-
A Bi-objective VRPTW Model for Non-adjacent Products
Mohammad Hossein Sarbaghi Yazdi,
Farhad Esmaeili
Issue:
Volume 2, Issue 1, March 2017
Pages:
1-5
Received:
30 October 2016
Accepted:
26 December 2016
Published:
12 January 2017
DOI:
10.11648/j.ajset.20170201.11
Downloads:
Views:
Abstract: Vehicle Routing Problem (VRP) with time windows is a generalization of the classic VRP. Specifically, every customer must be met in a certain time window. Sometimes in the real life, it is not possible to carry different products simultaneously. In other words, these products are non-adjacent. This paper presents a comprehensive model for the vehicle routing problem with time windows and the possibility of delivery split of non-adjacent products. The proposed model is an extension of VRP considering the profit in a bi-objective optimization model.
Abstract: Vehicle Routing Problem (VRP) with time windows is a generalization of the classic VRP. Specifically, every customer must be met in a certain time window. Sometimes in the real life, it is not possible to carry different products simultaneously. In other words, these products are non-adjacent. This paper presents a comprehensive model for the vehic...
Show More
-
Slope Mass Rating Around Malekhu-Thopal Khola Corrider, Malekhu, Central Nepal Lesser Himalaya
Jaya Laxmi Singh,
Naresh Kazi Tamrakar
Issue:
Volume 2, Issue 1, March 2017
Pages:
6-14
Received:
29 October 2016
Accepted:
2 December 2016
Published:
20 January 2017
DOI:
10.11648/j.ajset.20170201.12
Downloads:
Views:
Abstract: The Malekhu-Thopal Khola area is rich in metamorphic rocks. The extension of road along the Malekhu-Thopal Khola can lead to the instability of stream bank slope. The road of the Malekhu Khola corridor has been extended from the Prithvi Highway to the southern remote area, and the road of the Thopal Khola corridor has been extended from the Prithvi Highway to the North in Dhading Besi. The study is focused on the Slope Mass Rating (SMR) of the road cut slope as well as the streambank slopes along the Malekhu Khola and the Thopal Khola (Malekhu-Dhading road).The result shows that the 38% slope of the study area is stable in terms of plane failure. The slopes lying across the Malekhu Formation and the Kalitar Formation are unstable. Considering the slopes in terms of toppling failure, 41% of the slopes are found to be stable, whereas some range from partially stable to stable slopes to the partially stable to the unstable slopes. Similarly, 50% of the slopes are stable to partially stable in terms of wedge failure, whereas some other slopes lying in the Fagfog Quartzite, Malekhu Limestone, Kalitar Formation and the Kulekhani Formation lie in unstable slope category. If the slope stability of the whole stream corridor is considered, only 20–25% of the slope area is completely stable while the remaining is vulnerable due to various slope failures.
Abstract: The Malekhu-Thopal Khola area is rich in metamorphic rocks. The extension of road along the Malekhu-Thopal Khola can lead to the instability of stream bank slope. The road of the Malekhu Khola corridor has been extended from the Prithvi Highway to the southern remote area, and the road of the Thopal Khola corridor has been extended from the Prithvi...
Show More
-
Winds Generated by Flows and Riemannian Metrics
Savin Treanţă,
Elena-Laura Dudaş
Issue:
Volume 2, Issue 1, March 2017
Pages:
15-19
Received:
22 December 2016
Accepted:
9 January 2017
Published:
24 January 2017
DOI:
10.11648/j.ajset.20170201.13
Downloads:
Views:
Abstract: The winds theory is based on PDEs whose unknown is the velocity vector field depending on time and spatial coordinates. The geometric dynamics is formulated using ODEs associated to a flow and a Riemannian metric, where the unknown is the velocity vector field depending on time. In this paper, we join these ideas showing that some geometric dynamics models generate winds. The second part of this paper is focused on the stability analysis of the considered models.
Abstract: The winds theory is based on PDEs whose unknown is the velocity vector field depending on time and spatial coordinates. The geometric dynamics is formulated using ODEs associated to a flow and a Riemannian metric, where the unknown is the velocity vector field depending on time. In this paper, we join these ideas showing that some geometric dynamic...
