AMA, Agricultural Mechanization in Asia, Africa and Latin America (AMA) (issn: 00845841) is a peer reviewed journal first published online after indexing scopus in 1982. AMA is published by Farm Machinery Industrial Research Corp and Shin-Norinsha Co. AMA publishes every subjects of general engineering and agricultural engineering. Shenyang Jianzhu Daxue Xuebao (Ziran Kexue Ban)/Journal of Shenyang Jianzhu University (Natural Science) General Medicine (ISSN:1311-1817) Chinese Journal of Evidence-Based Medicine Zhongguo yi liao qi xie za zhi = Chinese journal of medical instrumentation Lizi Jiaohuan Yu Xifu/Ion Exchange and Adsorption Kexue Tongbao/Chinese Science Bulletin Dalian Haishi Daxue Xuebao/Journal of Dalian Maritime University
AMA, Agricultural Mechanization in Asia, Africa and Latin America (ISSN: 00845841) is a peer-reviewed journal. The journal covers Agricultural and Biological Sciences and all sort of engineering topic. the journal's scopes are in the following fields but not limited to:
In this paper, a 4 × 4 Butler matrix (BM) switched-beam patch antenna array is designed and discussed. The design is developed on a single layer of Rogers material; RO 5880 with dielectric constant 2.2 and thickness 0. 254mm.This makes the designed antenna low cost and easy of fabrication. The four rectangular patches fed by inset microstrip lines are connected to the outputs of the BM. The results show wide bandwidth that covers from 24.67 GHz to 30.2 GHz in all the four inputs, and the highest array gain performance of 10.8 dBi at 28 GHz. The designed switched beam antenna provides a cost effective approach to implement at 28 GHz wireless communications.
Aluminium use has been rising steadily in recent decades. Several different industries are adapting it since its light weight, doable structure and robustness. Aluminium manufacturing runs in three ways; namely: (1) cascading, (2) extrusion and (3) drawing. Extrusion process is used to form aluminium in profiles which is one of the main semi/final-products for many industries. Although profiles production runs smoothly and easily most often, there are a number of repeated faults which might occurs during the extrusion process and some distinct patterns of faults and defects can be seen on the surface of the produced profiles. This paper describes the main types of these faults and defects and suggested solutions to avoid them based on 24 months of observations for the production process at three different extrusion machines in two different aluminium profiles manufacturing plants. The main aim of this study is to classify these faults and defects to help manufacturer to control and to avoid them or at least to minimize their occurrences by optimising quality control systems.
The spatial data contain a lot of points. The points consist of geographic coordinates. Representing the spatial data requires many calculating the geographic coordinates. Calculations of the coordinates take much time and reduce the performance. In order to enhance the performance of rendering the spatial data, performance enhancement for rendering the polygon which are in spatial data is needed. In this paper, we present that improving the performance of rendering for polygon by utilizing the scanline algorithm. The scanline algorithm has been widely used for rendering graphics systems. It fills inside of a given polygon. In order to filling the polygon, it requires some calculations and tables for storing the variables. Calculating and sorting the variables reduce the performance. We propose a method which precomputes the variables used by the scanline algorithm. By using proposed method, it can reduce the processed time. Proposed technique can be utilized to zoom in and out the map. We implement the proposed method and perform the experiment with Tiger/Line spatial data. We compare the processing time between scanline algorithm and proposed method.
Computer Networks and Internet has become very famous nowadays since it satisfies people with varying needs by providing variety of appropriate services. Computer Networks have revolutionized our use of computers. Online bills, shopping, transactions and many other essential activities performed on the go by just a single click from our homes. Though it is a boon in this era, it also has its own risks and weaknesses too. Industries need to tussle to provide security to their networks and indeed not possible to offer a cent per cent security due to the intangible intelligence of hackers intruding into the network. This paper exploits the concept of honeypots for providing security to networks of industries which may not have custom intrusion detection systems or firewalls. The proposed model captures the various techniques used by hackers and creates a log of all hacker activities. Thus using this log, the production network system can be prevented from attackers.
The information fortune and the connectivity are provided by the universe of E-commerce over an enormous distance at all time. In an open and distributed environment the buyers or providers will not act in a mutually understood or agreed manner by which the incomplete practices and fraudulent activities happen. So in any online transaction the security and trust are two important factors that are to be considered. In Ecommerce markets the above mentioned problems are criticized as the most important barriers. In order to improve these barriers a trust based third party mechanism is successfully adopted as a self-regulatory system to improve the buyer and seller trust. The online transactions are made very easy now days by E-commerce technologies. Built integrity belief approach (BIB), Support Vector Mechanic approach (SVM) and Random Number Generation approach (RNG) are the three approaches which are mainly used in this paper for online trust management. The seller and the buyer communication will be handled through the trusted third party. Apart from this a coupon based approach is introduced as an advancement in this paper for providing discount schemes which is helpful in attracting the customer who purchase beyond the threshold level fixed by the seller. Moreover a product review study is integrated in order to reduce the scam reviews in online transactions.