1
10
212
-
https://eprints.ibu.edu.ba/files/original/48f9460e40fa473505c66f5c647e924d.pdf
f20cf4f9e71b400ecca2d6b78e11085d
PDF Text
Text
1st International Syposium on Sustainable Development, June 9-10 2009, Sarajevo
A Blind Video-Steganography Technique Based on Visible Light
Wavelength for Raw Video Streams
Özdemir Çetin
Computer Systems Education, Sakarya University, Sakarya,Turkey
ocetin@sakarya.edu.tr
Ah met Turan Özcerit
Computer Systems Education, Sakarya University, Sakarya,Turkey
aozcerit@sakarya.edu.tr
Abstract: Steganography techniques, which are a set of data hiding algorithms utilizing
mathematical methods, have revealed significant advancement by means of latest computing
technologies. Although many distinct steganography techniques have been suggested and
implemented, an ideal solution has not been reached so far. The primary objective for
steganography is to achieve a secure data transfer through a communication channel without
attracting attention of unauthorized third parties. Since encryption methods do not meet the
steganography requirements, a couple of data masking methods are also required. The
performance of a steganography method can be assessed with the statistical similarity between
cover media and stego media. In this paper, we have developed a blind steganography
technique based on Human Vision System (HVS) using visible light wavelength approach. The
proposed technique maintains virtually imperceptible alterations in the stego-video by means
of the HVS approach. In addition, the technique developed does not require the cover video in
the recovery phase so that it provides more secure manner in many types of applications.
1. Introduction
Accessing digital data has not been so easy ever with the dawn of the Internet, especially in the last
decade. This reality has also caused many troubles that have not been considered before such as privacy,
security, and sharing. In order to create feasible solutions to such issues, many researchers have focused on
cryptographic techniques in company with data embedding and data hiding techniques e.g. steganography and
watermarking. Although both steganography and watermarking techniques present similar properties, each
technique retainsindividual purposes. Whilethe former is usually used for secure data com munication,thelatter
is used for copyright protection intents (Cetin 08).
In Steganography,the secret datais usually embedded into multimedia files(image, video, audio, etc.).In
addition, the media files in the end of steganography routines can be used directly at the destination without
requiring extra decrypting procedures. The most distinctive feature of the steganography compared to
cryptography isthat unauthorized individuals are not aware ofthe hidden datainthe stego-media (Cetin, Ozcerit
08)
Initial steganography techniques have been first applied to images; however, the video streams have
attracted a lot attention recently since they can assure a large amount of capacity increase for hidden/secret data
(Koz&Alatan 05). The hidden data can be embedded eitherinto image or into audio part of the video streams.
The DCT (Discrete Cosine Transform) and the D WT (Discrete Wavelength Transform) are the most frequently
used methods forthese purposes.
In this paper, we developed a new technique to determine the appropriate pixels, which are the target
regionsto store hidden data,in the cover-video frames based on the HVS method. Besides,the chief objective of
this study isto keep the perceptibilitylevel ofthe secret data in the cover video as much as insignificant so that
external suspicions or attacks can be prevented. In order to realize these requirements,the HVS method is used
and supported by visible light wavelength and the color deficiency of human vision at extreme frequencies. We
have evaluated the picture quality difference between the stego-video and cover-video with the PSNR (Peak
Signalto Noise Ratio) criterion.
385
�1st International Syposium on Sustainable Development, June 9-10 2009, Sarajevo
2. Previous Work
One of the first studies on raw video steganography developed by Hartung and Girod and they were
inspired from spread spectrum com munication (Hartung& Girod 96). Hartung also applied data embedding
techniques directly on raw video streams.Inthe recovery phase ofthe secret data,a correlation method is used at
the receiver side and the secret data capacity achieved up to 50 bit/s according to the experimental results.
Hartung applied his method to the compressed video streams by embedding secret data into either intra-frames
(I-frames), forward predicted frames (P-frames) or bi-directional predicted frames (B-frames) of the MPEG
video. The secret datais embedded intothe frames using 8×8 DCT coefficients. Hartung claimed that his method
achieved more robust outcome against standard signal attacks according to the obtained results(Hartung&Girod
98).
In another study, Swanson proposed the multi-scale watermarking method in which temporallow-pass
and high-pass frames are obtained by applying temporal wavelettransform to each frame (Swanson et al. 98).
However,the original video stream is needed to recover the watermarking data and thisrequirement can be
considered as a serious drawback.
3. Proposed Steganographic Algorithm
In this work, we have designed and developed a new data hiding method for raw video streams based on
the HVS (Cetin 08). Unlike earlier studies, the method developed uses visible light wavelength approach to
determine the most appropriate pixel locations, in which the bytes of secret data are stored, in the cover video
frames. We have utilized the imperceptiblelight wavelengths (ultraviolet,infrared) forthis purpose (Jonathan et
al. 99).
In Figure-1, the process steps of the proposed algorithm are illustrated as a block diagram. Having
selected the embedding method,the secret datais embedded intothe cover video by means of specially designed
embedding and coding algorithms. The stego-video obtained isthen forwarded into the com munication channel
i.e. Internet. At the receiver side, the extraction methods are selected first in accordance with the methods
determined at the sender side. The stego-video is then applied to selected extraction and decoding procedures
and the secret dataisrecovered when all procedures is completed.
Secret
File
Cover
Video
Embedding
Algorithm
Stego
Video
Communication
Channel
Stego
Video
Coding
Algorithm
Extracting
Algorithm
Secret
File
Coding
Algorithm
Figure-1 General block diagram forthe proposed algorithms
3.1. Visible Light Wavelength Approach
In wavelength approach,the data embedding procedures are implemented by utilizing the imperfection of
the color vision. The pillar of the approach is based on the determination of appropriate pixels in the video
frames by the help of visible light spectrum data perceived by the HVS. The pixels having the boundary values
(~380nm or ~750nm) of visiblelight spectrum in the cover video frames,in which the secret data is stored, are
determined. In other words, the pixels having a wavelength in the range of infrared or ultraviolet colors are
searched forinthe cover video frames.Itis a well-known factthatthe human eyes cannoteasily perceive minute
changes atthe visiblelight spectrum extremities.
The data embedding procedures are initiated by the segmentation of cover video into the frames. The
wavelength values of each pixel in the frames of cover video are resolved by the developed algorithm. Since
each pixel has three color compounds (Red, Green, and Blue), each color compound of the pixels are
individually recorded into atable as given in Table-1. However, only a particular wavelength range (380-400nm
386
�1st International Syposium on Sustainable Development, June 9-10 2009, Sarajevo
or 730-750nm) of each color compound is significant for the pixel selection procedure. The corresponding
wavelength range ofthe R, G, and B compounds are also listed for violet and red colorsin Table-1 accordingly.
Wavelength
Violent: 380∼400
Red: 730∼750
R - color intensity
97∼130
161∼200
G - color intensity
0∼30
0∼30
B - color intensity
97∼175
0∼50
Table 1. Wavelength range of primary colors
For instance, a pixel having an RGB (100,0,105) code can be evaluated as appropriate pixel for data
embedding procedures according to Table-1. Having determined the appropriate pixels in video frames, the
secret data is embedded into those selected pixels by the developed algorithms. In this step,the modified pixels
are further checked to see whether their current wavelength is within the acceptable limits.If so, each pixel is
labeled as “1” meaning appropriate, otherwise labeled as “0” meaning inappropriate.
The amount of pixel wavelength deviation is one of the most crucial criteria for pixel selection
procedures. The wavelength deviation should be kept to the minimum for the perceptiveness, which is another
important criterion for data embedding method quality assessment.In other words,the stego-video stream should
notimply a manipulation in the video frames during the movie.
4. Experimental Results
We have evaluated the performance of our steganography method based on both capacity and
perceptiveness criteria. Inthe performance evaluation stage,the ‘vipmen.avi’ video fileisselected and used as a
reference since itis a very popular experimental video stream among researches and itisa raw type video (AVI)
stream as well. The experimented vipmen.avi video file has 283 frames and each frame consists of 160x120
pixels.
In the evaluation period, in order to measure the statistical quality of stego-video streams, the PSNR
(Peak Signalto Noise Ratio) parameter has been used. The PSNR value presentsthe similarity ratio between the
original video and stego-video. Typically accepted range ofthe PSNR is between 30dB and 50dB for statistical
quality parameter which is computed at the end of each statistical calculation period (Netravali&Haskell 95).
The higher valuesimply high degree of similarity between the original video and stego-video. Since each person
has a distinct sense of color and color tones, the PSNR metric cannot provide a perfect evaluation criterion.
Therefore, we have used 12 people astest subjects creating another criterion to validatethe methods developed.
To compute the PSNR parameter between two video files, the MSE (Mean Squared Error) value is
calculated first(Netravali&Haskell 95). Either Equation-1 or Equation-2 can be used forthe calculation.
1 m −1 n −1
MSE =
∑∑ I(i, j) − K(i, j)
mn i =0 j= 0
∑ [I(i, j) − K(i, j)]
2
(1)
2
MSE =
M, N
(2)
M×N
K (modified video frame) and I(original video frame) parametersin Equation-1 are compared with each
other. The size of video isrepresented by m×n. The PSNR is computed having calculated the MSE value
according to Equation-3 (Rabbani&Jones 99).
MAX 2
PSNR = 10log10
MSE
(3)
The MAX parameterin Equation-3 representsthe bitsize ofeach pixel. For example,the M A X is 255
when the color depth is selected as 8-bit.
387
�1st International Syposium on Sustainable Development, June 9-10 2009, Sarajevo
Figure-2 Experimentalresults relating to the PSNR parameter
The experimental results obtained from data embedding procedures in the wavelength method have been
given in Figure-2. The data embedding algorithms developed have been executed for both a low data capacity
video labeled as ‘+’ and a high data capacity video labeled as ‘*’. As seen in Figure-2,the PSNR values for both
high data capacity video and low data capacity video are higher than 65dB, which is within acceptable limits
compared to the PSNR values forlossy image/video compression standards (Netravali&Haskell 95).
The secret data can be in compressed form such as ‘zip’ or‘rar’and inthis case, more storage capacity for
secret data can be achieved in the stego-video file. Another great advantage is that data compression
applications can also provide encryption technologies to some extent. Therefore, the secret data can be
compressed and encrypted before steganography in order to utilize the benefits of the applications mentioned
above.
5. Conclusion
A novel video-steganography method has been proposed to embed secret data into appropriate pixels of a
video stream based on visible light wavelength approach. The true advantage of this approach is to determine
appropriate pixels that have colors near to visible light wavelength limits i.e. infrared or ultraviolet and this
characteristic maintains a better mechanism to concealthe alterations implemented on the pixels because of the
weakness of the HVS. The experimental results show that obtained PSNR values for each scenarios are in the
acceptable limits and the developed algorithm have worked with the HVS without causing any significant
drawback.
References
Cetin, O. (2008), “A Data Embedding Algorithm Design for Video Applications Using a New Steganography Approach,”
Ph.D. dissertation, Elect.&Comp. Edu., Sakarya Uni., Sakarya, Turkey
Cetin, O., Ozcerit, A.T., (2008), “A Novel Video-Stego Method Based On HVS (ĐGS Tabanlı Yeni Bir Video–Sırörtme
Yöntemi)” 3rd Information Security&Cryptology Conference with International Participation, Ankara, Turkey, pp.84-88
Koz, A., Alatan, A., (2005), “Oblivious Video Watermarking Using Temporal Sensitivity of HVS”, Proceedings of the 2005
International Conference on Image Processing (ICIP 2005), Genoa, Italy, September 11-14
Hartung, F., Girod, B., (1996) “Digital watermarking of raw and compressed video” in Proc. SPIE 2952: Digital
Compression Technologies and Systems for Video Communication, Berlin, Germany, pp. 205–213.
Hartung, F., Girod, B., (1998), “Digital watermarking of uncompressed and compressed video”, Trans. Of Signal Processing
– Sprecial Issue on Copyright protection and Access Control for Multimedia Services, 66(3):283-301
Swanson, M.D., Zhu, B., Tewfik, A.T., (1998), “Multiresolution scenebased video watermarking using perceptual models”,
IEEE J. Select. Areas Commun., vol. 16, pp. 540–550, 1998.
Swanson,M.D. Zhu, B., Tewfik, A.T., (1997), “Data Hiding for Video-in-Video”, Proc.ICIP’97, Santa Barbara, CA, 2:676679.
388
�1st International Syposium on Sustainable Development, June 9-10 2009, Sarajevo
Cetin, O., Ozcerit, A.T., Cakiroglu, M., (2006), “A New Data Embedding Method into Motion Pictures” The 2006 World
Congress in Computer Science, Computer Engineering, and Applied Computing, Las Vegas, USA.
Jonathan, K.S., Hartung, F., Girod, B., (1999), “Digital Watermarking Of Text, Image, And Video Documents
Comput.&Graphics”, Vol. 22, No. 6, pp. 687±695, Elsevier Science
Netravali, A.N., Haskell, B.G., (1995), “Digital Pictures: Representation, Compression, and Standards (2nd Ed)”, Plenum
Press, New York
Rabbani, M., Jones, P.W., (1991), “Digital Image Compression Techniques”, Vol. TT7, SPIE Optical Engineering Press,
Bellvue, Washington
389
�
Dublin Core
The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.
Extent
The size or duration of the resource.
516
Title
A name given to the resource
A Blind Video-Steganography Technique Based on Visible Light Wavelength for Raw Video Streams
Author
Author
Çetin, Özdemir
Özcerit, Ahmet Turan
Abstract
A summary of the resource.
Steganography techniques, which are a set of data hiding algorithms utilizing mathematical methods, have revealed significant advancement by means of latest computing technologies. Although many distinct steganography techniques have been suggested and implemented, an ideal solution has not been reached so far. The primary objective for steganography is to achieve a secure data transfer through a communication channel without attracting attention of unauthorized third parties. Since encryption methods do not meet the steganography requirements, a couple of data masking methods are also required. The performance of a steganography method can be assessed with the statistical similarity between cover media and stego media. In this paper, we have developed a blind steganography technique based on Human Vision System (HVS) using visible light wavelength approach. The proposed technique maintains virtually imperceptible alterations in the stego-video by means of the HVS approach. In addition, the technique developed does not require the cover video in the recovery phase so that it provides more secure manner in many types of applications.