Show More
-
Fine Particle Processing of Some Indian Iron Ore Slimy Tails from Orissa and Karnataka
B. P. Ravi,
S. J. G. Krishna,
M. R. Patil,
P. S. Kumar,
P. C. Naganoor,
C. Venkatiah,
S. Umesh
Issue:
Volume 2, Issue 1, March 2017
Pages:
20-23
Received:
29 August 2016
Accepted:
12 October 2016
Published:
24 January 2017
DOI:
10.11648/j.ajset.20170201.14
Downloads:
Views:
Abstract: Restriction in production of ore and Closing down Iron ore mines, spurred the mines to look for alternative routes like processing of BHQ/BHJ waste rock or processing of iron ore slimy plant tails. The latter route was logically and scientifically attractive as pellet grade concentrates may be produced at low cost with a possibility of partial reclamation of tailing pond area and mitigating vexed tailing pond management problem. The fine particle of processing of slimy tails has been addressed either by flotation or wet high intensity high gradient separation. This paper furnishes a few case studies of fine particle processing of some iron ore slimy tails spread across Orissa assaying 27% to 57% Fe, with 32 to 80% -10 microns slime content. The results indicate that it is possible to produce pellet grade concentrates and / or Cement grade concentrates with appreciable wt.% yield for different types of slimy tails varying in granulometry, silica, alumina and hydrated – anhydrous iron oxide content. In some cases, the above process also paved way for nil waste process where in the alumina rich tails produced may be used in local building material and pottery industry.
Abstract: Restriction in production of ore and Closing down Iron ore mines, spurred the mines to look for alternative routes like processing of BHQ/BHJ waste rock or processing of iron ore slimy plant tails. The latter route was logically and scientifically attractive as pellet grade concentrates may be produced at low cost with a possibility of partial recl...
Show More
-
Model Design for an Efficient Multi Functional Power Saver
Titus Mutavi Mutunga,
Nicholas Muthama Mutua,
Nicodemus Muoki Sakayo
Issue:
Volume 2, Issue 1, March 2017
Pages:
24-32
Received:
20 November 2016
Accepted:
14 January 2017
Published:
9 February 2017
DOI:
10.11648/j.ajset.20170201.15
Downloads:
Views:
Abstract: We have designed a system which acts as power saver cum temperature display. It provides power to the fan and works only when somebody is in the room. In the absence of persons in the room, power is turned off and fan stops rotating. In addition, when somebody is in the room it will display the temperature and set the fan speed based on the temperature. The higher the temperature the higher the speed of the fan. The study details the design procedure along with construction and test information. A block of the entire power saver has been done. The block shows connections of the different modules. PCB design and testing of the entire system is analyzed.
Abstract: We have designed a system which acts as power saver cum temperature display. It provides power to the fan and works only when somebody is in the room. In the absence of persons in the room, power is turned off and fan stops rotating. In addition, when somebody is in the room it will display the temperature and set the fan speed based on the tempera...
Show More
-
Armor on Digital Images Captured Using Photoelectric Technique by Absolute Watermarking Approach
Issue:
Volume 2, Issue 1, March 2017
Pages:
33-38
Received:
14 December 2016
Accepted:
14 January 2017
Published:
13 February 2017
DOI:
10.11648/j.ajset.20170201.16
Downloads:
Views:
Abstract: Nowadays digital image captured through Photoelectric Technique have undergone with malicious modifications. The proposed paper tells on a high quality recovery of digital document using absolute watermarking approach. The recoveries of lost informations are identified using bit values. Whereas the problem on recovering scaled, rotated and translated images exist still. Thus the absolute watermarking approach assures the recovery of digital images from any format of manipulations providing high quality pictures. The different sort of bits used for this purpose is classified into audit bit, carrier bit and output bit. Here the consistent feature of the original image is coded and the output bit is protected using a carrier encoder. This enables the audit bit to detect the erasure locations and retrieve the manipulated areas of the image with high quality pictures in low cost.
Abstract: Nowadays digital image captured through Photoelectric Technique have undergone with malicious modifications. The proposed paper tells on a high quality recovery of digital document using absolute watermarking approach. The recoveries of lost informations are identified using bit values. Whereas the problem on recovering scaled, rotated and translat...
