Abstract: The storage of chemical fertilizers in concrete building often leads to durability problems due to chemical attack. The damage of concrete is mostly caused by certain ammonium salts. The main purpose of the research is to investigate the durability properties of concrete being exposed to ammonium nitrate solution. In this investigation, experiments are conducted on concrete type G50 and G60. The leaching process is achieved by the use of 20% concentration solution of ammonium nitrate. The durability properties investigated are water absorption, volume of permeable voids, and sorptivity. Compressive strength, pH value, and degradation depth are measured after a certain period of leaching. A decrease in compressive strength and an increase in porosity are found through the conducted experiments. Apart from that, the experimental data shows that pH value decreases with increased leaching time while the degradation depth of concrete increases with leaching time. By comparing concrete type G50 and G60, concrete type G60 is more resistant to ammonium nitrate attack.
Abstract: Many single or multispan arch bridges are
strengthened with the addition of some kind of structural support
between adjacent arches of multispan or beside the arch barrel of a
single span to increase the strength of the overall structure. It was
traditionally formed by either placing loose rubble masonry blocks
between the arches and beside the arches or using mortar or concrete
to construct a more substantial structural bond between the spans. On
the other hand backing materials are present in some existing bridges.
Existing arch assessment procedures generally ignore the effects of
backing materials. In this paper an investigation of the effects of
backing on ratings for masonry arch bridges is carried out. It is
observed that increasing the overall lateral stability of the arch
system through the inclusion of structural backing results in an
enhanced failure load by reducing the likelihood of any tension
occurring at the top of the arch.
Abstract: In a complex project environment, project teams face
multi-dimensional communication problems that can ultimately lead
to project breakdown. Team Performance varies in Face-to-Face
(FTF) environment versus groups working remotely in a computermediated
communication (CMC) environment. A brief review of the
Input_Process_Output model suggested by James E. Driskell, Paul H.
Radtke and Eduardo Salas in “Virtual Teams: Effects of
Technological Mediation on Team Performance (2003)", has been
done to develop the basis of this research. This model theoretically
analyzes the effects of technological mediation on team processes,
such as, cohesiveness, status and authority relations, counternormative
behavior and communication. An empirical study
described in this paper has been undertaken to test the
“cohesiveness" of diverse project teams in a multi-national
organization. This study uses both quantitative and qualitative
techniques for data gathering and analysis. These techniques include
interviews, questionnaires for data collection and graphical data
representation for analyzing the collected data. Computer-mediated
technology may impact team performance because of difference in
cohesiveness among teams and this difference may be moderated by
factors, such as, the type of communication environment, the type of
task and the temporal context of the team. Based on the reviewed
model, sets of hypotheses are devised and tested. This research,
reports on a study that compared team cohesiveness among virtual
teams using CMC and non-CMC communication mediums. The
findings suggest that CMC can help virtual teams increase team
cohesiveness among their members, making CMC an effective
medium for increasing productivity and team performance.
Abstract: Based on the fuzzy set theory this work develops two
adaptations of iterative methods that solve mathematical programming
problems with uncertainties in the objective function and in
the set of constraints. The first one uses the approach proposed by
Zimmermann to fuzzy linear programming problems as a basis and
the second one obtains cut levels and later maximizes the membership
function of fuzzy decision making using the bound search method.
We outline similarities between the two iterative methods studied.
Selected examples from the literature are presented to validate the
efficiency of the methods addressed.
Abstract: Powder of La0.6Sr0.4CoO3-α (LSCO) was synthesized
by a combined citrate-EDTA method. The as-synthesized LSCO
powder was calcined, respectively at temperatures of 800, 900 and
1000 °C with different heating/cooling rates which are 2, 5, 10 and
15 °C min-1. The effects of heat treatments on the phase formation of
perovskite phase of LSCO were investigated by powder X-ray
diffraction (XRD). The XRD patterns revealed that the rate of
5 °C min-1 is the optimum heating/cooling rate to obtain a single
perovskite phase of LSCO with calcination temperature of 800 °C.
This result was confirmed by a thermogravimetric analysis (TGA) as
it showed a complete decomposition of intermediate compounds to
form oxide material was also observed at 800 °C.
Abstract: New design of a grid for preparation of high density
granules with enhanced mechanical strength by granulation of
dispersed materials is suggested.
A method for hydrodynamic dimensioning of the grid depending
on granulation conditions, hydrodynamic regime of the operation,
dispersity and physicochemical characteristics of the materials to be
granulated was suggested.
The aim of the grid design is to solve the problems arising by the
granulation of disperse materials.
Abstract: This paper features the kinematic modelling of a 5-axis stationary articulated robot arm which is used for doing successful robotic manipulation task in its workspace. To start with, a 5-axes articulated robot was designed entirely from scratch and from indigenous components and a brief kinematic modelling was performed and using this kinematic model, the pick and place task was performed successfully in the work space of the robot. A user friendly GUI was developed in C++ language which was used to perform the successful robotic manipulation task using the developed mathematical kinematic model. This developed kinematic model also incorporates the obstacle avoiding algorithms also during the pick and place operation.
