The purpose of this research work is to realize a statistical analysis of the effects of different factors on accidents involving dangerous goods transportation. For this, the author’s used a sample of 128 accidents. Using statistical software R and applying a logistic regression model, the results showed that factors like geographical area where an accident takes place, the road type, the vehicle type and goods transported have a significant effect on the probability that an accident occurs.
The present study seeks to gain the historian’s insight regarding Comprehension of Theology and the attitude resulting from it in the history written by them, with understanding the hidden messages in historical texts through interpretation and analysis. In the meantime, we seek to find the impact of the historians’ attitude in their adopted historiography method. It seems that there is a relationship between insight, attitude and historians’ method which is worthy of consideration.\nSurely to gain the insight of the historian, it is necessary to enter the field of Epistemology. By general definition, cognition includes empirical, sensory and intellectual cognitions. Religious cognition is placed in the domain of rational recognitions. Religion is a fixed matter, however; religious knowledge varies. In a way, the difference between interpretations of the main sources of religious knowledge has led to religious sects and different theologies. \nThe comprehension of theology of Iranian historians of the Islamic period – 3rd -6th Hijri centuries- in three domains of Mu\'tazilites and al-Ash\'ari and Maturidi have led to differences in understanding, opinion and attitude toward historical events. These historians, considering their theological attitudes in historiography has adopted their descriptive, analytical and causal method.
Several applications of mobile ad hoc network select geographical routing especially Greedy Perimeter Stateless Routing (GPSR) protocol due to its scalability, efficiency and ability to support location based applications. However, there are many security issues in protecting location informa-tion and this information can be easily abused by the attackers. The location based adversarial activities affect the network performance. There are only few works on the literature that studied the impact of the location based attacks in the geographical routing. This work analyzes the impact of malicious nodes on the GPSR performance associated with fake location data in-depth. This work initially identifies a set of possible location based attacks and analyzes the local problems that arise from the location based adversarial activities. This work mainly focuses on active and passive attacks on the GPSR. Later, it explains the impacts of these attacks on the network performance. Finally, it demonstrates the global impact on the routing performance through simulating the network with attack scenarios. This study demonstrates the significant impact of the location based adversarial activities on the performance of the GPSR in terms of packet delivery ratio, overhead, average end-to-end delay, routing loops, packet dropping probability, and location error rate. The simulation results concluded that the overall routing performance degrades, depending on the type and percentage of adversaries.
There is a challenge to the experts and those in charge with the education and training to create an education system that is continuously adjusting to a changing society, able to facilitate and support transformations that occur in the business environment and beyond, and to determine the economic growth both at the local, regional, national and international level as well as at the level of organizations, groups, and individuals.\nCountries that have nowadays recorded significant economic growth have an education system based on an entrepreneurial culture, the most relevant examples being Finland, Norway, New Zealand, USA, Canada and Japan. These countries have managed to redefine their strategy starting with the primary education system and creating a complex network of institutions that are developing entrepreneurial skills and abilities, focusing on an educational curriculum tailored for the business environment.\nThe educational reform in these countries has led to the educational decentralization, building educational networks for the know-how transfer between regions, developing collaborative projects between universities, public institutions and business organizations, on-going training programs and lifelong learning, entrepreneurship and collaborative business culture.\nThis paper aims to propose a model for an entrepreneurial university that can represent a challenge for the higher education system in Romania, where the educational reform can lead to educational decentralization, building educational networks for the transfer of know-how between regions, developing collaborative projects between the universities, public institutions and business organizations, on-going training programs and lifelong learning, entrepreneurship and a collaborative business culture.
It is well established that factors such as the effects of pile patterns, type of connection to the pile cap, pile length and spacing performed in soft clay soil under lateral load are effective parameters on the bearing capacity of pile group and its load distribution among the piles in a group. In the present research, we have investigated the effects of these parameters on the bearing capacity of pile group based on the results obtained by the models developed by FLAC 3D software. Finally, the relationships of Multiplier Factors and Group Efficiency were predicted. It was shown that the magnitude of group efficiency of pile group for the fixed head connections of the piles to the cap is about 35% less than that of free head connection type for 6D pile spacing, and also the horizontal displacement of the cap were decreased by increasing the pile spacing. Taking together, multiplier factors and group efficiency estimated by the software were shown to be more appropriate to predict parameter’s effects on the bearing capacity of pile groups.