Date
A point or period of time associated with an event in the lifecycle of the resource
2009-06
Keywords
Keywords.
Conference or Workshop Item
PeerReviewed
Q Science (General)
-
https://eprints.ibu.edu.ba/files/original/112c9ea588a51351ec5948bddf70db2b.pdf
aa1d7539acd82b2cfe902579f662fe4a
PDF Text
Text
A Computer Based Flexible Real Time Fuel Controller System
Implementation for Four-Cylinder Internal Combustion Engines
Barış Boru
Sakarya Üniversitesi Teknik Eğitim Fakültesi
Elektronik-Bilgisayar Eğitimi, 54187 Esentepe/Sakarya
barisb@sakarya.edu.tr
Halil Đbrahim Eskikurt
Sakarya Üniversitesi Teknik Eğitim Fakültesi
Elektronik-Bilgisayar Eğitimi, 54187 Esentepe/Sakarya
eskikurt@sakarya.edu.tr
Adnan Parlak
Sakarya Üniversitesi Teknik Eğitin Fakültesi
Makine Eğitimi, 54187 Esentepe/Sakarya
parlak@sakarya.edu.tr
Abstract: In this study, a computer and microcontroller based fuel control system for fourcylinder internal combustion engines has been designed and some applications have been
implemented. Fuel control system designed for real time control the amount of fuel in
alternative fuel applications. System is suitable to use with both diesel and petrol engines. A
Graphical User Interface has been designed in computer side. The pc programme uses Fuzzy
Logic, Neural Networks and Curve Fitting calculation methods. The percentage of the fuel to
be sprayed has been defined according to the engine speed, load and fuel rack or throttle
position got from the engine. These physical signals have been controlled and read by
microcontroller based electronic circuit. Communication has been set using RS232 standard
between PC and microcontroller.
Introduction
Energy as the most important input for economic and social development, has been took place in all
world countries as an important agenda about 1970's (Tekin et al.,2004). Having limited amount of oil resources,
which is decreasing rapidly, economic and political differences, dependence on foreign countries and the air
pollution are important problems for all countries. To reduce the dependency on oil and to minimize the
problems about potential oil crisis in the future has brought up the researches about alternative fuels (Çetinkaya
et al.,1997, Salman et al, 1990). Using of fossil fuels and environmental awareness, has made the engineers and
scientists to oriented develop of clean, renewable and sustainable energy system (Yüksel et al., 2002, Borat et al.,
1992)
The reduction of harmful and pollutant emissions and the improvement of the engine performance are
today's most popular research subjects. For this purpose, many studies are performed by researchers and
automotive manufacturers. Lots of researches can be found in literature about using alternative fuels instead of
petrol or using alternative fuels with petrol. These researches have such aim like fuel costs lowering, increasing
engine performance with the same cost and eliminating or lowering percentage of exhaust gases, harmful to
atmosphere . These alternative fuels or substances are mostly alcohol, alternative fuels, liquefied petroleum gas
(LPG), biomass, natural gas, hydrogen, water and water vapour. These substances are alcohol, LPG, natural gas,
hydrogen, and biodiesel for engine performance and emissions are widely used as an alternative fuel.
While using the substances mentioned above, the effects on engine performance and engine emissions
should be well analyzed. According to the various researches it is clear that to have good results, it is very
important to use the correct fuel mixture amount or spray correct amount of fuel.
In other application, the alternative fuels are sprayed with a nozzle to the intake manifold by vacuum
effect. Unlike other studies, an injection system supported by on electronic programme has been developed to
spray alternative fuels with a certain rate. This system uses solenoid injectors to spray the fuel. It is targeted that,
732
�to build a such compatible fuel control system for all four-cylinder engine using alternative fuel. Since using
alternative materials in the engine is not dependent on a single parameter linearly. The injection signal cannot be
produced by a mechanical way. Because of nonlinear engine operating conditions and dependency of these
conditions more than one variable makes difficult to produce the injection signal by a typical electronic circuit
without a programme. In the system, the calculation methods, Fuzzy Logic, Neural Networks and Curve Fitting,
have been used to achieve high accuracy for all working conditions
The general structure of the system
The fuel control system designed consists of a computer programme and an electronic circuit controlled
by a 8051 based microcontroller. The connection between the microcontroller and the PC is provided with
RS232 serial protocol. Reading and controlling the physical data are carried out by the microcontroller.
Calculating of the fuel amount, the injection signal's length and timing are performed by the computer
programme. Block diagram of designed system can be seen in Figure 1.
Figure 1: Block diagram of the fuel control system
During the operation, mcu reads the inputs load, speed and fuel rack position momentarily and sends
them to the programme. According to these three values, the fuel amount is calculated and the injection signal's
timing and length will be determined by considering the injector parameters and advance angle and sent to the
mcu. After data is received mcu will constitute the injection signal related to angle read from encoder. So that the
desired amount of fuel is sprayed.
For determining the correct amount of fuel to be sprayed, it is very important to read momentarily working
conditions such as engine speed, fuel rack position and engine load. Measurement of this data has been done by
the microcontroller with a number of sensors. Angular velocity has been measured by digital absolute encoder
fitted to crank of engine. At the working conditions, the instant measurement and control of angle are needed to
provide a real time system. While the engine is running, encoder also has functions to determine upper dead
point and to produce the right signal to spray the fuel on start and end at the correct angles. Position of the fuel
rack of the engine has been measured with a potentiometer by mcu’s ADC unit. Potentiometer’s analogue output
voltage is been changing linearly according to fuel rack position. Engine load has been measured with a load cell
fitted to the engine dynamometer. Data acquired from the load cell have been read by mcu’s ADC unit and
digitally filtered by mcu programme.
Defining injector parameters
For a high precision control of fuel timing and amount, an injection signal must be produced according
to the parameters of the injectors. System is designed to be used with solenoid injectors. As known there are
opening and closing time delays in solenoid injectors caused by injectors coil windings (Zhao et al., 1999) These
delays causes a problem in which to construct the right injection signal length and spray the fuel with the right
advance angle. These delays must be well defined for the injectors. While the system is running for applying the
fuel to the engine in the right advance angle, it has to produce the injection signal before the real advance angle.
There is no linear correlation between injection signal length and sprayed fuel amount (Zhao et al.,
1999). In this work, it is aimed to control the amount of fuel as massively by a fuel control system. Hence, the
correlation between sprayed fuel mass and signal length must be well known.
733
�injector
ti
Precision
Balance
Figure 2: Injection signal and injector parameter measurement
While the system was designed, a set of experiments has been done for injector parameters
measurement. The system is designed to work under 3 bar standard fuel pressure. Experiments for measuring
injector parameters have been done under same conditions. For measuring correlation between the signal length
and the fuel amount, the injection signal having 50 mS period, has been applied in 1000 times. When the engine
is running on 1200 rpm single revolution takes 50 mS. Therefore, this period was accepted to fit the real working
conditions. During the tests, injection signals increased step by step. After finishing every step sprayed fuel
weight measured and divided to 1000 to find fuel consumption for each period (Fig. 2). The test results shown in
Figure 3 give the correlation between the injection signal length and the sprayed fuel amount.
50
Fuel Mass (mg)
40
30
20
10
0
0
2.5
5
7.5
10
Injection Signal Length (mS)
12.5
15
Figure 3: Correlation between the signal length and the fuel amount for a solenoid injector
While the system is running, the computer programme calculates the fuel amount with a selected
calculation method. Finally the signal length has been calculated by using the injector parameters obtained by
these results as shown in Figure 4. To produce the injection signal in a right time, the opening delays of the
injectors have also been used by the system.
td
ti
°Injection
Advance
Figure 4 Produced injection signal, td corresponds injector delay, ti corresponds injection signal length
User Interface
The core functions of the user interface is the setting a communication between pc and mcu and
providing a practical and visual platform to the user. The user interface designed can be seen in Figure 5.
734
�Figure 5: The User interface for the designed fuel control system.
Interface instantly shows input and output values in graphics to increase functionality and user
interaction. In the operation, these graphs are always updated for each input and output data pair.
Engine's fuel consumption which can be found from engine catalogue data or obtained by experimental
analysis, is a basis for all calculation methods. The user interface, designed uses fuzzy logic, neural networks and
curve fitting methods to perform calculations. Calculation method can be selected by the user. After calculation,
the fuel amount can be applied to the engine with different percentages defined by the user. However, it has a
manual control option to apply the fixed amount of fuel, entered by the user. The user can also enter the injection
advance. During the operation, the injection signal is generated according to the injector parameters and the
advance angle.
Received input values and calculated data are displayed on the user interface are also updated for each
input and output data pair. A test section, has been located on the user interface to test calculation method results
without sending them to the microcontroller. User can check whether the calculation method gives expected
results or not. Received input values and calculated data can be saved to the computer automatically by user
interface and they can be used for evaluating of results. Serial port connection settings, the injector parameters
and the engine fuel consumption data set can be changed by using the settings section of user interface. To use
the system with another engine and injector, user only need to enter new injector's parameters and engine fuel
consumption data set from settings section. Therefore the designed fuel control system can easily be adapted to
all 4 cylinder engines.
The system is ready for use after entering settings and choosing desired control options. The system can be
connected to mcu unit and started to control the fuel with real time data flow by clicking to connect button.
The calculation methods
In the designed fuel control system three different calculation methods have been used. All methods
have been designed to adapt themselves to new values when the engine fuel consumption data set changed. In
the calculation, artificial neural networks, fuzzy logic and curve fitting methods have been applied. All these
methods have been tried to produce an output corresponding to the three input values. As mentioned previously,
engine speed, load and fuel rack position are used as inputs. It is expected that the calculation methods will
determine the fuel amount for every new input value with minimum error based on the engine's fuel
consumption data set.
Engine Speed
Load(kg)
Fuel rack position
Fuel Consumption (mg)
1000
3,43
50
17,43
1000
4,45
77
29,24
1000
5,61
100
34,6
Table 1: Fuel Consumption Data set example
735
�The above examples in Table 1 are part of the example fuel consumption data set. The fuel consumption
data set can be obtained by the experiments that have been on the engine. The data set should be carefully
obtained because of the nonlinear relationship between the engine fuel consumption and input values. Engine
load and fuel rack position input are two values that can be changed by user. While data set is obtained by
changing these two values step by step, so as to cover minimum and maximum values of them. The smaller step
size the calculation method's error rate will be. Curve fitting method directly uses this data set to find what
interim values. Neural Networks use this data set as training data and estimate this data with minimum error.
This data set will be used for determining fuzzy logic rules by ANFIS method.
Inputs
Fuel Consumption
Data Set
Engine Speed
Calculation
Method
Output
Fuel
Amount
Fuel Rack Position
Load
Figure 6: Calculation Methods
The fuzzy logic controller for the system is designed with the Sugeno fuzzy inference method in
common structure, shown in Figure 6 .The designed fuzzy logic controller has three membership functions for
engine speed input, three membership functions for fuel rack position input and four membership functions for
load input. Fuzzy logic rules, for the controller have been determined by ANFIS method according to the engine
fuel consumption data set mean absolute error of. 2x10-4 was obtained with the controller from a four-cylinder
diesel engines date set. By experimental analysis it is achieved that the controller can find the values which are
not been in fuel consumption data set with mean absolute error of 0.02. According to this explanation given
above, the controller’s accuracy has been accepted as suitable for this work.
The neural network controller for the system is designed in Feed Forward Back Propagation structure.
Like other controllers the Neural Network controller has three inputs and one output. The Neural Network
Controller has three hidden layers in a structure of 8,13,7. For neural network controller training LevenbergMarquardt algorithm is preferred. Training was conducted with an error of 10-5 from a four-cylinder diesel
engines data set.
As another option for calculation method, 3. order curve fitting algorithm has been used in the system.
Corresponding fuel for interim input values, which are not in the fuel consumption data set, can be calculated
with curve fitting method.
Conclusions and Evaluation
For testing the system, ethanol as an alternative has been fuel applied to diesel engine It is known that if
ethanol is applied to diesel engines with appropriate percentages it reduces NOX emissions(Jiang, Q. et al).
During the experiments ethanol applied in a percentage of 3.75 %, 7.5%, 11.25% to the engine while the engine
was running in maximum position of fuel rack. Measured NOX emissions with ethanol injection and standard
NOX emissions are shown in the Figure 7. It can be seen that NOX emissions have been reduced by ethanol
injection as expected.
736
�Figure 7: Ethanol applied and standard NOX emissions
It is observed that the system can keep the fuel amount in fair values for optimum emissions and the
engine performance. In addition suitability of system for all alternative fuel applications on both diesel and
gasoline engines is another good result of this study.
To enhance the efficiency and accuracy of the system it will be better to transfer instant information
such as measured emission values and specific fuel consumption to the user interface. In such a structure, the
computer programme could be designed to optimize error rate in real time. Therefore it will not be required to
create a training set, so that a higher-performance and more practical fuel control system can be obtained.
References
Borat, O., Balcı, M., Sürmen, A., (1992), Đçten Yanmalı Motorlar”, Cilt 1, T.E.V. Yayını, Ankara.
Çetinkaya, S., Çelik, M. B.(1997), Buji Ateşlemeli Motorlarda Yakıt Olarak Metanol-Benzin Karışımlarının Kullanılması, 5.
Yanma Sempozyumu.
F. Zhao, M. C. Lai and D. L. Harrington (1999), Automotive spark-ignited direct-injection gasoline engines, Progress in
Energy and Combustion Science Volume 25, Issue 5, October 1999, Pages 437-562
Jiang, Q., Ottikkutti, P., Vangerpen, J., Vanmeter, D., The effect of alcohol fumigation on Diesel flame temperature and
emissions. SAE Paper No: 900386.
Juan F., Xian-Min M. (2009), Research on Fuel Injection Intelligent Control System, 978-1-4244-2800-7/09, ICIEA.
Salman, M. S., Sümer, M.(1990), Buji Ateşlemeli Motorlarda Etanol ve Etanol-Benzin Karışımlarının Motor Performansına
Etkileri, Politeknik Dergisi, Cilt: 2, Sayı: 2, S. 27-35.