Abstract: A robust wheel slip controller for electric vehicles is
introduced. The proposed wheel slip controller exploits the dynamics
of electric traction drives and conventional hydraulic brakes for
achieving maximum energy efficiency and driving safety. Due to
the control of single wheel traction motors in combination with a
hydraulic braking system, it can be shown, that energy recuperation
and vehicle stability control can be realized simultaneously. The
derivation of a sliding mode wheel slip controller accessing two
drivetrain actuators is outlined and a comparison to a conventionally
braked vehicle is shown by means of simulation.
Abstract: The stone is a constituent part of the geological
structure of the Territory, introducing himself as a subject that has always interconnected human and environment in the development of a discourse of meanings and symbols that reflect elements realized in
different cultures and experiences.
This action meant that the first settlements and their areas of influence gained importance in the field of humanization and spatial
organization of the territory, not only for the appropriation that its
inhabitants did, but mainly because the community regardless of their
economic or social condition, used it as living space and cultural integration.
These factors become decisive in the characterization of the
landscape area in the northwest of Portugal, because the stone is a
material that appears not only in the natural landscape, but is also a strong element in humanized landscape, becoming this relation the
main characterization of the study area.
Abstract: Many studies have focused on the nonlinear analysis
of electroencephalography (EEG) mainly for the characterization of
epileptic brain states. It is assumed that at least two states of the
epileptic brain are possible: the interictal state characterized by a
normal apparently random, steady-state EEG ongoing activity; and
the ictal state that is characterized by paroxysmal occurrence of
synchronous oscillations and is generally called in neurology, a
seizure.
The spatial and temporal dynamics of the epileptogenic process is
still not clear completely especially the most challenging aspects of
epileptology which is the anticipation of the seizure. Despite all the
efforts we still don-t know how and when and why the seizure
occurs. However actual studies bring strong evidence that the
interictal-ictal state transition is not an abrupt phenomena. Findings
also indicate that it is possible to detect a preseizure phase.
Our approach is to use the neural network tool to detect interictal
states and to predict from those states the upcoming seizure ( ictal
state). Analysis of the EEG signal based on neural networks is used
for the classification of EEG as either seizure or non-seizure. By
applying prediction methods it will be possible to predict the
upcoming seizure from non-seizure EEG.
We will study the patients admitted to the epilepsy monitoring
unit for the purpose of recording their seizures. Preictal, ictal, and
post ictal EEG recordings are available on such patients for analysis
The system will be induced by taking a body of samples then
validate it using another. Distinct from the two first ones a third body
of samples is taken to test the network for the achievement of
optimum prediction. Several methods will be tried 'Backpropagation
ANN' and 'RBF'.
Abstract: Petri Net (PN) has proven to be effective graphical, mathematical, simulation, and control tool for Discrete Event Systems (DES). But, with the growth in the complexity of modern industrial, and communication systems, PN found themselves inadequate to address the problems of uncertainty, and imprecision in data. This gave rise to amalgamation of Fuzzy logic with Petri nets and a new tool emerged with the name of Fuzzy Petri Nets (FPN). Although there had been a lot of research done on FPN and a number of their applications have been anticipated, but their basic types and structure are still ambiguous. Therefore, in this research, an effort is made to categorize FPN according to their structure and algorithms Further, literature review of the applications of FPN in the light of their classifications has been done.
Abstract: In a travelling wave thermoacoustic device, the
regenerator sandwiched between a pair of (hot and cold) heat
exchangers constitutes the so-called thermoacoustic core, where the
thermoacoustic energy conversion from heat to acoustic power takes
place. The temperature gradient along the regenerator caused by the
two heat exchangers excites and maintains the acoustic wave in the
resonator. The devices are called travelling wave thermoacoustic
systems because the phase angle difference between the pressure and
velocity oscillation is close to zero in the regenerator. This paper
presents the construction and testing of a thermoacoustic engine
equipped with a ceramic regenerator, made from a ceramic material
that is usually used as catalyst substrate in vehicles- exhaust systems,
with fine square channels (900 cells per square inch). The testing
includes the onset temperature difference (minimum temperature
difference required to start the acoustic oscillation in an engine), the
acoustic power output, thermal efficiency and the temperature profile
along the regenerator.
Abstract: We discuss the application of matching in the area of resource discovery and resource allocation in grid computing. We present a formal definition of matchmaking, overview algorithms to evaluate different matchmaking expressions, and develop a matchmaking service for an intelligent grid environment.