Show More
-
TCP IP Header Attack Vectors and Countermeasures
Vincent O. Nyangaresi,
Solomon O. Ogara,
Silvance O. Abeka
Issue:
Volume 2, Issue 1, March 2017
Pages:
39-49
Received:
10 November 2016
Accepted:
31 January 2017
Published:
27 February 2017
DOI:
10.11648/j.ajset.20170201.17
Downloads:
Views:
Abstract: The TCP IP header has security vulnerabilities that make it prone to numerous kinds of attacks such as TCP SYN flooding, TCP RST, source quench, TCP session hijacking, TCP sequence number prediction, port scanning, CHARGEN and ECHO. The purpose of this paper was to investigate the attack vectors for various TCP IP header attacks and suggest possible countermeasures to curb these attacks. The goals were to gain an understanding on what makes the TCP IP header architecture vulnerable, so that appropriate countermeasures to address these shortcomings could be instigated; based on their performance in terms of their efficiency in curbing the various attack vectors exploiting these vulnerabilities. To achieve this, a combined experimental - simulation approach was employed using Wireshark network analyzer, Nmap, Ettercap, Aireplay-ng and Airodump-ng from Aircrack-ng suite software. A sample network utilizing the transmission control protocol was designed and some packets transmitted over it. The packet traffic volume, sequence numbers, acknowledgement numbers, associated protocols, TCP handshake and packets in flight were then studied. The results obtained indicate that the TCP IP header is indeed susceptible, most probably because the initial intent of the TCP was to share information and security was not a major concern at that time. However, as the internet is now open to the general public and not restricted to the department of defense where it was initially meant to serve, there is need to develop novel algorithms that could help mitigate the weaknesses inherent in the TCP architecture. This study is of help to network designers and administrators as it aids them to identify how to structure their networks for in-depth security by adding another layer of security at the TCP IP header level to support the network-based controls such as next generation firewalls.
Abstract: The TCP IP header has security vulnerabilities that make it prone to numerous kinds of attacks such as TCP SYN flooding, TCP RST, source quench, TCP session hijacking, TCP sequence number prediction, port scanning, CHARGEN and ECHO. The purpose of this paper was to investigate the attack vectors for various TCP IP header attacks and suggest possibl...
Show More
-
Galvanic Skin Response as a Estimation Method of the Driver's Emotional State
Oleksii Prasolenko,
Dmytro Burko,
Andrii Halkin
Issue:
Volume 2, Issue 1, March 2017
Pages:
50-56
Received:
31 October 2016
Accepted:
16 February 2017
Published:
1 March 2017
DOI:
10.11648/j.ajset.20170201.18
Downloads:
Views:
Abstract: The functioning of any transport system does not seem possible without a meaningful human interaction. Moreover, the human is the organizer of the transport processes and systems. At the same time, even the advanced transport technologies, designed and operated without due attention to the human factor, it is not enough based on the ergonomics of work and life. However, the transport system is a subsystem of a higher hierarchy system functioning of city, region or some areas. The last one, have their main purpose - to provide citizens of ability to live. Obviously, people are been organizers, performers and objects of transportation process. And, rising attention to the driver in the transport system is become more and more interesting and actual in nowadays. Therefore, the research of human functional state interacting with road traffic in the city’s transport system is considerable interest. The aim of the paper is to estimate the emotional condition of the driver in difficult traffic situations. Using the method of galvanic skin response the relationship between the road conditions, driver’s actions on the road and his emotional state had found. The vehicle’s deceleration process and driver's functional state changes due to these actions had considered. The indicators for assessing the driver’s emotional state based on the method of galvanic skin response had proposed. The method of galvanic skin reaction of the person allowed assessing the driver's reaction to the conditioned stimulus - braking at stop sign.
Abstract: The functioning of any transport system does not seem possible without a meaningful human interaction. Moreover, the human is the organizer of the transport processes and systems. At the same time, even the advanced transport technologies, designed and operated without due attention to the human factor, it is not enough based on the ergonomics of w...
Show More