Tekin, M., Yörük, S. (2004), Motorlarda Metanol Kullanımının Performans ve Çevre Đlişkileri, GO. Ü. Zile MYO, Otomotiv
Programı, TOKAT.
Yüksel, F., Yüksel, B. (2004), The use of ethanol-gasoline blend as a fuel in an SI engine”, Renewable Energy, No: 11811191.
737
�
Dublin Core
The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.
Extent
The size or duration of the resource.
623
Title
A name given to the resource
A Computer Based Flexible Real Time Fuel Controller System Implementation for Four-Cylinder Internal Combustion Engines
Author
Author
Boru, Barıs
Eskikurt, Halil İbrahim
Parlak, Adnan
Abstract
A summary of the resource.
In this study, a computer and microcontroller based fuel control system for fourcylinder internal combustion engines has been designed and some applications have been implemented. Fuel control system designed for real time control the amount of fuel in alternative fuel applications. System is suitable to use with both diesel and petrol engines. A Graphical User Interface has been designed in computer side. The pc programme uses Fuzzy Logic, Neural Networks and Curve Fitting calculation methods. The percentage of the fuel to be sprayed has been defined according to the engine speed, load and fuel rack or throttle position got from the engine. These physical signals have been controlled and read by microcontroller based electronic circuit. Communication has been set using RS232 standard between PC and microcontroller.
Date
A point or period of time associated with an event in the lifecycle of the resource
2010-06
Keywords
Keywords.
Conference or Workshop Item
PeerReviewed
Q Science (General)
-
https://eprints.ibu.edu.ba/files/original/f9b87a1b42ac107113d51ac97bdb1fb6.pdf
22d346dfefa9c31b48e9d2644d3546cc
PDF Text
Text
A Content Based Scheduling Approach for Wireless Sensor Network MACs
Nukhet Sazak
Faculty Of Engineering
Sakarya University, Sakarya, Turkey
nazak@sakarya.edu.tr
Ismail Erturk
Faculty Of Technical Education
Kocaeli University, Kocaeli, Turkey
erturk@socaeli.edu.tr
Murat Çakiroglu
Faculty Of Technical Education
Sakarya University, Sakarya, Turkey
muratc@sakarya.edu.tr
Etem Köklükaya
Faculty Of Engineering
Sakarya University, Sakarya, Turkey
ekaya@sakarya.edu.tr
Abstract: MAC protocols have direct control over radio which is the most energy
consuming part of a wireless sensor node. TDMA based WSN MAC protocols are more
energy-efficient than contention based counterparts. However, classical TDMA based
protocols are not appropriate for event driven WSN applications. There are some MAC
protocols assigning time slots to only source nodes. Our proposed protocol assigns a time slot
to one of the source nodes with same data. As a result it reduces data redundancy achieving
energy savings. The analytical expressions are given for the proposed MAC and its
performance is compared to the conventional E-TDMA protocol.
Keywords: Wireless Sensor Network, MAC, energy efficiency, event driven applications
1. Introduction
A WSN consists of many low-power, low-cost and multi-functional sensor nodes which can be densely
deployed either inside the phenomenon or very close to it (Akyildiz, 2002). The applications of WSNs are so
diverse such that the application range is only limited by the imagination (Sohraby, 2007). In these applications,
a number of sensor nodes are deployed in harsh networking environments. It is not easy and even impossible to
recharge or replace the batteries of the nodes (Kredo, 2007). Thus energy efficiency becomes one of the most
important design criteria for WSNs. There are many medium access control (MAC) protocols considering energy
efficiency as the primary goal in the literature since MAC has direct control over the radio that is the most
energy consuming part of a sensor node (Kredo, 2007).
A WSN MAC protocol manages how and when its nodes access the wireless channel to be able to use
the shared medium effectively and fairly. The sources of energy waste are idle listening, collision, overhearing
and control packet overhead (Ye, 2003). A collision occurs if two or more nodes attempt to transmit data at the
same time. Idle listening is another serious kind of energy waste, occurring when a sensor node listens the
channel to check whether there is data related to it. Overhearing takes place when a node receives messages that
are transmitted to other nodes. Transmitting control packets also causes energy waste since these packets do not
carry useful data. In designing an energy-efficient MAC protocol, these subjects should be carefully taken into
consideration.
In event driven WSN applications, nodes are prompted to transmit the related measurement values when
the specific conditions occur according to the application requirements (e.g. temperature threshold exceeds). The
neighbor nodes close to the phenomenon may sense and also might have to transmit the same data. This data
redundancy consequently results in energy waste. Then the slot assignment to only source nodes is not the
desired solution. A more energy efficient protocol is achieved by allocating slots to the only one of the nodes
413
�with same data. The aim of this presented study is to propose a new idea for energy efficient TDMA-based MAC
protocols by assigning slots to only the nodes that have different data in event driven WSN applications.
2.
Related Work
In energy-efficient TDMA (E-TDMA) protocol, the energy consumption in idle mode is reduced by
letting the non-source nodes turn off their transceivers in their own slots (Li and Lazarou, 2004).
Bit-map assisted (BMA) MAC (Li, 2004) (Li and Lazarou, 2004) is also schedule-based. BMA is
designed for event driven WSN applications in which sensor nodes transmit data only when they sense
significant/predefined events. The operation of BMA is also divided into rounds including a set-up and a steadystate phase. The steady-state phase is partitioned into sub sessions consisting of contention period, data
transmission period and idle period (Figure 1). The size of the data transmission period is variable because every
node does not always data to send. On the other hand, the sum of the data transmission and idle periods is equal
to a constant value. All of the nodes turns their radios on during every contention period. The contention period
follows a TDMA-like schedule. Each node is assigned a time slot and it transmits 1-bit control message if it has
data. Otherwise, it leaves that slot empty. After contention period completed, the CH knows the source nodes,
prepares a transmission schedule and broadcasts it. The system followed enters the data transmission period. If
none of the member nodes has data to transmit, the system enters the idle period until the next session.
Throughout data transmission period, source nodes turn on their radios in their allocated slots and transmit the
data to the CH. The other member nodes keep their radios off during the data transmission. In idle period, the
radios of all the member nodes are off. BMA is an appropriate protocol for low traffic conditions since it easily
outperforms TDMA and E-TDMA in low and medium traffic loads.
3.
The Basics of the Proposed Method
The proposed idea for the MAC protocols consists of rounds including set-up and steady-state phases as
in the other scheduled protocols. In set-up phase, cluster head is chosen and the cluster is formed according to a
specific mechanism. There is a contention period as in BMA in steady state phase (Figure 2). However, source
nodes transmit the difference data between the threshold and measurement values instead of declaring whether
they have data or not by sending 1-bit in BMA. Therefore 4-bits slot is allocated to each node. When the nodes
sense the values equal or bigger than the predefined threshold value, called as source nodes, they transmit the
difference data between the threshold and measurement values in those 4-bits slots. Thanks to this, the CH not
only knows the source nodes but also the nodes having same data and assigns data slots according to this
knowledge.
A large number of nodes with predetermined temperature threshold in an example application are
deployed randomly and densely by plane over the forest. The nodes which measure at least the threshold value
are called source nodes. The source nodes transmit the difference data during contention period. The non-source
nodes are in idle mode in their own 4-bits slots. The CH compares the difference data from source nodes and
assigns data slot to the only one of the nodes having same data. In this way, different measurements are
transmitted in data transmission period after the contention period.
Figure 2. Illustration of single round for BMA protocol (Li, 2004).
414
�Figure 2. Illustration of single round for our proposed protocol.
P t:
T d:
Ein:
P i:
P r:
T c:
Tch:
l:
N:
p:
n:
transmit mode power consumption
time required to transmit/receive a data packet
energy consumption of an idle node
power consumption of an idle node
receive mode power consumption
time required to transmit/receive a control packet
time required for the CH to transmit a control packet
number of frames
number of nodes
probability
number of source nodes n=Np
3.1. Our Proposed Method Used in a Simple MAC
p' : probability
m: number of source nodes which are assigned data slots (number of source nodes having different data)
m= np'
(1)
Energy consumed by a source node in a frame
Edn = Pt(Tc+(3N/ data rate))+ (N-1) Pi Tc+(3N/ data rate)) + PtTd + PrTch
(2)
Energy consumed by a non-source node in a frame
Ein= NPi(Tc+(3N/ data rate)) + PrTch
(3)
The CH consumes nPr (Tc+(3N/ data rate)) + (N-n) Pi (Tc+(3N/ data rate)) + PtTch and mPrTd in the data
transmission period
(4)
Ech = nPr (Tc+(3N/data rate))+ mPrTd + (N-n) Pi (Tc+(3N/data rate)) + PtTch
Total energy consumed during a round in the proposed protocol
EPROPOSED = l[n(Pt(Tc+(3N/ data rate))+ (N-1) Pi (Tc+(3N/ data rate)) + PrTch)+ mPtTd +
(N-n)( NPi(Tc+(3N/ data rate))+ PrTch)+ nPr(Tc+(3N/ data rate))+ mPrTd +
(N-n) Pi (Tc+(3N/ data rate)) + PtTch]
(5)
3.2. E-TDMA Protocol
Energy consumed by a source node in a frame
Edn= Pt Td
(6)
Energy consumed by the cluster head
Ech= nPrTd + (N-n) PiTd
(7)
Energy consumed by the cluster head to transmit a control packet
Ech= PtTc
(8)
Energy consumed by each node to receive a control packet
En= PrTc
In set-up phase, total energy consumption
415
(9)
�EC= PtTc + NPrTc
(10)
Total energy consumed during a round in E-TDMA protocol
EE-TDMA = PtTc + NPrTc + l [nPt Td + (N-n) Pi Td + nPrTd]
(11)
4. Performance Analysis
Rockwell’s WINS model (Raghunathan, 2002) is used for numerical analysis. Transmitting power is
462 mW, receiving power is 346 mW, idle listening power is 330 mW and data rate is 24 kbps for transceiver.
Assume a data packet size of 250 bytes, a control packet size of 18 bytes and Pi=Pe, Tch=Tc. The graph of energy
consumption versus p and p' probabilities are shown in Figure 3 for number of frames (l) 2 and number of nodes
(N) 10.
2
energy consumption (Joule)
E(E-TDMA)
E(PROPOSED)
p'=0.25
1,8
1,6
1,4
1,2
1
0,8
0,6
0,4
0,2
0
0,1
0,2
0,3
0,4
0,5
0,6
0,7
0,8
0,9
1
p
Figure 3. Energy consumption versus probability.
The energy consumed by the CH for comparing difference data from source nodes is ignored in energy
computations. Transmitting 1 kb data over 100 meters is approximately the same as executing 3 million
instructions (Pottie, 2000). Considering the energy consumption in communication is higher than the one in
computation, it is clear that the proposed protocol will provide energy-efficient results even the energy
consumption of computation is included.
Although the source-to-cluster-head control message is only 1-bit long in BMA protocol, control packet
includes other MAC level overhead information plus 1-bit control message (Lazarou, 2007). In computations,
three times the number of nodes (3N) bits are added to the control packet length to allocate 4-bit slot for each
node since the contents of the control packet is unknown and it has already N bits.
The p' denotes the probability what fraction of the source nodes have the same data and hence the
percentage of the source nodes assigned data slots. Since slot assignment is realized without considering the
contents of the data in E-TDMA protocol, energy consumption values of E-TDMA does not vary with p'. The
effect of the p' on our proposed protocol is seen in the graph. The more p', the more source nodes assigned data
slots and the more source nodes having different data. The 25% of the source nodes transmits data, this protocol
is more energy efficient than E-TDMA.
5. Final Remarks
We present an idea for TDMA-based MAC protocols which offer data slot assignment by considering
source nodes transmitting same data in event driven WSN applications in this paper. In this approach, contention
period is increased because of transmitting difference data in 4-bits slots instead of 1-bit slot. On the other hand,
number of assigned data slots is decreased, which results in energy saving. The energy efficiency of the proposed
method is shown by comparing to the E-TDMA.
References
Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., & Cayirci, E. (2002). A Survey on Sensor Networks, IEEE Communications
Magazine.
416
�Kredo II, K., & Mohapatra, P. (2007). Medium Access Control in Wireless Sensor Networks, Comput. Networks, Vol. 51,
No. 4, pp. 961–994.
Lazarou, G.Y., Li, J., & Picone, J., (2007). A Cluster-based Power-efficient MAC Scheme for Event-driven Sensing
Applications, Ad Hoc Networks, Elsevier, Vol.5, Issue 7, pp. 1017-1030.
Li, J., Lazarou, & G. Y. (2004). Modeling the Energy Consumption of MAC Schemes in Wireless Cluster-Based Sensor
Networks, Proceedings of the 15th IASTED International Conference on Modeling and Simulation (MSO), pp. 313-318,
Marina del Rey, California, USA.
Li, J., & Lazarou, G.Y. (2004). A Bit-map Assisted Energy-efficient MAC Scheme for Wireless Sensor Networks, in
Proceedings of 3rd International Symposium on Information Processing in Sensor Networks (IPSN’04), pp. 55-60,
Berkeley, California, USA.
Li, J., (2004). A Bit-map Assisted Energy-efficient MAC Scheme for Wireless Sensor Networks, M.Sc. Thesis, Electrical
Engineering, Missippi State University.
Pottie, G.J., & Kaiser, W.J. (2000). Wireless Integrated Network Sensors, Commun., ACM, 43(5), 51-58.
Raghunathan, V., Schurgers, C., Park, S., & Srivastava, M.B. (2002). Energy-aware Wireless Microsensor Networks, IEEE
Signal Processing Magazine, pp. 40-50.
Sohraby, K., Minoli, D., & Znati, T. (2007). Wireless Sensor Networks: Technology, Protocols, and Applications, John
Wiley & Sons, pp. 75-229.
Ye, W., & Heidemann, J. (2003). Medium Access Control in Wireless Sensor Networks, USC/ISI Technical Report ISI-TR580, http://www.isi.edu/~johnh/PAPERS/Ye03c.html.
417
�
Dublin Core
The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.
Extent
The size or duration of the resource.
