick Boophilus annulatus (Say) (Acari: Ixodidae) ticks
collected from infested camels and cattle in the animals resting
house at Hail region in KSA were used. The results showed that
there are a variation in both of protein and esterase activity levels and
a high polymorphism within and between the genera and species of
Hyalomma and Boophilus . In conclusion, the protein and esterase
electrophoretic analysis used in the present study could successfully
distinguish among tick species, commonly found in Saudi Arabia.
Abstract: This paper presents a new steganography approach suitable for Arabic texts. It can be classified under steganography feature coding methods. The approach hides secret information bits within the letters benefiting from their inherited points. To note the specific letters holding secret bits, the scheme considers the two features, the existence of the points in the letters and the redundant Arabic extension character. We use the pointed letters with extension to hold the secret bit 'one' and the un-pointed letters with extension to hold 'zero'. This steganography technique is found attractive to other languages having similar texts to Arabic such as Persian and Urdu.
Abstract: Supplier selection is a multi criteria decision-making process that comprises tangible and intangible factors. The majority of previous supplier selection techniques do not consider strategic perspective. Besides, uncertainty is one of the most important obstacles in supplier selection. For the first, time in this paper, the idea of the algorithm " Knapsack " is used to select suppliers Moreover, an attempt has to be made to take the advantage of a simple numerical method for solving model .This is an innovation to resolve any ambiguity in choosing suppliers. This model has been tried in the suppliers selected in a competitive environment and according to all desired standards of quality and quantity to show the efficiency of the model, an industry sample has been uses.
Abstract: In this paper back-propagation artificial neural network
(BPANN) is employed to predict the deformation of the upsetting
process. To prepare a training set for BPANN, some finite element
simulations were carried out. The input data for the artificial neural
network are a set of parameters generated randomly (aspect ratio d/h,
material properties, temperature and coefficient of friction). The
output data are the coefficient of polynomial that fitted on barreling
curves. Neural network was trained using barreling curves generated
by finite element simulations of the upsetting and the corresponding
material parameters. This technique was tested for three different
specimens and can be successfully employed to predict the
deformation of the upsetting process
Abstract: The mechanical and tribological properties in WC-Co
coatings are strongly affected by hardness and elasticity
specifications. The results revealed the effect of spraying distance on
microhardness and elasticity modulus of coatings. The metallurgical
studies have been made on coated samples using optical microscopy,
scanning electron microscopy (SEM).
Abstract: This paper describes the process used in the
automation of the Maritime UAV commands using the Kinect sensor.
The AR Drone is a Quadrocopter manufactured by Parrot [1] to be
controlled using the Apple operating systems such as iPhones and
Ipads. However, this project uses the Microsoft Kinect SDK and
Microsoft Visual Studio C# (C sharp) software, which are compatible
with Windows Operating System for the automation of the navigation
and control of the AR drone.
The navigation and control software for the Quadrocopter runs on
a windows 7 computer. The project is divided into two sections; the
Quadrocopter control system and the Kinect sensor control system.
The Kinect sensor is connected to the computer using a USB cable
from which commands can be sent to and from the Kinect sensors.
The AR drone has Wi-Fi capabilities from which it can be connected
to the computer to enable transfer of commands to and from the
Quadrocopter.
The project was implemented in C#, a programming language that
is commonly used in the automation systems. The language was
chosen because there are more libraries already established in C# for
both the AR drone and the Kinect sensor.
The study will contribute toward research in automation of
systems using the Quadrocopter and the Kinect sensor for navigation
involving a human operator in the loop. The prototype created has
numerous applications among which include the inspection of vessels
such as ship, airplanes and areas that are not accessible by human
operators.
Abstract: Nothing that an effective cure for infertility happens
when we can find a unique solution, a great deal of study has been
done in this field and this is a hot research subject for to days study.
So we could analyze the men-s seaman and find out about fertility
and infertility and from this find a true cure for this, since this will be
a non invasive and low risk procedure, it will be greatly welcomed.
In this research, the procedure has been based on few Algorithms
enhancement and segmentation of images which has been done on
the images taken from microscope in different fertility institution and
have obtained a suitable result from the computer images which in
turn help us to distinguish these sperms from fluids and its
surroundings.
Abstract: The research on the effectiveness of environmental
assessment (EA) is a milestone effort to evaluate the state of the field,
including many contributors related with a lot of countries since more
than two decades. In the 1960s, there was a surge of interest between
modern industrialized countries over unexpected opposite effects of
technical invention. The interest led to choice of approaches for
assessing and prediction the impressions of technology and
advancement for social and economic, state health and safety, solidity
and the circumstances. These are consisting of risk assessment,
technology assessment, environmental impact assessment and costbenefit
analysis. In this research contribution, the authors have
described the research status for environmental assessment in
cumulative environmental system. This article discusses the methods
for cumulative effect assessment (CEA).
