Abstract: In this article, a single application is suggested to determine the position of vehicles using Geographical Information Systems (GIS) and Geographical Position Systems (GPS). The part of the article material included mapping three dimensional coordinates to two dimensional coordinates using UTM or LAMBERT geographical methods, and the algorithm of conversion of GPS information into GIS maps is studied. Also, suggestions are given in order to implement this system based on web (called web based systems). To apply this system in IRAN, related official in this case are introduced and their duties are explained. Finally, economy analyzed is assisted according to IRAN communicational system.
Abstract: In this article, we are going to do a study that consist in the configuration of a link between an earth station to broadcast multimedia service and a user of this service via a geostationary satellite in Ka- band and the set up of the different components of this link and then to make the calculation of the link budget for this system. The application carried out in this work, allows us to calculate the link budget in both directions: the uplink and downlink, as well as all parameters used in the calculation and the development of a link budget. Finally, we will try to verify using the application developed the feasibility of implementation of this system.
Abstract: Gluconic acid is one of interesting chemical products
in industries such as detergents, leather, photographic, textile, and
especially in food and pharmaceutical industries. Fermentation is an
advantageous process to produce gluconic acid. Mathematical
modeling is important in the design and operation of fermentation
process. In fact, kinetic data must be available for modeling. The
kinetic parameters of gluconic acid production by Aspergillus niger
in batch culture was studied in this research at initial substrate
concentration of 150, 200 and 250 g/l. The kinetic models used were
logistic equation for growth, Luedeking-Piret equation for gluconic
acid formation, and Luedeking-Piret-like equation for glucose
consumption. The Kinetic parameters in the model were obtained by
minimizing non linear least squares curve fitting.
Abstract: In this study, to accurately predict cavitation of a
centrifugal pump, numerical analysis was compared with experimental
results modeled on a small industrial centrifugal pump. In this study,
numerical analysis was compared with experimental results modeled
on a small industrial centrifugal pump for reliable prediction on
cavitation of a centrifugal pump. To improve validity of the numerical
analysis, transient analysis was conducted on the calculated domain of
full-type geometry, such as an experimental apparatus. The numerical
analysis from the results was considered to be a reliable prediction of
cavitaion.
Abstract: Seasonal variability of nutrients concentration in the Baltic Sea using the 3D ecosystem numerical model 3D-CEMBS has been investigated. Additionally this study shows horizontal and vertical distribution of nutrients in the Baltic Sea. Model domain is an extended Baltic Sea area divided into 600x640 horizontal grid cells. Aside from standard hydrodynamic parameters 3D-CEMBS produces modeled ecological variables such as: three types of phytoplankton, two detrital classes, dissolved oxygen and the nutrients (nitrate, ammonium, phosphate and silicate). The presented model allows prediction of parameters that describe distribution of nutrients concentration and phytoplankton biomass. 3D-CEMBS can be used to study the effect of different hydrodynamic and biogeochemical processes on distributions of these variables in a larger scale.
Abstract: Streamribbon is used to visualize the rotation of the
fluid flow. The rotation of flow is useful in fluid mechanics,
engineering and geophysics. This paper introduces the construction
technique of streamribbon using the streamline which is generated
based on the law of mass conservation. The accuracy of constructed
streamribbons is shown through two examples.
Abstract: A code has been developed in Mathematica using
Direct Simulation Monte Carlo (DSMC) technique. The code was
tested for 2-D air flow around a circular cylinder. Same geometry
and flow properties were used in FLUENT 6.2 for comparison. The
results obtained from Mathematica simulation indicated significant
agreement with FLUENT calculations, hence providing insight into
particle nature of fluid flows.
Abstract: A new and cost effective robotic device was designed
for remote tele surgery using dual tone multi frequency technology
(DTMF). Tele system with Dual Tone Multiple Frequency has a large
capability in sending and receiving of data in hardware and software.
The robot consists of DC motors for arm movements and it is
controlled manually through a mobile phone through DTMF
Technology. The system enables the surgeon from base station to
send commands through mobile phone to the patient’s robotic system
which includes two robotic arms that translate the input into actual
instrument manipulation. A mobile phone attached to the
microcontroller 8051 which can activate robot through relays. The
Remote robot-assisted tele surgery eliminates geographic constraints
for getting surgical expertise where it is needed and allows an expert
surgeon to teach or proctor the performance of surgical technique by
real-time intervention.