537
Title
A name given to the resource
A Content Based Scheduling Approach for Wireless Sensor Network MACs
Author
Author
Sazak, Nukhet
Erturk, Ismail
ÇAKIROGLU, Murat
Köklükaya, Etem
Abstract
A summary of the resource.
MAC protocols have direct control over radio which is the most energy consuming part of a wireless sensor node. TDMA based WSN MAC protocols are more energy-efficient than contention based counterparts. However, classical TDMA based protocols are not appropriate for event driven WSN applications. There are some MAC protocols assigning time slots to only source nodes. Our proposed protocol assigns a time slot to one of the source nodes with same data. As a result it reduces data redundancy achieving energy savings. The analytical expressions are given for the proposed MAC and its performance is compared to the conventional E-TDMA protocol.
Date
A point or period of time associated with an event in the lifecycle of the resource
2010-06
Keywords
Keywords.
Conference or Workshop Item
PeerReviewed
Q Science (General)
-
https://eprints.ibu.edu.ba/files/original/b1d854880e25442ae2da9189483841aa.pdf
996894c7361f6f2ed07de97048ca8187
PDF Text
Text
A Functional Based Simulator for the 8051 Microcontroller
Ahmet Turan Ozcerit
Sakarya University, Technology Faculty,Sakarya, Turkey
aozcerit@sakarya.edu.tr
Necat Guney
Izzet Baysal Vocational High School, Bolu, Turkey
necatguney@hotmail.com
Abstract: In this paper, a functional based simulator has been designed to facilitate the
education of the 8051 microcontroller, which is used widely in today's engineering and
educational purposes. In the realization of the simulator, a PC-based program is developed in
a way to make easy to follow the contents of the registers and flags of the running an 8051coded assembly program. Another important contribution fulfilled is a toolbox, which can
easily be connected to the ports of the microcontroller using as switch, button, display, etc.
The units in the toolbox can also be connected after compilation period. By the help of this
facility, the simulator can be used as a virtual microcontroller development board. Such
properties simplify to understand the internal architecture of the 8051 microcontrollers for
students and designers.
Introduction
Microcontrollers, apart from microprocessors, can handle many industrial tasks in effort free manner
and they are mostly proper answer for tight budgeted projects. They can be frequently called as embedded
computer since they can be used as a single chip for industrial solutions. Reprogramming property of these chips
attracts many designers to overcome various practical applications along with electrical control purposes.
Electronics hobbyists and engineering students are also primary target groups for embedded
microcontroller chips. Many electrical or computer engineering departments from all over the world include
microcontrollers in their course curriculum along with assembly programming. Since these courses mostly cover
practical side of the microcontrollers, an experimental based laboratory is required. However, experimental
laboratories are not appropriate solution when financial or spatial shortcomings are inevitable (Smith M. R., Cheng
M, 1996) . Using software-based simulators can offer affordable alternatives to hrdware based experimental kits.
Nevertheless, there are some limitations for almost every simulator, for example, simulators cannot always run
in real-time mode, neither debugs timing problems of the real system (TOPALOGLU N., 2002).
Related Works
In the past, many microprocessor simulator tools were designed and used by commercial purposes.
However, there are some examples were designed by educational and academic purposes. For example, C. W.
Caldwell et al. (Caldwell C., et al., 1995) proposed a graphical microprocessor simulator to be used in engineering
classes. By using their simulator, the students could also reach to see internal registers and computational details
of the microprocessors. Another simulator was designed for 68HC11 microcontroller at South Carolina
University in microcontroller programming courses for the students attending mechatronics engineering
department. Students could monitor each minute detail of the microcontroller such as RAM, ROM contents,
ports, serial interface, timers, etc. This simulator also enabled students to debug the designed system. At the end
of the course, many students focused on industrial applications that could be completed by microcontrollers
(Giurgiutiu V., et al., 2005).
In another paper, interpreter-based and compiler-based simulators were united in one simulator in order
to utilize the best features of both techniques (Reshadi M., et al., 2003) Interpreter-based simulators are preferred
388
�for flexibility and detailed operations while compiler-based simulators are used for fast simulations. The
simulator designed blended both simulators to increase the flexibility and performance of the operations to
balance each parameter. The simulator we designed has aimed to teach students the use of instruction set and
assembly programming of 8051 microcontrollers.
The Component Details of the Simulator
The 8051 simulator we designed has eight windows as seen in Figure-1:
• Code editing window
• Code compiling and error message window
• Program run control window
• Program code window
• Internal RAM window
• External RAM window
• Special Function Registers (SFRs) window
• Input/Output ports window
Figure-1: Main components of the 8051 simulator
Code editing window can be used either for new codes or for the codes loaded from the disk. In this
window, the program can be entered in 8051 assembly language. Once the program is assembled, a window is
appeared to display assembler result as indicated in Figure 2.
389
�Figure 2. Compile window showing assembler results
At this stage of the simulator, we have used standard ASM51.exe to assembly target assembly coded
files. Entire hex code, list code program development cycle is illustrated in Figure 3. Hex files can either be used
in many simulator programs, emulators or can be downloaded into a target 8051 derivative chip by programmer
software or a programmer device.
Code editing
*.asm file
ASM51.EXE
assembler
*.lst and
*.hex
files
Figure 3. Development cycle of hex and list files
In the list file, program assembly codes, corresponding hex codes, and code memory addresses are
created as seen in Figure 4. While the first column represents the memory address of corresponding assembly
codes, the second is for opcodes of that assembly codes. The simulator we designed uses first, second and third
columns to accomplish desired code simulation.
Figure 4. List file contents
If the assembly file includes errors, a set of error messages are issued. Having a successful compilation
completed, the assembly program can be run in step-by-step (F8) or in full speed (Ctrl + F12) fashion on run
390
�window as shown in Figure 5. On this window, a program counter, a cycle counter for current instruction, and
total simulation timer are deployed to monitor simulation events.
Figure 5. Program run control window
In the simulation stage, the internal and external memory blocks can be monitored. The internal RAM
window incorporates direct and indirect data memory and it can be modified by the user in bit or byte manner
during the simulation. However, the simulation needs to be paused before the modification. Any change in
internal RAM cell can be noticed immediately since the related RAM cell is colored in real-time. This facility
enables the user to control the simulation efficiently.
The external RAM and SFR memory windows have identical functions what internal RAM window has.
However, program code memory represents the hex code of the assembly programs as seen in Figure 6. The
program codes normally cannot be modified by the users, but if some users who are very confident on what they
do can modify the contents of the code memory in the paused mode.
Figure 6. Code memory window
391
�I/O ports, as illustrated in Figure 7, can be connected to a couple of hardware-based devices that are
used frequently for embedded systems. Each port can be connected to LEDs, switches, buttons, or sevensegment display. At reset time, each port is connected predetermined devices, but if desired, all ports can be left
alone. Each port’s connection can be reorganized during the simulation. There are some constraints though, for
example, at any time, two ports cannot be connected to the same device.
Figure 7. The I/O ports window
The Fundamentals of Simulation Operations
Once the errors are corrected, program counter value and its related opcode and operands are inserted
into arrays. The functional setup can be seen in Figure 8.
PC
OC
Opr
0000
74
FF
0002
0004
78
F5
15
15
0006
0008
0009
74
46
74
0F
000B
56
000C
000E
000F
74
66
74
PC: Program Counter
OC: Opcode (fetch)
Opr : Operand (fetch)
increment PC with
respect to OC and Opr
0F
Decode OC and use
operands
0F
0F
Figure 8. Block diagram of the simulator
In our design, we have used the program counter as array indexer. The PC is increased automatically
according to the type of the instruction. The simulation continues until an END instruction is encountered. In
order to separate opcodes from END instruction, we have used A5 hex number, which is not compatible with any
opcode in 8051 assembly language (MacKenzie, I.S.1995).
392
�Conclusions
Microprocessor and microcontroller courses often require experimental laboratory applications.
However, the students cannot always use hardware-based systems efficiently. Additionally, such systems can
bring major drawbacks such as financial or physical space difficulties. Students can have a great opportunity to
learn the course contents if software based solutions are provided. As an alternative solution, we have designed
and implemented a free and functional-based 8051-microcontroller simulator to be used in microprocessor
classes. The students not only create and edit their assembly codes in the provided environment, also can utilize
hardware-based devices. So, the risk of malfunctioning real hardware devices can be avoided. However, the
simulator we designed cannot run in real-time mode. This property will be improved in the next versions.
Acknowledgements:
The authors wish to acknowledge the financial support of Sakarya University entitled BAPK Project No. 2010-50-01-010
References
Smith M. R., Cheng M. (1996) “Use of Virtual (simulated) hardware devices in microprocessor laboratories and tutorials”,
Frontiers in Education Conference, FIE’96, 26th Annual Conference − 1996 − Vol. 3. − Pages 1181–1185.
TOPALOGLU, N. (2002) “The Design and Implementation of PC-Based Functional Microprocessor Simulator”, PhD.
Thesis, Ankara, 2002
Caldwell, C. W., Andrews, D. L., and Scott, S. S. (1995) “A Graphical Microcomputer Simulator for Classroom Use”
Proceedings of the Frontiers in Education Conference, 1995. Proceedings, Vol. 2, Pages: 3b3.9-3b3.12, ISBN:0-7803-3022-6
Giurgiutiu, V., Lyons J, Rocheleau D, Liu, W. (2005) “Mechatronics/ microcontroller education for mechanical engineering
students at the University of South Carolina”, Columbia, Mechatronics, Volume 15, Issue 9, 2005, Pages. 1025–1036.
Reshadi, M.,Mishra, P., Dutt, N., Proceedings of the 40th annual Design Automation Conference, “Instruction Set Compiled
Simulation: A Technique For Fast And Flexible Instruction Set Simulation”, 2003, Pages: 758–763, Anaheim, California,
USA, ISBN:1-58113-688-9
I.Scott MacKenzie, (1995), The 8051 Microcontroller, Prentice Hall
393
�
Dublin Core
The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.
Extent
The size or duration of the resource.
533
Title
A name given to the resource
A Functional Based Simulator for the 8051 Microcontroller
Author
Author
Ozcerit, Ahmet Turan
Guney, Necat
Abstract
A summary of the resource.
In this paper, a functional based simulator has been designed to facilitate the education of the 8051 microcontroller, which is used widely in today's engineering and educational purposes. In the realization of the simulator, a PC-based program is developed in a way to make easy to follow the contents of the registers and flags of the running an 8051- coded assembly program. Another important contribution fulfilled is a toolbox, which can easily be connected to the ports of the microcontroller using as switch, button, display, etc. The units in the toolbox can also be connected after compilation period. By the help of this facility, the simulator can be used as a virtual microcontroller development board. Such properties simplify to understand the internal architecture of the 8051 microcontrollers for students and designers.
Date
A point or period of time associated with an event in the lifecycle of the resource
2010-06
Keywords
Keywords.
Conference or Workshop Item
PeerReviewed
Q Science (General)
-
https://eprints.ibu.edu.ba/files/original/e376a1ff77b93475239920c2a8e36b8d.pdf
976f73d35841d8301000bf8c58f41235
PDF Text
Text
A Multilingual Media Monitoring System (MMMS) for Balkans
B. Gültekin ÇETĐNER
Faculty of Engineering and Natural Sciences
International University of Sarajevo (IUS)
Sarajevo, Bosnia and Herzegovina
cetiner@ius.edu.ba
Mete GÜNDOĞAN
Faculty of Economics and Business Administration
International University of Sarajevo (IUS)
Sarajevo, Bosnia and Herzegovina
mgundogan@ius.edu.ba
Osman GÜRSOY
Faculty of Engineering and Natural Sciences
Researcher in Computer Engineering
International University of Sarajevo (IUS)
Sarajevo, Bosnia and Herzegovina
ogursoy@ius.edu.ba
Abstract: This paper describes a developed Multilingual Media Monitoring System (MMMS)
software and reports how it may be utilized to effectively facilitate PR facilities at an academic
institution in Balkans.
There are many international charity projects of Turkey in Bosnia and Herzegovina (BiH).
These institutes comprise the academics and businessmen both from Turkey and Bosnia. Due to
major number of the stakeholders and students from Turkey and Bosnia as well as other
different countries, and the mission of such an institution to become an international Balkan
institution requires the establishment to perform PR facilities in Balkans effectively in a multinational and multilingual manner. Therefore, a software system called Multilingual Media
Monitoring System (MMMS) was developed by the authors herein to manage the PR facilities
more effectively by easing the collection, search and evaluation of the news in Balkan region
and Turkey. The paper describes the system in detail.
Keywords: Media Monitoring, PR, Information Technology, Content Analysis, Balkan
Cooperation
Introduction
After the war, many internatinal educational institutions have been established in BiH. They have both
academicians and students from about many different countries of which the majority is from Turkey and Bosnia.
The decision of the establishments goes back to the start of the post-war period when Alija Izzetbegovic, the first
president of the independent Bosnia and Herzegovina had made a call to Turkey to establish the good relations
with Turkey and help the country to reestablish the economy and development. Educational curricular structures
of these institutions are usually based on a flexible model to allow the interdisciplinary studies and program
changes considerably easy. The inspiration of the educational models is based on the structuring of curriculum at
advanced academic institutions by revising them according to needs of Bosnia and Herzegovina.
The international structure and stakeholders of such institutions from different countries make it
necessary to develop a multilingual effective news monitoring system for PR facilities in Balkan region and
Turkey. Therefore, a project was developed during 2009 to ease the PR facilities of such an institution. The main
purpose of the project was to collect the content in several languages (currently in English, Bosnian and Turkish),
to categorize, evaluate and search this content by predefined staff in several roles. Collection of news and other
content is made by usually editors and evaluated by commentators. The software project shortly called as
PRNews is a Multilingual Media Monitoring System (MMMS) and described herein this paper in detail.
Media Monitoring Systems
356
�Media Monitoring systems are used by modern organizations to collect information for more effective
decisions and often strategic management purposes.