Abstract: Removal of Methylene Blue (MB) from aqueous
solution by adsorbing it on Gypsum was investigated by batch
method. The studies were conducted at 25°C and included the effects
of pH and initial concentration of Methylene Blue. The adsorption
data was analyzed by using the Langmuir, Freundlich and Tempkin
isotherm models. The maximum monolayer adsorption capacity was
found to be 36 mg of the dye per gram of gypsum. The data were
also analyzed in terms of their kinetic behavior and was found to
obey the pseudo second order equation.
Abstract: In this paper, we present a novel technique called Self-Learning Expert System (SLES). Unlike Expert System, where there is a need for an expert to impart experiences and knowledge to create the knowledge base, this technique tries to acquire the experience and knowledge automatically. To display this technique at work, a simulation of a mobile robot navigating through an environment with obstacles is employed using visual basic. The mobile robot will move through this area without colliding with any obstacle and save the path that it took. If the mobile robot has to go through a similar environment again, then it will apply this experience to help it move through quicker without having to check for collision.
Abstract: Petrol Fuel Station (PFS) has potential hazards to the
people, asset, environment and reputation of an operating company.
Fire hazards, static electricity air pollution evoked by aliphatic and
aromatic organic compounds are major causes of accident/incident
occurrence at fuel station. Activities such as carelessness,
maintenance, housekeeping, slips trips and falls, transportation
hazard, major and minor injuries, robbery and snake bites has a
potential to create unsafe conditions. The level of risk of these
hazards varies according to location and country. The emphasis on
safety considerations by the government is variable all around the
world. Developed countries safety records are much better as
compared to developing countries safety statistics. There is no
significant approach available to highlight the unsafe acts and unsafe
conditions during operation and maintenance of fuel station. Fuel
station is the most commonly available facilities that contain
flammable and hazardous materials. Due to continuous operation of
fuel station they pose various hazards to people, environment and
assets of an organization. To control these hazards, there is a need for
specific approach. PFS operation is unique as compared to other
businesses. For smooth operations it demands an involvement of
operating company, contractor and operator group. This study will
focus to address hazard contributing factors that have a potential to
make PFS operation risky. One year data collected, 902 activities
analyzed, comparisons were made to highlight significant
contributing factors. The study will provide help and assistance to
PFS outlet marketing companies to make their fuel station operation
safer. It will help health safety and environment (HSE) professionals
to arrest the gap available related to safety matters at PFS.
Abstract: In the numerical solution of the forward dynamics of a
multibody system, the positions and velocities of the bodies in the
system are obtained first. With the information of the system state
variables at each time step, the internal and external forces acting on
the system are obtained by appropriate contact force models if the
continuous contact method is used instead of a discrete contact
method. The local deformation of the bodies in contact, represented
by penetration, is used to compute the contact force. The ability and
suitability with current cylindrical contact force models to describe
the contact between bodies with cylindrical geometries with
particular focus on internal contacting geometries involving low
clearances and high loads simultaneously is discussed in this paper.
A comparative assessment of the performance of each model under
analysis for different contact conditions, in particular for very
different penetration and clearance values, is presented. It is
demonstrated that some models represent a rough approximation to
describe the conformal contact between cylindrical geometries
because contact forces are underestimated.
Abstract: Nowadays scientific data is inevitably digital and
stored in a wide variety of formats in heterogeneous systems.
Scientists need to access an integrated view of remote or local
heterogeneous data sources with advanced data accessing, analyzing,
and visualization tools. This research suggests the use of Service
Oriented Architecture (SOA) to integrate biological data from
different data sources. This work shows SOA will solve the problems
that facing integration process and if the biologist scientists can
access the biological data in easier way. There are several methods to
implement SOA but web service is the most popular method. The
Microsoft .Net Framework used to implement proposed architecture.
Abstract: In this paper, we present the region based hidden Markov random field model (RBHMRF), which encodes the characteristics of different brain regions into a probabilistic framework for brain MR image segmentation. The recently proposed TV+L1 model is used for region extraction. By utilizing different spatial characteristics in different brain regions, the RMHMRF model performs beyond the current state-of-the-art method, the hidden Markov random field model (HMRF), which uses identical spatial information throughout the whole brain. Experiments on both real and synthetic 3D MR images show that the segmentation result of the proposed method has higher accuracy compared to existing algorithms.
Abstract: In this paper, a new learning approach for network
intrusion detection using naïve Bayesian classifier and ID3 algorithm
is presented, which identifies effective attributes from the training
dataset, calculates the conditional probabilities for the best attribute
values, and then correctly classifies all the examples of training and
testing dataset. Most of the current intrusion detection datasets are
dynamic, complex and contain large number of attributes. Some of
the attributes may be redundant or contribute little for detection
making. It has been successfully tested that significant attribute
selection is important to design a real world intrusion detection
systems (IDS). The purpose of this study is to identify effective
attributes from the training dataset to build a classifier for network
intrusion detection using data mining algorithms. The experimental
results on KDD99 benchmark intrusion detection dataset demonstrate
that this new approach achieves high classification rates and reduce
false positives using limited computational resources.