Abstract: Construction of tunnels is connected with high
uncertainty in the field of costs, construction period, safety and
impact on surroundings. Risk management became therefore a
common part of tunnel projects, especially after a set of fatal
collapses occurred in 1990's. Such collapses are caused usually by
combination of factors that can be divided into three main groups, i.e.
unfavourable geological conditions, failures in the design and
planning or failures in the execution.
This paper suggests a procedure enabling quantification of the
excavation risk related to extraordinary accidents using FTA and
ETA tools. It will elaborate on a common process of risk analysis and
enable the transfer of information and experience between particular
tunnel construction projects. Further, it gives a guide for designers,
management and other participants, how to deal with risk of such
accidents and how to make qualified decisions based on a
probabilistic approach.
Abstract: In the traditional theory of non-uniform torsion the
axial displacement field is expressed as the product of the unit twist
angle and the warping function. The first one, variable along the
beam axis, is obtained by a global congruence condition; the second
one, instead, defined over the cross-section, is determined by solving
a Neumann problem associated to the Laplace equation, as well as for
the uniform torsion problem.
So, as in the classical theory the warping function doesn-t punctually
satisfy the first indefinite equilibrium equation, the principal aim of
this work is to develop a new theory for non-uniform torsion of
beams with axial symmetric cross-section, fully restrained on both
ends and loaded by a constant torque, that permits to punctually
satisfy the previous equation, by means of a trigonometric expansion
of the axial displacement and unit twist angle functions.
Furthermore, as the classical theory is generally applied with good
results to the global and local analysis of ship structures, two beams
having the first one an open profile, the second one a closed section,
have been analyzed, in order to compare the two theories.
Abstract: In this paper we study the rheonomic mechanical systems from the point of view of Lagrange geometry, by means of its canonical semispray. We present an example of the constraint motion of a material point, in the rheonomic case.
Abstract: This paper was aimed at developing a computer aided
design and manufacturing system for spatial cylindrical cams. In the
proposed system, a milling tool with a diameter smaller than that of the
roller, instead of the standard cutter for traditional machining process,
was used to generate the tool path for spatial cams. To verify the
feasibility of the proposed method, a multi-axis machining simulation
software was further used to simulate the practical milling operation of
spatial cams. It was observed from computer simulation that the tool
path of small-sized cutter were within the motion range of a standard
cutter, no occurrence of overcutting. Examination of a finished cam
component clearly verifies the accuracy of the tool path generated for
small-sized milling tool. It is believed that the use of small-sized cutter
for the machining of the spatial cylindrical cams can generate a better
surface morphology with higher accuracy. The improvement in
efficiency and cost for the manufacturing of the spatial cylindrical cam
can be expected through the proposed method.
Abstract: Considering toxicity of heavy metals and their
accumulation in domestic wastes, immobilization of lead and
cadmium is envisaged inside glass-ceramics. We particularly
focused this work on calcium-rich phases embedded in a
glassy matrix.
Glass-ceramics were synthesized from glasses doped with
12 wt% and 16 wt% of PbO or CdO. They were observed and
analyzed by Electron MicroProbe Analysis (EMPA) and
Analytical Scanning Electron Microscopy (ASEM). Structural
characterization of the samples was performed by powder XRay
Diffraction.
Diopside crystals of CaMgSi2O6 composition are shown to
incorporate significant amounts of cadmium (up to 9 wt% of
CdO). Two new crystalline phases are observed with very
high Cd or Pb contents: about 40 wt% CdO for the cadmiumrich
phase and near 60 wt% PbO for the lead-rich phase. We
present complete chemical and structural characterization of
these phases. They represent a promising way for the
immobilization of toxic elements like Cd or Pb since glass
ceramics are known to propose a “double barrier" protection
(metal-rich crystals embedded in a glass matrix) against metal
release in the environment.
Abstract: A hybrid feature based adaptive particle filter algorithm is presented for object tracking in real scenarios with static camera.
The hybrid feature is combined by two effective features: the Grayscale Arranging Pairs (GAP) feature and the color histogram feature. The GAP feature has high discriminative ability even under conditions of severe illumination variation and dynamic background
elements, while the color histogram feature has high reliability to identify the detected objects. The combination of two features covers the shortage of single feature. Furthermore, we adopt an updating
target model so that some external problems such as visual angles can be overcame well. An automatic initialization algorithm is introduced which provides precise initial positions of objects. The experimental
results show the good performance of the proposed method.
Abstract: The new concept of two–dimensional (2D) image
processing implementation for auto-guiding system is shown in this
paper. It is dedicated to astrophotography and operates with
astronomy CCD guide cameras or with self-guided dual-detector
CCD cameras and ST4 compatible equatorial mounts. This idea was
verified by MATLAB model, which was used to test all procedures
and data conversions. Next the circuit prototype was implemented at
Altera MAX II CPLD device and tested for real astronomical object
images. The digital processing speed of CPLD prototype board was
sufficient for correct equatorial mount guiding in real-time system.