The application of content analysis, linguistic, and information retrieval methodologies are the focal point of the
discussion in media monitoring systems. Content analysis is described as a well-described systematic strategy of
inquiry to the analyzed media content object, or in other words, to a communication text (Arıkan, 2009). From
the very beginning of the research it must be described what is looked after. In this project, Arıkan attempts to
deliver primary information on a content analysis project to analyze Turkish Media by computer assistance. He
discusses the methodological, scientific and application problems and issues related to the project.
Media monitoring can help demonstrate that political competitors and the public at large should have
confidence in the media, electoral authorities and the government that is responsible for providing genuine
elections. Shortcomings in media conduct can be identified through monitoring in time for corrective action.
Abuse of the mass media’s power to affect voter choices also can be documented, which allows the population
and the international community to appropriately characterize the true nature of the electoral process. More may
be found regarding media monitoring for political purposes in (coliver and Patrick, 1994) and (Lange and Palmer,
1995).
A Digital Media Monitoring project for Parliament was reported (Gilbert, 2005). An Electronic Media
Monitoring Service (EMMS) was developed to allow Senators and Members to browse, search and view
television and radio items on desktop PCs. In this system, news and current affairs items are recorded in
Canberra by Parliamentary Library staff and published onto the EMMS web site for access by Senators and
Members in Parliament House and their electorate offices. Using the system developed, media programs may be
digitally captured, encoded and archived for retrieval and playback by the Library’s clients.
A news media monitoring or media tracking system can be used to collect, evaluate and search certain
content of news coverage for more effective PR in an organization. The content may be related to a subject,
person or any organization and may be on a hardcopy magazine and newspaper, or in a digital form. The
collected and evaluated content under different categories may then be sent to related bodies or searched online.
The following sections describe a multilingual news media monitoring system developed by the authors.
Multilingual Media Monitoring System (MMMS)
The Multilingual Media Monitoring System (MMMS) described herein allows administrative staff to
browse, search and view news items online. News and current affairs items are recorded at a centre by staff
arranged as editors and administrators and published onto the MMMS web site for access by staff assigned as
users. It is integrated into the institution's database which means that any staff or client may be assigned the tasks
with predefined users. The Use-case diagram in Figure 1 shows the users as participants and their roles to be
played in the MMMS system.
Multilingual Media Monitoring
System
Add/Modify
Users
Editor
Adm in
Add Languages
Add
Categories
Add/Modify New s
Advisor
Evaluate New s
User
Search
«include»
Rate
Show New s
Figure 1. Use-case Diagram for MMMS
357
�The Admin user has all rights to describe, add and user profiles and their permissions. Admin also may
add additional languages and perform operations of all other users. Besides Admin user, there are 3 other users
as Editor, Advisor and User. Editor may add categories and add/modify news. Editor user is a typical PR user
who can collect, modify the news content. Advisor may add, modify and rate (evaluate) the news content similar
to Editor. User is typically a manager who sees all the results in read-only form. He/she can search and see the
content and its related ratings. The user may rate the content.
The media monitoring service is highly useful and this project has involved technology and ready to be
applied to any academic institution. Using the new technology, media contents for Balkan region are digitally
captured, encoded and archived for retrieval and playback by the MMMS clients. The following part describes
the project, the technology, standards employed, and how certain issues were overcome to provide an in-demand
PR service for administrators.
System Design for MMMS
The MMMS developed herein is a web based software application using open source application
development standards such as PHP programming language and MySQL as Database Management System. The
data model for the designed database is given in Figure 2.
Languages
category
notification
Language
Category_ID
Description
catName
Notification_ID
User_ID (FK)
category
keywords
Language (FK)
users
media
User_ID
Media_ID
title
source
author
date
summary
keywords
Category_ID (FK)
Language (FK)
Editor_User (FK)
Comments
comment_ID
Comment
Rating
Media_ID (FK)
Commentator_ID (FK)
username
password
email
name
middlename
surname
lastlogin
profile
Figure 2. Data Model related to Database for MMMS
The media content has title, source, author, date of information, summary, and keywords which are used
to search later the media document. Each media content is categorized with related category ID. The PR user
(editor or advisor) is also recorded as Editor User. Each Media content has also language associated with. User
table is integrated into the Database of hosting institution. Therefore, new users from the academic and
administrative personnel may be added to the user pool in MMMS easily. Comments may be given and ratings
may be added by different users. Category table keeps all categories added into the system. Categories may be
edited by both Admin and editor users. Currently there are 3 languages in the system but more languages may be
added to the system.
Notification is perhaps one of the most important tables in the system. Users are notified through their
emails if there is a new media content in the system related to their category, keywords and language of interest.
Users may also search inside the media content based on the filtering of language, keywords and category.
User Interfaces for MMMS
The user interfaces are many and difficult to show all herein. Therefore, only several important ones are
described in this section. User interfaces are related to the Cases given in Figure 1. The participants are given
different permissions according to their roles. The Figure 3 shows menu options for users with the roles Admin,
Editor and User. The Admin user has permission to add/modify users whereas editor cannot change the users but
can add News and Categories. The normal user has only read-only permission to search and see the news. The
users can manage the CRUD (Create/Retrieve/Update/Delete) operations depending on their security levels. The
users may be added by administrators with different privileges depending on the role of the user selected from
358
�the human resources associated with the institution’s database for employees. The alternative usage of the
system may involve people from different organizations in Balkan region and Turkey to monitor the news media
for research and other purposes. In this case, the actors described in Figure 1 may be distributed throughout the
countries. For example, advisors from Istanbul may rate the content produced by an editor in Albania and users
of Kosovo may see the content related to Kosovo produced by Istanbul editors etc. This kind of usage of the
system requires a network of users from different countries with different roles.
Figure 3. Menu Options for (a) Admin (b) Editor, and (c) User
The most important part of the system is the search facility as shown in the left side of Figure 4 which
shows the screenshot to be seen by admins, advisors, editors and users. The right part in the figure may be seen
by only admins, advisors and editors. It contains a pool of the news produced mainly by editors. The search
mechanism contains certain criteria for search and sort facilities. Filtering is available for category, language,
search keywords and dates. Search is made on the html content based on the OR function of Boolean algebra.
The html content may include pictures and videos. However, the system cannot search for information yet in
binary content such as videos and pictures. The html results related to content are brough to the user as pdf files.
Editing of the content is made over html. Sorting is possible based on the Title, Source of Information, Author,
Category and Date. Editing of the content is possible via related functions. Although rarely used deletion of a
content is also possible. This may be an option to be used by editors and advisors if the content’s rating and
evaluation require so. Currently system does not allow the users to share selected content via sending through
emails. A workflow management system may also be added in future versions to accept content in a hierarchical
manner. This means approval of content by advisors and certain editors. Currently system is very useful for
copying and pasting digital information from digital soft copies related to events. For facilitating hard copy
information, the editor needs to scan and convert the hardcopy contents (such as newspaper, leaflet etc) manually
to soft copy formats through Optical Character regognition (OCR) softwares.
359
�Figure 4. A typical screen to be seen by editors
Conclusions
The paper has described a Multilingual Media Monitoring System (MMMS) developed by the authors
for the purpose of tracking the media for news content of both Balkan region and Turkey related to the conduct
of PR facilities at any educational institution. The main purpose was to provide up-to-date information needed by
the managers of the institution to help in their decision making processes for more effective PR. It was found
useful by higher level managers in tracking the news in three different languages. The system may be utilized in
a way to monitor the information gathering throughout the Balkan region by embedding editorial board members
and advisors from different countries. The system is ready to be operated by any educational or academic
institutions as well as any governmental institutions.
References
Arikan, Aykut (2009), “Computer Assisted Turkish Based Media Content Analysis System - Project 107k209: A
Case Study“, Bilgi Dünyasi, 10 (2)
Coliver, Sandra And Patrick Merloe (1994) “Guidelines For Election Broadcasting In Transitional Democracies”,
United Kingdom, Article 19, National Democratic Institute For International Affairs
Lange, Yasha And Palmer, Andrew (1995) “Media And Elections: A Handbook”, European Institute For Media,
Brussels:Tacis
Gilbert, Catherine (2005) “Digital Media Monitoring Project For Parliament”, 12th Information Online
Conference, Sydney, 1-3 February, Australia
360
�
Dublin Core
The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.
Extent
The size or duration of the resource.
527
Title
A name given to the resource
A Multilingual Media Monitoring System (MMMS) for Balkans
Author
Author
ÇETİNER, B. Gültekin
GÜNDOĞAN, Mete
GÜRSOY, Osman
Abstract
A summary of the resource.
This paper describes a developed Multilingual Media Monitoring System (MMMS) software and reports how it may be utilized to effectively facilitate PR facilities at an academic institution in Balkans. There are many international charity projects of Turkey in Bosnia and Herzegovina (BiH). These institutes comprise the academics and businessmen both from Turkey and Bosnia. Due to major number of the stakeholders and students from Turkey and Bosnia as well as other different countries, and the mission of such an institution to become an international Balkan institution requires the establishment to perform PR facilities in Balkans effectively in a multinational and multilingual manner. Therefore, a software system called Multilingual Media Monitoring System (MMMS) was developed by the authors herein to manage the PR facilities more effectively by easing the collection, search and evaluation of the news in Balkan region and Turkey. The paper describes the system in detail.
Date
A point or period of time associated with an event in the lifecycle of the resource
2010-06
Keywords
Keywords.
Conference or Workshop Item
PeerReviewed
Q Science (General)
-
https://eprints.ibu.edu.ba/files/original/88a42195e6bbce14a3b8c80377a68fa2.pdf
91160412c4899bf99a4c0f45fd7f081b
PDF Text
Text
1st International Syposium on Sustainable Development, June 9-10 2009, Sarajevo
A New Approach to a Marketing Decision Model
via the Fuzzy Expert System
A.Samet Hasiloglu
Department of Computer Engineering,
Ataturk University, Erzurum, Turkey,
asamet@atauni.edu.tr
U mit Gul
Vocational College of Narman,
Ataturk University, Erzurum, Turkey
Abstract: This paper proposes a new forecasting method for a marketing decision model. To
support the modeling process, a fuzzy expert system was designed to determine whether a
new product should enter the market. The fuzzy expert system based model presenting of a
new product to the market at the best time will provide an advantage to the companies in
competitive environment and increase their share of the market. In the final stage of this
framework, algorithms for building fuzzy expert systems are explained and applied to a case
study. The proposed method was tested with an actual data load of product life cycle.
Keyword: fuzzy expert system; product life cycle; marketing decision model
Introduction
Real-world decision-making is much too complex, uncertain and imprecise to lend itself to precise,
prescriptive analysis.Itisthis realization that underlies the rapidly growing shiftfrom conventional techniques
of decision analysis to technologies based on fuzzy logic. Fuzzy logic was originally proposed as a means of
representing uncertainty and formalizing qualitative concepts that have no precise boundaries. So far, of fuzzy
logic has gained much more attention in engineering applications than in business and finance applications, but
an even larger potential existsinthe latterfields (Facchinetti et al., 2003 & Yavuz et al.).
Fuzzy logic is an excellent way to combine Artificial Intelligence methods (Zadeh, 1993). Fuzzy set
theory and fuzzy logic provide a general method for handling uncertain and vague information, which
unfortunately are unavoidable in many real world decision-making processes (Frantti & Mahonen, 2001). Fuzzy
logic avoids the abrupt change from one discrete output state to another when the input is changed only
marginally. Thisis achieved by a quantization of variablesinto membership functions (Herrmann, 1995).
Expert systems were designed to reason through knowledge to solve problems using the same methods
that humans use. A fuzzy expert system is an expert system that utilizes fuzzy sets and fuzzy logic to overcome
some ofthe problems which occur when the data provided by the user are vague orincomplete.
In this paper, we illustratethatthe fuzzy approach may be usefulin industrial economics.In particular, a
fuzzy expert system has been adapted for product life cycle management. The well-known product life cycle
approach describes the changing features of markets during their evolution. It may therefore serve as a
theoreticalframework within which market changes can be explained (Klepper & Graddy, 1990). To supportthe
decision process, a fuzzy expert system was designed to determine whether to enter of a new product into the
market. Finally, when operating the fuzzy expert system, three different deductions can be made:the preservation
of the present status,the introduction ofthe new productto the market and the withdrawal of the productfrom the
market.
The organization of this paper is organized as follows: Section 2 briefly summarizes the basic principles
ofthe productlife cycle. Section 3 provides an overview of the Fuzzy expertsystems.In section 4 (the main part
of this paper),the major modeling issues ofthe study are examined, based on a fuzzy expert system. This paper
concludes with a summary ofthe findings and directions for future research.
241
�1st International Syposium on Sustainable Development, June 9-10 2009, Sarajevo
Product Life Cycle
All products and services have certain life cycles. Life cycle refers to the period from the product’s first
launch into the market untilits final withdrawal. The life cycleis split up in phases. Since an increase in profits
isthe major goal of a company that introduces a product into a market,the product’s life cycle management is
very important(Komninos, 2002). New product failures may occur because of an overestimation of market size,
product design problems,Incorrectly positioned, priced or advertised products,costs of product development and
/ or competitive actions (Kotler & Armstrong, 2001).
Although the life cycle varies in accordance with the product and sector base,the product’slife cycle –
period usually consists of five major phases as shown in (Fig. 1). The first period is the product development
phase, the second period is the entrance phase, the third period is the growth phase, the fourth period is the
maturity phase and the fifth period is the satisfaction phase. The product development phase begins when a
company finds and develops a new productidea. The entrance phase isthe period of a product’s presentation to
the market and the effort spent for its acceptance. Generally, this isthe period of catching up at par point. The
growth phase is the best step, where the product has reached its maximum profit and has been through its
brightest period. In the maturity phase, problems gradually arise up and in sales startto decrease. Despite this
sales decrease, companies try to keep their sales high by using other marketing activities,called sales efforts.In
that period increase in sales like jumping sales (comb tooth) occur. It is generally agreed that innovation,
performance, and competition depend significantly on the maturity ofthe markets(Dosi,1997). The Satisfaction
phase isthe period thatthe companies prefer notto be in because they willstarttolose in a while.
During the maturity period, significant changes are made in the way that the product is behaving in the
market. Presentation of a new product to the market at the best time will provide an advantage to competing
companies and increase their share ofthe market (Leenders & Wierenga, 2002).