Images are often corrupted by impulse noise during the process of image acquisition and transmission. In this research, optimal detector noise filtering algorithm is proposed which detects and removes the impulse noise from the noise affected images, especially while compared with other state of arts in terms of image quality and mean square error. The process of impulse noise detection includes finding of the optimum direction, through the estimation of standard deviation in various directions of the filtering window. It also preserves the edges in the images during the denoising process. The efficient hardware architecture for optimal detector noise filtering is presented in this research. The design possesses only two line memory buffers with very low computational complexity, thereby reducing the hardware cost and appropriate for several real-time applications. The proposed hardware architecture consumes 1728gates and power consumption of 203.27mW.
Motion control of wire-driven parallel manipulator must be real-time calculating force of wire because it can only sustain tension. Previous scholars attribute the wire tension optimization for a linear programming problem and using iteration to solve, the iteration not only have slow calculation and but also have no definite optimization solution. Therefore, based on effect coefficient harmonic resolution and energy optimal resolution equation, the optimal solution of tension distributing simple display. Based on influence coefficient method the kinematics analysis is proposed for wire-driven parallel manipulator, the orientation parameters by Euler angles of the moving platform of time first-order and second-order derivative are not the moving platform angular velocity and angular acceleration is verified. The dynamics equation is established when dynamic characteristics of the winch is considered, the singular perturbation model is acquired by using singular perturbation method, and the simulation of a circle trajectory tracking control is analyzed. An algorithm for control system of the redundant wire-driven parallel manipulator is proposed by using constant gravity and internal tension compensation, the position control of mobile platform is realized, the deviations of PD regulator for the control system are analyzed based on position feedback of rotation angle of the motors, the stability of the control system is verified, the theory of the control system of the redundant wire-driven parallel manipulator is given for design.
Sanctity and dignity of human is considered as indisputable and fundamental principles of human honor and dignity. Human’s life, dignity, wealth, opinion and vote should be maintained and respected. Human’s life is the most important one from them, since the rest is depended on it. Often critics of Islamic law, civil and the family rights pose important issue of the legal differences between woman and man. Usually, the focus and emphasis in this area is on the following points: \nExplaining the reasons and clarifying the issue is by no means to verify such inequality. Besides, whether this right inequality is accurate or not composes both important and independent topic which should be studied in its place. Another worth noting point is that current study focuses on legal man and woman’s statue defined by law not based on local and or tribal tradition. Moslem woman’s blood money either willfully or manslaughter is half of Moslem man’s one (Islamic punishment law, article 300).
Although there is 0-0.03% (0-300 ppm) Carbon dioxide (CO2) in the air, it has a vital importance because of its amount and variance. Plants reduce the amount of CO2 in the atmosphere with photosynthesis. But, plants cannot do photosynthesis in winter or night. As a result, they might have a negative impact on the amount of CO2. In this study, the amount of air carbon dioxide is measured in forests and urban areas and evaluate depending on season and day or night. Results of study show that, despite the amount of carbon dioxide decreases in the summer depending on the sunlight, it can reach the level of twice at night. In addition to day and night, there is a big difference between the amount of carbon dioxide in terms of summer and winter seasons.
Many emergency communications is based on mobile Adhoc networks. It suffers from restricted communication and hardware capabilities of mobile nodes. Dynamic key management is an important factor for all security goals in MANETs. In this paper we propose a scheme to generate the public and private keys through Euclid’s theorem. The forward and backward secrecy in creating the group key is done through Breadth First Search (BFS) and Depth First Search (DFS) traversals respectively. The group key evolved during this process ensures secured data transfer among the group nodes by encryption/decryption using group key. The proposed scheme enhances the computational complexity of the group key generation algorithm to provide effective and secure communication among the group nodes. The proposed scheme was simulated in NS2 to analyze the computational and communicational capabilities in group key management. This scheme proves more secured than other key management protocols in mobile Adhoc networks.