Abstract: The ITE Project is a project that has 1800 km length
and across the Turkey's land through east to west. The project of
pipeline enters geographically from Iran to Doğubayazit (Turkey) in
the east, exits to Greece from Ipsala province of Turkey in the west.
This project is the one of the international projects in such scale that
provides the natural gas of Iran and Caspian Sea through the
European continent. In this investigation, some information will be
given about the methods used to verify the direction of the pipeline
and the technical properties of the results obtained. The cost of
project itself entirely depends on the direction of the pipeline which
would be as short as possible and the specifications of the land cover.
Production standards of 1/2000 scaled digital orthophoto and vectoral
maps as a results of the use of map production materials and methods
(such as high resolution satellite images, and digital aerial images
captured from digital aerial cameras), will also be given in this report.
According to Turkish national map production standards, TM
((Transversal Mercator, 3 degree) projection is used for large scale
map and UTM (Universal Transversal Mercator, 6 degree) is used for
small scale map production standards. Some information is also given
about the projection used in the ITE natural gas pipeline project.
Abstract: Chaos and fractals are novel fields of physics and mathematics showing up a new way of universe viewpoint and creating many ideas to solve several present problems. In this paper, a novel algorithm based on the chaotic sequence generator with the highest ability to adapt and reach the global optima is proposed. The adaptive ability of proposal algorithm is flexible in 2 steps. The first one is a breadth-first search and the second one is a depth-first search. The proposal algorithm is examined by 2 functions, the Camel function and the Schaffer function. Furthermore, the proposal algorithm is applied to optimize training Multilayer Neural Networks.
Abstract: We aimed to investigate how can target and optimize
pulmonary delivery distribution by changing physicochemical
characteristics of instilled liquid.Therefore, we created a new liquids
group:
a. eligible for desired distribution within lung because of
assorted physicochemical characteristics
b. capable of being augmented with a broad range of
chemicals inertly
c. no interference on respiratory function
d. compatible with airway surface liquid
We developed forty types of new liquid,were composed of
Carboxymethylcellulose sodium,Glycerin and different types of
Polysorbates.Viscosity was measured using a Programmable
Rheometer and surface tension by KRUSS Tensiometer.We
subsequently examined the liquids and delivery protocols by simple
and branched glass capillary tube models of airways.Eventually,we
explored pulmonary distribution of liquids being augmented with
technetium-99m in mechanically ventilated rabbits.We used a single
head large field of view gamma camera.Kinematic viscosity between
0.265Stokes and 0.289Stokes,density between 1g/cm3 and 1.5g/cm3
and surface tension between 25dyn/cm and 35dyn/cm were the most
acceptable.
Abstract: This paper presents a experiment to estimate the
influences of cutting conditions in microstructure changes of
machining austenitic 304 stainless steel, especially for wear insert. The
wear insert were prefabricated with a width of 0.5 mm. And the forces,
temperature distribution, RS, and microstructure changes were
measured by force dynamometer, infrared thermal camera, X-ray
diffraction, XRD, SEM, respectively. The results told that the different
combinations of machining condition have a significant influence on
machined surface microstructure changes. In addition to that, the
ANOVA and AOMwere used to tell the different influences of cutting
speed, feed rate, and wear insert.
Abstract: Mobile Ad hoc networks (MANETs) are collections
of wireless mobile nodes dynamically reconfiguring and collectively
forming a temporary network. These types of networks assume
existence of no fixed infrastructure and are often useful in battle-field
tactical operations or emergency search-and-rescue type of
operations where fixed infrastructure is neither feasible nor practical.
They also find use in ad hoc conferences, campus networks and
commercial recreational applications carrying multimedia traffic. All
of the above applications of MANETs require guaranteed levels of
performance as experienced by the end-user. This paper focuses on
key challenges in provisioning predetermined levels of such Quality
of Service (QoS). It also identifies functional areas where QoS
models are currently defined and used. Evolving functional areas
where performance and QoS provisioning may be applied are also
identified and some suggestions are provided for further research in
this area. Although each of the above functional areas have been
discussed separately in recent research studies, since these QoS
functional areas are highly correlated and interdependent, a
comprehensive and comparative analysis of these areas and their
interrelationships is desired. In this paper we have attempted to
provide such an overview.
Abstract: This paper presents the communication network for
machine vision system to implement to control systems and logistics
applications in industrial environment. The real-time distributed over
the network is very important for communication among vision node,
image processing and control as well as the distributed I/O node. A
robust implementation both with respect to camera packaging and
data transmission has been accounted. This network consists of a
gigabit Ethernet network and a switch with integrated fire-wall is
used to distribute the data and provide connection to the imaging
control station and IEC-61131 conform signal integration comprising
the Modbus TCP protocol. The real-time and delay time properties
each part on the network were considered and worked out in this
paper.