Figure 1: Life cycle period of a new product
In the conventional productlife cycle,introduction of a new productto the market corresponds point "A"
in (Fig. 1) (http://www.otterbein.edu/home/fac/brccbly/courses/images/plc.gif). When a company comes to this
point atthe end of the maturity period, it has to choose one of these alternatives: new product, new market, or
withdrawal of goods from the market,so as notto enterinto the 5-th period.
As shown in Point "A" (McDonald, 1995)the existing system is considered to be lateforthe new product
to enter the market. This point is the period in which the company withstands a number of costs called other
sales efforts(promotion, excess goods, discount, etc.)to keep the sales active.Itis plain to see from a review of
the conventionallife cycle that profit has started to fallin spite ofthe increase in sales.
The proposed system attempts to determine the point specified as point "A" in (Fig. 1) by means of the
expertsystem. Inthis proposed structure, point "A" can be taken to an earliertime than in the existing policies.In
the operation ofthe system, productlife cycle maturity period characteristics will be reviewed and efforts will be
made to determine the most suitable time for presentation ofthe productto the market by evaluating the factors
called as macro and micro marketindicators.
There are some major productlife cycle managementtechniques that can be used to optimize a product’s
revenues in respect to its position in a market and its life cycle. These techniques are mainly marketing or
management strategies that are used by most companies worldwide and include the know-how of product
242
�1st International Syposium on Sustainable Development, June 9-10 2009, Sarajevo
upgrade,replacement and termination.
Nevertheless, a product manager must know how to recognize which phase of itslife cycle a product is
in,regardless ofthe problems inthe model discussed above. To do that,a good method is the one which follows
(Komninos, 2002):
a.Collection ofinformation aboutthe product’s behavior over a period atleast of 3–5 years. (Information
willinclude price, units sold,profit margins,return ofinvestment – ROI, market share and value).
b.Analysis of competitor short-term strategies (analysis of new products emerging into the market and
competitor-announced plans about production increase, plant upgrade and product promotion).
c.Analysis ofthe number of competitorsin respect of marketshare.
d.Collection ofinformation ofthe life cycle of similar productsthat will help to estimate the life cycle of
new products.
e.Estimation of sales volume for 3 – 5 years from productlaunch.
f.Estimation of the total costs compared to the total sales for 3 – 5 years after product launch
(development, production, promotion costs).
Strategies that must be applied as soon as the phase of product life cycle is recognized are given in the
(Tab. 1) (Komninos, 2002).
Strategic Goal
Competition
Product
Development
Phase
Make your
product
known and
establish a
test period
Almost not
there
Product
Limited
number of
variations
Price Goal
High sales to
middle men
Promotion
Goal
Entrance
Phase
Growth
Phase
Acquire a strong
market position
Maintain your market
position and build on
it
Early entry of
aggressive
competitors into the
market
Introduction of
product variations
and models
Price and distribution
channel pressure
Aggressive price
policy (decrease) for
sales increase
Creation of
Reinforcement of
public-market product awareness
product
and preference
awareness
Exclusive
General and
and selective reinforced
distribution through
distribution
through
all distribution
certain
channels available
distribution
channels and
creation of
high profit
margins for
middle men
Maturity
Phase
Satisfaction
Phase
Defend market
position from
competitors and
improve your
product
Establishment of
competitive
environment
“Milk” all remaining
profits from product
Improvement –
upgrade of product
Price decrease
Re-estimation of
price policy
Defensive price
policy
Variations and
models that are not
profitable are
withdrawn
Maintain price level
for small profit
Reinforcement of
middle men
Maintain loyal to Gradual decrease
middle men
General and
reinforced
distribution with good
supply to the middle
men but with low
margins of profit for
them
General and
reinforced
distribution with
good supply to the
middle men but with
low margins of profit
for them
Some competitors are
already withdrawing
Withdrawal from
most channels of
distribution except
those used in the
development phase
Table 1: Strategies of each productlife cycle phase
Fuzzy Expert Systems
A fuzzy expertsystem is an expertsystem that utilizesfuzzy sets and fuzzy logicto overcome some of the
problems which occur when the data provided by the user are vague and incomplete.Itconsists of a fuzzification
module, an inference engine, a fuzzy rule base and a defuzzification module. The fuzzification module preprocesses the input values submitted to the fuzzy expert system.
Crisp inputs
x1 x2
. . .
xn
...
Fuzzification
Subsystem
Fuzzy Rule Base
Fuzzy inference
engine
243
�1st International Syposium on Sustainable Development, June 9-10 2009, Sarajevo
Figure 2: Structure ofthe fuzzy expert system
The inference engine usesthe results ofthe fuzzification module and accessesthe fuzzy rulesinthe fuzzy
rule base to infer whatintermediate and output values to produce. The final output ofthe fuzzy expert system is
provided by the defuzzification module. The structure of the developed system is shown in (Fig. 2). This
structure is common for fuzzy inference systems.
Developed Marketing Decision Model
In this study, a new marketing decision model was developed, whose structure identifies the fuzzy logic
inference flow from the input variablestothe output variables. The fuzzification inthe inputinterfacestranslates
analog inputs into fuzzy values. The fuzzy inference takes place in rule blocks, which contain the linguistic
control rules. The outputs of these rule blocks are linguistic variables. The defuzzification in the output
interfaces translatesthem into analog variables. The decision tree ofthe modelis shown in (Fig. 3).
Economic _ conditions
Global _ Market
Political _ Circums tan ces
Competition
Performance _ of _ productManufacture
Other _ Selling _ Efforts
Pr oportional _ Increase _ ın _ Sells
Manufacture _ Po int
T arg et _ Market
Re newal
Figure 3: Decision tree ofthe model
(Fig. 4) shows the entire structure of this fuzzy system including input interfaces,rule blocks and output
interfaces. The connecting lines symbolize the data flow.
The fuzzification method, “Compute membership function (MBF)”,isthe standard fuzzification method
used in almost all applications. This method only storesthe definition points ofthe membership functions in the
generated code and computes the fuzzification atruntime.
For output variables, different defuzzification methods exist as well. The most often used method is
center-of-maximum (“Co M”), which delivers the best compromise of the firing rules (Von Altrock, 1997;
Bojadziev & Bojadziev, 1997).
In (Fig. 4),the rule block ofthe structure ofthe fuzzy logic system is shown. This block containsthe rules
of the system describing the control strategy. Rule blocks contain the control strategy of afuzzy logic system.
244
�1st International Syposium on Sustainable Development, June 9-10 2009, Sarajevo
Figure 4: Structure ofthe fuzzy logic system
Each rule block confines allthe rules for the same context. A context is defined by the same input and
output variables of the rules. The ‘IF' part of the rules’ describe the situation for which the rules are designed.
The ‘THEN’ part describes the response of the fuzzy system in this situation. The degree of support (DoS) is
used to weigh each rule according to itsimportance, which ranges from zero to one.
Global market indicators, overall economic situation and legal and political circumstances prevailing in
the market arethe factors reviewed. The fuzzy expertrules of the global market can be sum marized in (Tab. 2).
Economic cond.
Negative
Negative
Negative
Ineffective
Ineffective
Ineffective
Positive
Positive
Positive
IF
AND
Political circums.
Negative
Ineffective
Positive
Negative
Ineffective
Positive
Negative
Ineffective
Positive
THEN
Global market
Pessimistic
Pessimistic
Pessimistic
Pessimistic
Pessimistic
Optimistic
Pessimistic
Optimistic
Optimistic
Table 2: Rules ofthe rule block “RuleBlockGlobalMarket”
The target marketindicatorfactors are a renewal ofthe product and manufacture point. Manufacture point
isthe comparison of performance of the products and itsrivals. The result of this review revealsthe probability
that performance of the product can be lower or higher than or equal to that of the closest rival product. The
condition of “manufacture point” has three condition domain factors:
m.p. < c.m.p., m.p. = c.m.p.and m.p. > c.m.p.
Above, “m.p.” is the manufacture point of our product, “c.m.p.” is the manufacture point of the
competitor’s product. The Fuzzy expertrulesinthe target market are summarized in (Tab.3).
IF
Manufacture point
AND
Renewal
THEN
Target market
Mp<cmp
not_ok
Wait
Mp<cmp
Mp=cmp
Mp=cmp
Mp>cmp
Mp>cmp
Ok
not_ok
Ok
not_ok
Ok
Medium
Wait
Impulsive
Medium
Impulsive
Table 3: Rules ofthe rule block “RuleBlockTargetMarket”
The factors of manufacture indicators are “competition”, “other selling efforts” and “proportional
increase in sales”. The most striking signs of the maturity stage are a decrease in competition, rivals’
introduction of new products to different market sector and construction of existing market. The fuzzy expert
rules of “manufacture” can be summarized in production rules in (Tab. 4).
245
�1st International Syposium on Sustainable Development, June 9-10 2009, Sarajevo
Competition
Decreased
Decreased
Decreased
Decreased
Increased
Increased
Increased
Increased
AND
IF
Other selling efforts
Decreased
Decreased
Increased
Increased
Decreased
Decreased
Increased
Increased
AND
Prop. increase in sells
Decreased
Increased
Decreased
Increased
Decreased
Increased
Decreased
Increased
THEN
Manufacture
Poor
Good
Good
Very good
Good
Very good
Very good
Very good
Table 4: Rules ofthe rule block “RuleBlockManufacture”
As a result of a sales rates' decrease, a company willinitiate other sales efforts to increase sales. These
efforts will escalate the cost of other sales efforts. Thus, the profit rate will drop because a big portion of the
profitis used to finance other sales efforts. The fuzzy expertrules in the “Performance” can be summarized in
the production rulesin (Tab. 5) and (Tab. 6) shows the summary ofthe project.
Global market
Pessimistic
Pessimistic
Pessimistic
Pessimistic
Pessimistic
Pessimistic
Pessimistic
Pessimistic
Pessimistic
Optimistic
Optimistic
Optimistic
Optimistic
Optimistic
Optimistic
Optimistic
Optimistic
Optimistic
AND
IF
Manufacture
Poor
Poor
Poor
Good
Good
Good
Very good
Very good
Very good
Poor
Poor
Poor
Good
Good
Good
Very good
Very good
Very good
AND
THEN
Performance
Bad
Bad
Passive
Bad
Passive
Passive
Passive
Passive
Active
Passive
Passive
Active
Passive
Active
Active
Active
Active
Active
Target market
Wait
Medium
Impulsive
Wait
Medium
Impulsive
Wait
Medium
Impulsive
Wait
Medium
Impulsive
Wait
Medium
Impulsive
Wait
Medium
Impulsive
Table 5: Rules ofthe rule block “RuleBlockPerformance”
Global Market
Manufacture
Target Market
Performance
Result
Input
Variables
2
3
2
7
7
Output
Variables
1
1
1
1
1
Intermediate
Variables
1
1
1
3
3
Rule Blocks
1
1
1
1
4
Rules
9
8
6
18
41
Membership
Functions
6
7
5
3
21
Table 6: Summary of project
As a result of operating the expert system, three different deductions can be made: preservation of the
present status,introduction of a new producttothe market and the withdrawal ofthe productfrom the market,i.e.:
If PERFOR M A NCE = Active Then “Preserve the present status”
If PERFOR M A NCE = Passive Then “Introduce the new producttothe market”
If PERFOR M A NCE = Bad Then “Withdraw the product from market”
Results
The fuzzy expert system-based marketing decision model, which defines the product life cycle, was
implemented in an automated knowledge base. Our model was constructed using FuzzyTech as an expert system
development tool for determining productlife cycle. The Productlife cycle maturity period characteristics were
reviewed and efforts were made to determine whethertointroduce the productintothe market or not. As a result
of operating the expert system, three different deductions can be made: “preservation of the present status”,
“introduction ofthe new producttothe market” and “withdrawal ofthe productfrom the market”.
246
�1st International Syposium on Sustainable Development, June 9-10 2009, Sarajevo
Conclusion
In this paper, we propose a way to deal with product life cycle management. This new idea is to
reproduce what fuzzy expert system does when they have to decide a new product’s market entering time.
Values taken by these reviewed factors are interpreted by means of the fuzzy expert system and the best
decision forthe company is made. As a result ofthe study,the most suitabletime forintroduction ofthe product
to the market can be determined, instead of withstanding the costs of other sales efforts and losing profit or
risking the loss of market share during the product's maturity period.
In further research, to get a most realistic model,itis possible to add quantitative parameters to model
such as production per unittime, wasting machine hours,labor hours,and raw material. Besides,to adapting this
model to reallife, generalrules should be extended. For example,to define political circumstances of the target
society, new rules set can be added to model.
References
Bojadziev, G., & Bojadziev, M. (1997). Fuzzy Logic for Business, Finance and Management, Singapore, World Scientific
Publishing Co.
Dosi, G. (1997). Industrial structures and dynamics: evidence, interpretations and puzzles. Industrial and Corporate Change,
6, 3–24.
Facchinetti, G., Mastroleo, G., & Paba, S. (2003). A Fuzzy Approach to Empirical Identification of Industrial Districts. In
Fuzzy
Application
Library/Business
Applications/
Identification
of
Industrial
Districts,
on-line
http://www.fuzzytech.com/e/district.html
Frantti, T., & Mahonen, P. (2001). Fuzzy Logic-based forecasting model, Engineering Applications of Artificial Intelligence,
14, 189-201.
Herrmann, C.S. (1995). A Hybrid Fuzzy-Neural Expert System For Diagnosis, In M. Kaufman, IJCAI, (pp. 494-501).
Montreal, Canada: Darmstadt.
Kasabov, N. K. (1996). Foundation of neural networks, fuzzy systems, and knowledge engineering. NY: MIT Press.
Klepper, S., & Graddy, E. (1990). The evolution of new industries and the determinants of market structure. RAND Journal
of Economics, 21(1), 27–44.
Komninos, I. (2002). Product Life Cycle Management, on-line
http://www.urenio.org/tools/en/Product_Life_Cycle_Management.pdf
Kotler, P., & Armstrong, G. (2001). Principles of Marketing, NJ: Prentice-Hall.
Leenders, M.A., & Wierenga, B. (2002). The effectiveness of different mechanisms for integrating marketing and R&D
Mark. The Journal of Product Innovation Management, 19(4), 305-317.