Abstract: Through the course of this paper we define Locationbased
Intelligence (LBI) which is outgrowing from process of
amalgamation of geolocation and Business Intelligence.
Amalgamating geolocation with traditional Business Intelligence (BI)
results in a new dimension of BI named Location-based Intelligence.
LBI is defined as leveraging unified location information for business
intelligence. Collectively, enterprises can transform location data into
business intelligence applications that will benefit all aspects of the
enterprise. Expectations from this new dimension of business
intelligence are great and its future is obviously bright.
Abstract: In this paper a numerical technique is used to predict
the metal temperature of a gas turbine vane. The Rising combustor
exit temperatures in gas turbine engines necessitate active cooling for
the downstream turbine section to avoid thermal failure. This study is
performed the solution of external flow, internal convection, and
conduction within the metal vane. Also the trade-off between the
cooling performances in four different hole shapes and configurations
is performed. At first one of the commonly used cooling hole
geometry is investigated; cylindrical holes and then two other
configurations are simulated. The average temperature magnitude in
mid-plan section of each configuration is obtained and finally the
lower temperature value is selected such as best arrangement.
Abstract: This paper deals with the application of Principal Component Analysis (PCA) and the Hotelling-s T2 Chart, using data collected from a drinking water treatment process. PCA is applied primarily for the dimensional reduction of the collected data. The Hotelling-s T2 control chart was used for the fault detection of the process. The data was taken from a United Utilities Multistage Water Treatment Works downloaded from an Integrated Program Management (IPM) dashboard system. The analysis of the results show that Multivariate Statistical Process Control (MSPC) techniques such as PCA, and control charts such as Hotelling-s T2, can be effectively applied for the early fault detection of continuous multivariable processes such as Drinking Water Treatment. The software package SIMCA-P was used to develop the MSPC models and Hotelling-s T2 Chart from the collected data.
Abstract: Cloud Computing is an approach that provides computation and storage services on-demand to clients over the network, independent of device and location. In the last few years, cloud computing became a trend in information technology with many companies that transfer their business processes and applications in the cloud. Cloud computing with service oriented architecture has contributed to rapid development of Geographic Information Systems. Open Geospatial Consortium with its standards provides the interfaces for hosted spatial data and GIS functionality to integrated GIS applications. Furthermore, with the enormous processing power, clouds provide efficient environment for data intensive applications that can be performed efficiently, with higher precision, and greater reliability. This paper presents our work on the geospatial data services within the cloud computing environment and its technology. A cloud computing environment with the strengths and weaknesses of the geographic information system will be introduced. The OGC standards that solve our application interoperability are highlighted. Finally, we outline our system architecture with utilities for requesting and invoking our developed data intensive applications as a web service.
Abstract: Recent advances in both the testing and verification of software based on formal specifications of the system to be built have reached a point where the ideas can be applied in a powerful way in the design of agent-based systems. The software engineering research has highlighted a number of important issues: the importance of the type of modeling technique used; the careful design of the model to enable powerful testing techniques to be used; the automated verification of the behavioural properties of the system; the need to provide a mechanism for translating the formal models into executable software in a simple and transparent way. This paper introduces the use of the X-machine formalism as a tool for modeling biology inspired agents proposing the use of the techniques built around X-machine models for the construction of effective, and reliable agent-based software systems.
Abstract: Automatic segmentation of skin lesions is the first step
towards the automated analysis of malignant melanoma. Although
numerous segmentation methods have been developed, few studies
have focused on determining the most effective color space for
melanoma application. This paper proposes an automatic segmentation
algorithm based on color space analysis and clustering-based histogram
thresholding, a process which is able to determine the optimal
color channel for detecting the borders in dermoscopy images. The
algorithm is tested on a set of 30 high resolution dermoscopy images.
A comprehensive evaluation of the results is provided, where borders
manually drawn by four dermatologists, are compared to automated
borders detected by the proposed algorithm, applying three previously
used metrics of accuracy, sensitivity, and specificity and a new metric
of similarity. By performing ROC analysis and ranking the metrics,
it is demonstrated that the best results are obtained with the X and
XoYoR color channels, resulting in an accuracy of approximately
97%. The proposed method is also compared with two state-of-theart
skin lesion segmentation methods.