Abstract: The effects of chitosan, a biodegradable polymer,
were studied in Grammatophyllum speciosum protocorm-like bodies
(PLBs) in vitro culture. The chitosan concentration of 0, 5, 10, 15,
20, 25, 50 or 100 mg/l were supplemented in half-strength Murashige
and Skoog (1/2 MS) liquid or on agar media containing 2% (w/v)
sucrose. The results showed that liquid medium supplemented with
15 mg/l chitosan showed the highest relative growth rate (7-fold
increase) of PLBs. On 1/2 MS agar medium supplemented with 25
mg/l chitosan gave the highest relative growth rate (4-fold increase).
The relative growth rate of G. speciosum PLBs on agar medium was
significantly lower than that in liquid medium. Moreover, chitosan,
supplemented to agar medium promoted shoot formation but not
rooting. However, supplementation at too high a level, such as 100
mg/l can inhibit growth and kill PLBs.
Abstract: In this article we explore the application of a formal
proof system to verification problems in cryptography. Cryptographic
properties concerning correctness or security of some cryptographic
algorithms are of great interest. Beside some basic lemmata, we
explore an implementation of a complex function that is used in
cryptography. More precisely, we describe formal properties of this
implementation that we computer prove. We describe formalized
probability distributions (σ-algebras, probability spaces and conditional
probabilities). These are given in the formal language of the
formal proof system Isabelle/HOL. Moreover, we computer prove
Bayes- Formula. Besides, we describe an application of the presented
formalized probability distributions to cryptography. Furthermore,
this article shows that computer proofs of complex cryptographic
functions are possible by presenting an implementation of the Miller-
Rabin primality test that admits formal verification. Our achievements
are a step towards computer verification of cryptographic primitives.
They describe a basis for computer verification in cryptography.
Computer verification can be applied to further problems in cryptographic
research, if the corresponding basic mathematical knowledge
is available in a database.
Abstract: Recently, information security has become a key issue
in information technology as the number of computer security
breaches are exposed to an increasing number of security threats. A
variety of intrusion detection systems (IDS) have been employed for
protecting computers and networks from malicious network-based or
host-based attacks by using traditional statistical methods to new data
mining approaches in last decades. However, today's commercially
available intrusion detection systems are signature-based that are not
capable of detecting unknown attacks. In this paper, we present a
new learning algorithm for anomaly based network intrusion
detection system using decision tree algorithm that distinguishes
attacks from normal behaviors and identifies different types of
intrusions. Experimental results on the KDD99 benchmark network
intrusion detection dataset demonstrate that the proposed learning
algorithm achieved 98% detection rate (DR) in comparison with
other existing methods.
Abstract: This paper describes the design of a real-time audiorange
digital oscilloscope and its implementation in 90nm CMOS
FPGA platform. The design consists of sample and hold circuits,
A/D conversion, audio and video processing, on-chip RAM, clock
generation and control logic. The design of internal blocks and
modules in 90nm devices in an FPGA is elaborated. Also the key
features and their implementation algorithms are presented.
Finally, the timing waveforms and simulation results are put
forward.
Abstract: The Combination of path planning and path following is the main purpose of this paper. This paper describes the developed practical approach to motion control of the MRL small size robots. An intelligent controller is applied to control omni-directional robots motion in simulation and real environment respectively. The Brain Emotional Learning Based Intelligent Controller (BELBIC), based on LQR control is adopted for the omni-directional robots. The contribution of BELBIC in improving the control system performance is shown as application of the emotional learning in a real world problem. Optimizing of the control effort can be achieved in this method too. Next the implicit communication method is used to determine the high level strategies and coordination of the robots. Some simple rules besides using the environment as a memory to improve the coordination between agents make the robots' decision making system. With this simple algorithm our team manifests a desirable cooperation.
Abstract: Safety instrumented systems (SISs) are becoming
increasingly complex and the proportion of programmable electronic
parts is growing. The IEC 61508 global standard was established to
ensure the functional safety of SISs, but it was expressed in highly
macroscopic terms. This study introduces an evaluation process for
hardware safety integrity levels through failure modes, effects, and
diagnostic analysis (FMEDA).FMEDA is widely used to evaluate
safety levels, and it provides the information on failure rates and
failure mode distributions necessary to calculate a diagnostic coverage
factor for a given component. In our evaluation process, the
components of the SIS subsystem are first defined in terms of failure
modes and effects. Then, the failure rate and failure mechanism
distribution are assigned to each component. The safety mode and
detectability of each failure mode are determined for each component.
Finally, the hardware safety integrity level is evaluated based on the
calculated results.