McDonald, M. (1995). Marketing Plans. How to prepare them: how to use them. Third Edition, Oxford: Butter worthHeinemann Ltd.
Von Altrock, C. (1997). Fuzzy Logic and Neurofuzzy Applications in Business and Finance, NJ: Prentice Hall.
Yavuz, U., Hasiloglu, A.S., Kaya, MD., Karcioğlu, R. ve Ersöz, S., “Developing a marketing decision model using a
knowledge-based system”, Knowledge-Based Systems 18 (2-3), 125-129 (Apr 2005).
Yen, V.C. (1999). Rule selection in fuzzy expert systems, Expert Systems with Applications, 16, 79-84.
Zadeh, L.A. (1993). The role of fuzzy logic and soft computing in the conception and design intelligent systems. In E. P.
Klement, & W. Slany, Fuzzy Logic in Artificial Intelligence, 8th Austrian Artificial Intelligence Conference, FLAI '93, (pp.
1). Linz, Austria: 695, Springer.
247
�
Dublin Core
The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.
Extent
The size or duration of the resource.
470
Title
A name given to the resource
A New Approach to a Marketing Decision Model via the Fuzzy Expert System
Author
Author
Hasiloglu, A.Samet
Gul, Umit
Abstract
A summary of the resource.
This paper proposes a new forecasting method for a marketing decision model. To support the modeling process, a fuzzy expert system was designed to determine whether a new product should enter the market. The fuzzy expert system based model presenting of a new product to the market at the best time will provide an advantage to the companies in competitive environment and increase their share of the market. In the final stage of this framework, algorithms for building fuzzy expert systems are explained and applied to a case study. The proposed method was tested with an actual data load of product life cycle.
Date
A point or period of time associated with an event in the lifecycle of the resource
2009-06
Keywords
Keywords.
Conference or Workshop Item
PeerReviewed
Q Science (General)
-
https://eprints.ibu.edu.ba/files/original/caf8b0c4518643950ba26e752bade1ba.pdf
27be261924be5c169a25448b73268631
PDF Text
Text
A Research on Heavy Metal Statues in Some Pasture Soil of Antalya
Cengiz ERDURMUŞ
Batı Akdeniz Agricultural Research Institute, Antalya
Semiha ÇEÇEN
Batı Akdeniz Agricultural Research Institute, Antalya
cecen@hotmail.com
Sadık ÇAKMAKÇI
Akdeniz University Faculty of Agriculture Field Crops Department, Antalya
Ramazan TOKER
Batı Akdeniz Agricultural Research Institute, Antalya
Abstract: Meadow and pasture resources fulfill many important tasks, besides feature of
being a source of feed for livestock production. Being natural balance element, erosion
prevention, clean water, air and food production and protection of genetic resources of
many plant and livestock organism can be accepted among these.
Because of rapidly growing urbanization, industrialization and tourism, meadow and
pasture resources in the Mediterranean region have been polluted with different pollutants.
In this study, soil pollution research was done in pastures near intensive industry and
tourism region of Antalya. Concentration of Cd, Cr, Cu, Ni, Pb, Zn and Hg elements were
analyzed in 12 samples from 3 different pastures as 4 samples from each one.
Results showed us that the concentration of Ni was higher than the limits written in Turkey
Soil Pollution Control Regulation. The other concentrations are lower than the limits
written in Regulation. This study is a precursor study which shows the needs of other
detailed study.
Key words: Pasture, Soil, Heavy metal
Introduction
Meadow and pasture are being one of the important natural richness of a country (Altin et al., 2005). According
to last evaluations, nearly half of the land of the earth is taken in to pasture concept and these areas have been
accepted as valuable part of the nature and they should be protected as tropic forest (Avcioglu, 1999). Meadow
and pastures have important tasks such as protection of soil, protection of genetic resources and using as
livestock feed (Avcioglu, 1983). It is known that increasing with industrial activity, energy production,
transportation and urbanization is caused to environmental pollution. Environmental pollutants are dangerous to
human health, plants and other goods (Hodges, 1977; Biggins and Harrison, 1980).
The most negative effect of pollutants is carrying heavy metals which are toxic and carcinogenic (Lagerwer and
Specth, 1970; Linton et al., 1980; Biggins and Harrison, 1980; Sakai et al., 1988). Pb, Cd and Ni pollution are
more common in urban areas than rural areas because they are caused by industrial sources. Normally Pb and Cd
are not found in plants. Whether if they are found trace amount in plants, it is accepted as a sign of pollutions
(Foy et al., 1978). Heavy metals such as Pb, Cd, Ni, Cr are toxic for human and animals (Lagerwerff et al Specth,
1970; Linton et al., 1980). These toxic heavy metals are spread out to environment by industrial activities and
emissions of motor vehicles (Biggins and Harrison, 1980; Miller and McFee, 1983; Chow, 1970).
Antalya is one of the provinces which has highest emigration rate in Turkey. This emigration causes to
industrialization. In this study, soil pollution of 3 selected pastures which have great role as livestock feed source
and near to urban and industry areas.
566
�Material and Method
Ooil samples were taken from 4 stations of each 3 pastures, totally 12 stations. Each sample was formed by
mixing 5 samples taken from 100 m2 representative areas of pasture. Samples were taken from 10 cm depth.
Analyses were carried out at Atmosfer Agriculture Analysis Laboratory.
Soil samples were prepared to analyses by sieving them through 2 mm sieves after making them as air dry at
laboratory conditions (Jackson, 1967). In soil samples, structure analysis were done by hydrometric method
(Bouyoucos, 1962), and water soluble total salt content were done by measuring electricity resistant in sature soil
priming (U.S. Soil Survey Staff, 1951). Amount of CaCO were analysed by Scheibler calcimeter (Schlichting
3
ve Blume, 1966), organic materials were analyzed by crossing organic C percentage, which were evaluated by
fresh burning method, with 1.724 factor (Reuterberg and Kremkus, 1951), total N was analyzed by modified
macro Kjeldahl method (Bremner, 1965).
In soil and ash samples, content of some trace elements (Fe, Zn, Mn, Cu, Cd, Co, Cr, Ni, Pb) and heavy metals,
which were extracted in aqua regia (HNO +HCl), were analyzed at ICP-OES after extraction by aqua regia
3
extraction methods.
Result and Discussion
Analysis results of researched pasture soil are given in Table 1, contents of some useful macro and micro
nutrition elements are given in Table 2, results of some heavy metals are given in Table 3, changing of pollutant
heavy metals according to each station are shown in Figure 1. Pb content of soil is changed from 1.8 ppm to
13.16 ppm. The lowest Pb content of soil is at the Aşağıoba 3 and the highest one is at the Yağca 1 (Table 3).
According to values which were given by Kloke (1980) that shows the Pb pollution of soil (100 ppm), it can be
said that there is no Pb pollution at the researched soils (Figure 1).
Nickel contents of soils are changed between 12.76 ppm and 78.25 ppm. The lowest nickel level belongs to
Aşağıoba 4 soils and the highest one is belong to Kovanlık 2 (Table 3). According to values which were given by
Kloke (1980) that shows the Pb pollution of soil (50 ppm), some researched soil samples nickel contents are
higher than Klokes’s data. They are also higher that the limits (75 ppm) written in the Turkey Soil Pollution
Control Regulation (Figure 1). But according to Regulation, analysis results can be exceeded to this limit, if it is
proven scientifically, that they are not dangerous for human and environment at the feed crop cultivated areas.
Cupper contents of soils are changed between 0.7 ppm and 27.63 ppm. The lowest cupper level belongs to
Yağca 4 soils and the highest one is belong to Yağca 2 (Table 3). According to values written in the Turkey Soil
Pollution Control Regulation (140 ppm) there is cupper pollution at the researched soils (Figure 1).
Station
pH
Aşağıoba 1
Aşağıoba 2
Aşağıoba 3
Aşağıoba 4
Kovanlık 1
Kovanlık 2
Kovanlık 3
Kovanlık 4
Yağca 1
Yağca 2
Yağca 3
Yağca 4
6,1
5,4
6,1
6,4
8,1
7,9
7,9
7,9
7,8
7,6
7,7
7,3
Total Nitrogen
EC
CaCO3 Organic materials
(%)
(%)
(N), %
(mmos/cm)
0,7
2,0
0,9
0,10
0,7
2,0
1,6
0,14
0,9
2,0
1,0
0,12
1,0
2,0
1,5
0,10
1,6
16,0
2,7
0,15
1,4
10,0
2,5
0,14
1,3
8,0
2,3
0,13
1,2
9,0
2,3
0,14
1,7
6,0
4,4
0,27
1,6
3,0
3,9
0,23
1,2
5,0
4,6
0,35
0,4
2,0
4,6
0,25
Table 1. Some soil properties of research area
567
Structure
%
31
36
35
40
64
63
59
63
66
57
65
63
�.
Station
Aşağıoba 1
Aşağıoba 2
Aşağıoba 3
Aşağıoba 4
Kovanlık 1
Kovanlık 2
Kovanlık 3
Kovanlık 4
Yağca 1
Yağca 2
Yağca 3
Yağca 4
P 2O 5
(kg/da)
2,15
6,14
5,95
4,08
2,15
0,82
1,88
1,60
42,73
3,25
31,24
8,34
K 2O
(kg/da)
21,02
32,40
56,64
33,60
41,04
37,44
37,68
40,80
158,16
188,16
206,40
262,56
Ca
(ppm)
1559
2250
2492
3255
7310
7518
6301
7436
7813
7975
7485
6874
Mg
(ppm)
249,00
348,00
366,00
417,00
367,00
468,00
339,00
416,00
358,00
383,00
330,00
434,00
Fe
(ppm)
32,4
71,4
33,8
11,8
0,7
1,2
0,6
0,6
1,0
1,5
0,2
1,5
Mn
(ppm)
35,78
55,74
29,19
34,93
0,39
0,08
0,44
0,04
0,04
3,88
2,84
2,94
Zn
(ppm)
0,24
0,01
0,24
0,42
0,68
0,74
0,68
0,53
0,53
6,20
1,53
6,90
Cu
(ppm)
0,87
1,62
1,28
1,69
1,76
1,24
1,20
1,72
1,66
1,19
0,39
2,43
Table 2. Some useful macro and micro nutrition elements in soil samples
Pasture
Aşağıoba
Kovanlık
Yağca
No
1
2
3
4
1
2
3
4
1
2
3
4
Cu
14.34
11.83
7.08
6.02
16.64
17.13
16.00
13.42
15.78
27.63
5.97
0.70
Ni
28.62
27.81
18.65
12.76
59.65
78.25
58.11
27.11
70.5
60.75
45.54
17.29
Heavy metals (ppm)
Pb
Zn
Bor
3.42
5.95
5.24
1.8
3.35
5.96
6.19
31.83
6.08
31.01
4.44
27.52
3.34
5.37
13.16
76.85
7.7
147.86
2.73
52.17
33.98
-
Table 3. Some heavy metals contents of soil samples, ppm
568
Hg
-
Cd
-
�Figure 1.Concentration values of polluted heavy metals according to stations
Amount of Zn contents of soils are changed between 3.35 ppm and 147.86 ppm. Aşağıoba 3 has the lowest Zn
level whereas Yağca 2 has the highest one (Table 3). According to values written in the Turkey Soil Pollution
Control Regulation (300 ppm) there is cupper pollution at the researched soils (Figure 1).
In this research, Bor, Cd and Hg, which were analyzed in the soils, were not found.
Results
Four elements (Ni, Pb, Cu, Zn) were found for soil pollution at the 3 pasture near to urban areas and industry
centers. Heavy metal pollution of soil is now at low levels. But if any precaution does not taken, this pollution
level can be increase. For this reason, this initiator research should be considered an than these type of researches
should be replicated periodically (once a 3 or 4 year) and results should be taken in to consideration carefully. If
it is thought, that large part of livestock feed needs are covered from pastures, pastures should be protected from
non-returning soil pollution
Acknowledgment
This paper was supported by the Scientific Research Projects Administration Unit of Akdeniz University.
References
Altın, M., Gökkuş, A., Koç, A., 2005. Çayır Mera Islahı, Çayır-Mera Yem Bitkileri ve Havza Geliştirme Daire Bşk., Mart
Matbaası, Đstanbul.
Avcıoğlu, R., 1999. Çayır Mera Amenajmanı ve Islahı. TBK TÜGEM. Ankara.
Avcıoğlu, R., 1983. Çayır - Mer’a Bitki Topluluklarının Özellikleri ve Đncelenmesi. Ege Üniversitesi Ziraat Fakültesi Yayın
No : 466, Bornova-Đzmir.
Biggins, P.D.E. and Harrison, R.M., 1980. Chemical specification of leaf compounds in street dusts, Env.Sci.Tech.14.
Bouyoucos, G. J., A., 1962. Recalibration of the hydrometer method for making mechanical analysis of the soils, Agronomy
Journal, 4(9) :434.
Bremner, J. M., 1965. Total nitrogen, Editor C.A. Black. Methods of soil analysis part 2. American society of Agronomy. Inc.
Publisher, Madison, Wisconsin, U.S.A 1149-1178.
Chow, T.J., 1970 Lead accumulation in roadside soils and grass Nature London 225, 295.
Foy, C.D., Chaney, R.L. and White, M.C., 1978. Physiology of metal toxicity in plants, Ann. Rev. Plant. Physiol. 29, 511.
569
�Hodges, L.,1977 Environmental Pollution, Holt-Rinehart and Winston, 2nd Ed., 496, New York.
Jackson, M.L., 1967. Soil chemical analysis prentice-Hall of India Private Limited, New Delhi.
Kloke, A., 1980. Orientierungsdaten für Tolerierbare Gesamtgehalte einiger Elemente in Kulturboden Mitt. VDLUFA, H 1-3,
9-11.
Lagerwer_, J.V. and Specth, A.W., 1970. Contamination of roadside soil and vegetation with Cd, Ni, Pb and Zn, Env. Sci.
Tech. 4, 583,
Linton, R.W., Natucsh, D.F.S., Solomon, R.L. and Evans, C.A., 1980 Physicochemical characterization of lead in urban dusts.