Abstract: Among the numerous economic evaluation techniques currently available, Multi-criteria Spatial Analysis lends itself to solving localization problems of property complexes and, in particular, production plants. The methodology involves the use of Geographical Information Systems (GIS) and the mapping overlay technique, which overlaps the different information layers of a territory in order to obtain an overview of the parameters that characterize it. This first phase is used to detect possible settlement surfaces of a new agglomeration, subsequently selected through Analytic Hierarchy Process (AHP), so as to choose the best alternative. The result ensures the synthesis of a multidimensional profile that expresses both the quantitative and qualitative effects. Each criterion can be given a different weight.
Abstract: The class of geometric deformable models, so-called
level sets, has brought tremendous impact to medical imagery. In
this paper we present yet another application of level sets to medical
imaging. The method we give here will in a way modify the speed
term in the standard level sets equation of motion. To do so we
build a potential based on the distance and the gradient of the
image we study. In turn the potential gives rise to the force field:
F~F(x, y) = P
∀(p,q)∈I
((x, y) - (p, q)) |ÔêçI(p,q)|
|(x,y)-(p,q)|
2 . The direction
and intensity of the force field at each point will determine the
direction of the contour-s evolution. The images we used to test
our method were produced by the Univesit'e de Sherbrooke-s PET
scanners.
Abstract: Computer aided design accounts with the support of
parametric software in the design of machine components as well as
of any other pieces of interest. The complexities of the element under
study sometimes offer certain difficulties to computer design, or ever
might generate mistakes in the final body conception. Reverse
engineering techniques are based on the transformation of already
conceived body images into a matrix of points which can be
visualized by the design software. The literature exhibits several
techniques to obtain machine components dimensional fields, as
contact instrument (MMC), calipers and optical methods as laser
scanner, holograms as well as moiré methods. The objective of this
research work was to analyze the moiré technique as instrument of
reverse engineering, applied to bodies of nom complex geometry as
simple solid figures, creating matrices of points. These matrices were
forwarded to a parametric software named SolidWorks to generate
the virtual object. Volume data obtained by mechanical means, i.e.,
by caliper, the volume obtained through the moiré method and the
volume generated by the SolidWorks software were compared and
found to be in close agreement. This research work suggests the
application of phase shifting moiré methods as instrument of reverse
engineering, serving also to support farm machinery element designs.
Abstract: Thirty six samples from each (aerobic and anoxic)
activated sludge were collected from two wastewater treatment plants
with MBRs in Berlin, Germany. The samples were prepared for count
and definition of fungal isolates; these isolates were purified by
conventional techniques and identified by microscopic examination.
Sixty tow species belonging to 28 genera were isolated from
activated sludge samples under aerobic conditions (28 genera and 58
species) and anoxic conditions (26 genera and 52 species). The
obtained data show that, Aspergillus was found at 94.4% followed by
Penicillium 61.1 %, Fusarium (61.1 %), Trichoderma (44.4 %) and
Geotrichum candidum (41.6 %) species were the most prevalent in all
activated sludge samples. The study confirmed that fungi can thrive
in activated sludge and sporulation, but isolated in different numbers
depending on the effect of aeration system. Some fungal species in
our study are saprophytic, and other a pathogenic to plants and
animals.
Abstract: Fractional Fourier Transform is a generalization of the
classical Fourier Transform. The Fractional Fourier span in general
depends on the amplitude and phase functions of the signal and varies
with the transform order. However, with the development of the
Fractional Fourier filter banks, it is advantageous in some cases to
have different transform orders for different filter banks to achieve
better decorrelation of the windowed and overlapped time signal. We
present an expression that is useful for finding the perturbation in the
Fractional Fourier span due to the erroneous transform order and the
possible variation in the window shape and length. The expression is
based on the dependency of the time-Fractional Fourier span
Uncertainty on the amplitude and phase function of the signal. We
also show with the help of the developed expression that the
perturbation of span has a varying degree of sensitivity for varying
degree of transform order and the window coefficients.
Abstract: In this paper the authors propose a protocol, which uses Elliptic Curve Cryptography (ECC) based on the ElGamal-s algorithm, for sending small amounts of data via an authentication server. The innovation of this approach is that there is no need for a symmetric algorithm or a safe communication channel such as SSL. The reason that ECC has been chosen instead of RSA is that it provides a methodology for obtaining high-speed implementations of authentication protocols and encrypted mail techniques while using fewer bits for the keys. This means that ECC systems require smaller chip size and less power consumption. The proposed protocol has been implemented in Java to analyse its features and vulnerabilities in the real world.