Abstract: In the visual servoing systems, the data obtained by
Visionary is used for controlling robots. In this project, at first the
simulator which was proposed for simulating the performance of a
6R robot before, was examined in terms of software and test, and in
the proposed simulator, existing defects were obviated. In the first
version of simulation, the robot was directed toward the target object only in a Position-based method using two cameras in the
environment. In the new version of the software, three cameras were used simultaneously. The camera which is installed as eye-inhand on the end-effector of the robot is used for visual servoing in a
Feature-based method. The target object is recognized according to
its characteristics and the robot is directed toward the object in compliance with an algorithm similar to the function of human-s
eyes. Then, the function and accuracy of the operation of the robot are examined through Position-based visual servoing method using
two cameras installed as eye-to-hand in the environment. Finally, the obtained results are tested under ANSI-RIA R15.05-2 standard.
Abstract: This paper presents one of the best applications of wireless sensor network for campus Monitoring. With the help of PIR sensor, temperature sensor and humidity sensor, effective utilization of energy resources has been implemented in one of rooms of Sharda University, Greater Noida, India. The RISC microcontroller is used here for analysis of output of sensors and providing proper control using ZigBee protocol. This wireless sensor module presents a tremendous power saving method for any campus
Abstract: Conception is the primordial part in the realization of
a computer system. Several tools have been used to help inventors to
describe their software. These tools knew a big success in the
relational databases domain since they permit to generate SQL script
modeling the database from an Entity/Association model. However,
with the evolution of the computer domain, the relational databases
proved their limits and object-relational model became used more
and more. Tools of present conception don't support all new concepts
introduced by this model and the syntax of the SQL3 language. We
propose in this paper a tool of help to the conception and
implementation of object-relational databases called «NAVIGTOOLS"
that allows the user to generate script modeling its database
in SQL3 language. This tool bases itself on the Entity/Association
and navigational model for modeling the object-relational databases.
Abstract: In present work the problem of the ITER fusion
plasma neutron source parameter reconstruction using only the
Vertical Neutron Camera data was solved. The possibility of neutron
source parameter reconstruction was estimated by the numerical
simulations and the analysis of adequateness of mathematic model
was performed. The neutron source was specified in a parametric
form. The numerical analysis of solution stability with respect to data
distortion was done. The influence of the data errors on the
reconstructed parameters is shown:
• is reconstructed with errors less than 4% at all examined values
of δ (until 60%);
• is determined with errors less than 10% when δ do not overcome
5%;
• is reconstructed with relative error more than 10 %;
• integral intensity of the neutron source is determined with error
10% while δ error is less than 15%;
where -error of signal measurements, (R0,Z0), the plasma center
position,- /parameter of neutron source profile.
Abstract: Social networking is one of the most successful and popular tools to emerge from the Web 2.0 era. However, the increased interconnectivity and access to peoples- personal lives and information has created a plethora of opportunities for the nefarious side of human nature to manifest. This paper categorizes and describes the major types of anti-social behavior and criminal activity that can arise through undisciplined use and/or misuse of social media. We specifically address identity theft, misrepresentation of information posted, cyber bullying, children and social networking, and social networking in the work place. Recommendations are provided for how to reduce the risk of being the victim of a crime or engaging in embarrassing behavior that could irrevocably harm one-s reputation either professionally or personally. We also discuss what responsibilities social networking companies have to protect their users and also what law enforcement and policy makers can do to help alleviate the problems.
Abstract: In DMVC, we have more than one options of sources available for construction of side information. The newer techniques make use of both the techniques simultaneously by constructing a bitmask that determines the source of every block or pixel of the side information. A lot of computation is done to determine each bit in the bitmask. In this paper, we have tried to define areas that can only be well predicted by temporal interpolation and not by multiview interpolation or synthesis. We predict that all such areas that are not covered by two cameras cannot be appropriately predicted by multiview synthesis and if we can identify such areas in the first place, we don-t need to go through the script of computations for all the pixels that lie in those areas. Moreover, this paper also defines a technique based on KLT to mark the above mentioned areas before any other processing is done on the side view.
Abstract: In this paper, a two factor scheme is proposed to
generate cryptographic keys directly from biometric data, which
unlike passwords, are strongly bound to the user. Hash value of the
reference iris code is used as a cryptographic key and its length
depends only on the hash function, being independent of any other
parameter. The entropy of such keys is 94 bits, which is much higher
than any other comparable system. The most important and distinct
feature of this scheme is that it regenerates the reference iris code by
providing a genuine iris sample and the correct user password. Since
iris codes obtained from two images of the same eye are not exactly
the same, error correcting codes (Hadamard code and Reed-Solomon
code) are used to deal with the variability. The scheme proposed here
can be used to provide keys for a cryptographic system and/or for
user authentication. The performance of this system is evaluated on
two publicly available databases for iris biometrics namely CBS and
ICE databases. The operating point of the system (values of False
Acceptance Rate (FAR) and False Rejection Rate (FRR)) can be set
by properly selecting the error correction capacity (ts) of the Reed-
Solomon codes, e.g., on the ICE database, at ts = 15, FAR is 0.096%
and FRR is 0.76%.