A microanalytical approach to lead tracing, Env. Sci. Tech. 14, 158.
Miller, W.P. and McFee, W.W.,1983. Disribution of Cd, Zn, Cu and Pb in soils of industrial Northwestern Indiana, J. Env.
Qual. 12, 29.
Reuterberg , E., Kremkus, F., 1951. Bestimmung von Gesamt Humus und Alkalischen Humusstoffen in Boden. Z.für
Pflanzenernaehrung, Düngung und Bodenkunde, Verlag Chemie Gmbh, Weinheim.
Sakai, H., Sasaki, T.and Saito, K., 1988. Heavy metal concentrations in urban snow as an indicator of air pollutions, The Sci.
of the Total Env. 77, 163.
Schlichting, E.; Blume, H.P., 1966. Bodenkundliches Practicum. Verlag Paul Parey. Hamburg, Berlin.
570
�
Dublin Core
The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.
Extent
The size or duration of the resource.
602
Title
A name given to the resource
A Research on Heavy Metal Statues in Some Pasture Soil of Antalya
Author
Author
ERDURMUS, Cengiz
ÇEÇEN, Semiha
ÇAKMAKÇI, Sadık
TOKER, Ramazan
Abstract
A summary of the resource.
Meadow and pasture resources fulfill many important tasks, besides feature of being a source of feed for livestock production. Being natural balance element, erosion prevention, clean water, air and food production and protection of genetic resources of many plant and livestock organism can be accepted among these. Because of rapidly growing urbanization, industrialization and tourism, meadow and pasture resources in the Mediterranean region have been polluted with different pollutants. In this study, soil pollution research was done in pastures near intensive industry and tourism region of Antalya. Concentration of Cd, Cr, Cu, Ni, Pb, Zn and Hg elements were analyzed in 12 samples from 3 different pastures as 4 samples from each one. Results showed us that the concentration of Ni was higher than the limits written in Turkey Soil Pollution Control Regulation. The other concentrations are lower than the limits written in Regulation. This study is a precursor study which shows the needs of other detailed study.
Date
A point or period of time associated with an event in the lifecycle of the resource
2010-06
Keywords
Keywords.
Conference or Workshop Item
PeerReviewed
Q Science (General)
-
https://eprints.ibu.edu.ba/files/original/8370bff307832fd64df1895e04975748.pdf
a7f59b81c223e367d565846ff59c51e4
PDF Text
Text
1st International Syposium on Sustainable Development, June 9-10 2009, Sarajevo
A Research on Updating of Anthropometric Measurements
M. Dursun KAY A
Atatürk University,
Vocational College of Erzurum,
Erzurum, Turkey
dursun@atauni.edu.tr
Đsmail MAL K O Ç
Atatürk University,
Department of Anatomy, Faculty of Medicine,
Erzurum, Turkey
imalkoc@atauni.edu.tr
Os man ERD O Ğ A N
Management of National Education,
Erzurum, Turkey
osman124512 @hotmail.com
Aslı KARA
Center of Public Health of Yakutiye,
Erzurum, Turkey
dr.aslikara@hotmail.com
Hakkı YELŞĐYURT
Ministry of Health, Ankara
hyesil62@hotmail.com
Abstract: By considering the dimensional measurements of the students who spend most of
their time at school, the fact that their body and structural equipment haven’t been designed
will affect their body and psychological improvements negatively. Anthropometric
measurements are necessary for education equipment and designs of education-structural
equipment of the children at the age of school.
It is emphasized that anthropometric
measurements of the people living in different climate and altitude conditions in literature will
be different. It is mentioned that anthropometric data available for a certain region will be
able to change in terms of changing socio-economical conditions and therefore, updating of
anthropometric data is necessary in certain in period of times.
For the reason, in 1999 anthropometric data obtained from the children, between the age of
seven and fifteen, who were in sitting and standing position, were measured to plan a
longitudinal study in 2007. In the result of comparison which was made, as reported in
literature, it is clear that anthropometric data will be able to be updated in certain period of
times.
Keywords: anthropometric measurement, primary school students, longitudinal
Introduction
Anthropometric measurements are essentialinthe correct designs of ergonomic business areas. Obtaining
of anthropometric data is very significant in terms of growing and shaping of body posture regularly of the
children who spend most of theirtime sitting in the desks and on the chairs (Jeong and Park, 1990, Floyd, and
Roberts, 1958, Oxford, 1969). The factthatthe chairs and desks were designed appropriately and in a functional
way according to the physical structure of the user made the design of equipment for school significant.
Therefore,itis necessary that different changes and relations among body dimensions should be known (Kayış
& Özok, 1986, Mandal, 1982,).
First of all, Ergonomist’s duty is to determine the features of the product to be used in the design of the
equipment produced with mass production and then isto provide the usage of the objectsincluding fixed things
which will be benefited in the design by anthropometry (Hira, 1980, Floyd & Word, 1969). Firstly, it is
necessary to obtain anthropometric measurements for the design of certain products. It is emphasized that
anthropometric data of the people living in different altitude and climate conditions willbe separate (Yip et
189
�1st International Syposium on Sustainable Development, June 9-10 2009, Sarajevo
al., 1988). Also, itis mentioned that anthropometric data obtained for a certain region will change within the
time in terms of changing socio-economical conditions and therefore, updating of anthropometric measurements
made in the studies before at every five yearsis necessary. In this study, anthropometric measurements obtained
by using Phesant measurements method (Tab. 1)in 1999 were obtained again by using the same method in 2007
and these data compared by updating as Yip and their colleagues suggested (Phesant, 1988).
Variable
Eye Height
Elbow height
Shoulder breadth
Buttock-knee length
Corresponding
measurement in
Pheasant (1988)
Method of Measurement
2
Vertical distance from the floor to the inner canthus (corner) of the eye.
4
Vertical distance from the floor to the radiale
18
Horizontal distance across the shoulders measured between the acromia (bony
points)
13
Horizontal distance from the back of the uncompressed buttock to the front of the
kneecap
Table 1: List of anthropometric variables and methods of measurement.
Material and Method
In this study,in 1999 in Erzurum province,the altitude of which is 2000 meters (medium altitude), 1408
students, 694 of whom are male, and in 2007 1477 students, 732 of whom are male, were included in the
research by stratified sampling method (Kaya et al.,2000a,Kaya et al.,2000b, Kaya et al.,2003). These children
were evaluated with regard to four different anthropometric measurements in both studying periods. These
anthropometric measurements included the height of eye and elbow at standing position,the width of shoulder
and leg and knee distance. Allthe studentsincluded in the study were examined regarding general health control
by pediatrician. Any chronic and systemic cases which will be able to affect anthropometric measurements
weren’t included in the study. The students whose families have monthly incomes above minimum living
conditions according to State Statistics Institute’s economical indications were included in the study in every
both periods (1999 and 2007 years).
Harpenden Anthropometer device was used for allthe measurements. The anthropometer was calibrated
withthe accuracy of 0.05 cm. During the measurements,the children were barefooted and lightly clothed. Allthe
measurements weretaken between 8 and 12 o’clock every in the morning to prevent within day variabilityin the
measurements (Kayis, 1987,Kaya et al., 2003).
The studentsincluded inthe study were divided into groups interms of age and sex in every both periods.
The data obtained were evaluated statistically in both among themselves and among the groups. SPSS statistical
packet programme was used for statistical analysis.
Findings
According to age and sex, description and statistical analyses of anhropometric measurements belonging
to female and male students in 1999’s and 2007’s were shown in (Tab. 2 and 3). According to this it was
determined that anthropometric measurements according to age and sex of cases evaluated in 1999’s and 2007
are increased. Anthropometric measurements obtained in every both periods were compared according to age
and sex. When (Tab. 2) was examined, for example,it was found thatthere was a significant difference among
the heights of elbow values at standing position of male students, 8 years old, in 1999’s and 2007’s (t=-4.29,
p<0.001). While anthropometric measurements of the heights of elbow at standing position of the female
students, 8 years old, was 72.38 ± 4.26 in (Tab. 3) in 1999, it was found to be 74.67 ± 3.02 in 2007 and the
comparison of these two values was quite significant (t=-3.97, p<0.001).In every both periods,the comparison
of anthropometric measurements obtained among their kinds ofthe students at same age of group was shown in
(Tab. 2 and 3).
190
�1st International Syposium on Sustainable Development, June 9-10 2009, Sarajevo
Anthropometric
measurements
Eye Height
Elbow height
Shoulder breadth
Buttock-knee
length
Age
7
8
9
10
11
12
13
14
15
7
8
9
10
11
12
13
14
15
7
8
9
10
11
12
13
14
15
7
8
9
10
11
12
13
14
15
n
71
73
81
76
78
80
81
76
78
71
73
81
76
78
80
81
76
78
71
73
81
76
78
80
81
76
78
71
73
81
76
78
80
81
76
78
1999 Year
Mean ± SD
108.43 ± 4.57
112.52 ± 6.16
118.02 ± 5.55
122.80 ± 5.45
129.87 ± 5.07
134.84 ± 3.63
139.58 ± 4.03
141.98 ± 4.65
145.01 ± 5.07
69.08 ± 3.67
72.38 ± 4.55
76.24 ± 3.97
80.13 ± 3.97
84.65 ± 3.85
88.73 ± 4.36
90.18 ± 3.42
92.39 ± 3.75
94.29 ± 3.73
26.88 ± 1.12
27.62 ± 1.40
28.91 ± 1.51
29.82 ± 1.69
31.26 ± 1.51
32.73 ± 1.67
33.23 ± 1.24
34.52 ±1.43
35.39 ± 1.54
38.97 ± 2.16
40.74 ± 2.49
42.93 ± 2.73
44.76 ± 2.88
47.71 ± 2.60
50.32 ± 2.53
51.33 ± 2.17
52.64 ± 2.79
53.57 ± 2.85
n
74
80
83
82
82
85
82
81
83
74
80
83
82
82
85
82
81
83
74
80
83
82
82
85
82
81
83
74
80
83
82
82
85
82
81
83
2007 Year
Mean ± SD
109.35 ± 4.43
114.82 ± 4.11
120.63 ± 5.85
123.58 ± 5.29
129.76 ± 5.55
135.75 ± 5.13
140.20 ± 5.10
144.87 ± 6.31
145.42 ± 5.20
71.66 ± 3.73
74.99 ± 2.89
79.33 ± 4.22
81.54 ± 3.93
85.72 ± 3.88
89.31 ± 3.42
92.98 ± 4.24
96.56 ± 4.33
94.57 ± 3.86
28.38 ± 2.95
29.18 ± 1.40
30.43 ±2.24
30.98 ± 1.80
32.47 ± 1.77
33.51 ± 1.53
34.51 ± 1.72
35.80 ± 2.67
35.50 ± 1.67
39.26 ± 1.90
41.31 ± 2.08
43.80 ± 2.73
44.87 ± 2.61
47.31 ± 2.74
49.37 ± 2.12
51.29 ± 2.24
51.29 ± 2.79
53.70 ± 2.98
t
-1.23
-2.75 **
-2.93 **
-0.91
0.12
-1.23
-0.82
-3.24 **
-0.49
-4.24 ***
-4.29 ***
-4.82 ***
-2.25 *
-1.74
0.94
-3.92 ***
-6.44 ***
-0.45
-4.02 ***
-6.71 ***
-5.08 ***
-4.12 ***
-4.62 ***
-3.12 **
-5.27 ***
-3.70 ***
-0.42
-0.85
-1.55
-2.04 *
-0.26
0.95
2.62 **
0.13
0.83
-0.27
*: significant at p<0.05, **: significant at p<0.0.1, ***: significant at p<0.001
Table 2: The Comparison of anthropometric measurements of boys in 1999 and 2007
191
�1st International Syposium on Sustainable Development, June 9-10 2009, Sarajevo
Anthropometric
measurements
Eye Height
Elbow height
Shoulder breadth
Buttock-knee
length
Age
7
8
9
10
11
12
13
14
15
7
8
9
10
11
12
13
14
15
7
8
9
10
11
12
13
14
15
7
8
9
10
11
12
13
14
15
n
80
78
82
85
77
85
81
78
68
80
78
82
85
77
85
81
78
68
80
78
82
85
77
85
81
78
68
80
78
82
85
77
85
81
78
68
1999 Year
Mean ± SD
108.66 ± 4.42
112.59 ± 5.91
118.31 ± 5.75
122.45 ± 5.82
128.48 ± 5.22
132.11 ± 5.18
139.84 ± 6.71
144.74 ± 6.84
150.21 ± 7.75
69.17 ± 3.25
72.38 ± 4.26
76.45 ± 4.02
79.57 ± 4.34
84.15 ± 3.93
86.40 ± 4.28
91.53 ± 5.25
94.32 ± 5.04
98.17 ± 5.32
27.30 ± 1.35
28.19 ± 1.39
29.24 ± 1.57
30.17 ± 1.66
31.11 ± 1.49
32.00 ± 1.61
33.92 ± 1.96
34.96 ± 2.14
36.61 ± 2.41
38.77 ± 1.96
40.05 ± 2.61
42.29 ± 2.75
44.32 ± 2.61
46.44 ± 2.43
48.24 ± 2.29
51.19 ± 2.95
52.80 ± 2.26
54.83 ± 2.78
n
78
85
86
76
85
87
83
86
79
78
85
86
76
85
87
83
86
79
78
85
86
76
85
87
83
86
79
78
85
86
76
85
87
83
86
79
2007 Year
Mean ± SD
108.37 ± 4.56
113.75 ± 4.07
119.10 ± 6.60
124.23 ± 6.05
129.63 ± 4.99
133.58 ± 5.23
141.85 ± 5.37
144.54 ± 4.64
151.58 ± 8.09
71.35 ± 3.26
74.67 ± 3.02
78.76 ± 5.62
82.29 ± 4.41
85.59 ± 4.14
88.40 ± 3.81
93.99 ± 3.88
96.39 ± 3.70
98.54 ± 5.64
27.97 ± 1.36
28.78 ± 1.29
29.88 ± 1.93
30.92 ± 1.85
32.33 ± 1.70
32.96 ± 1.47
34.91 ± 1.97
35.63 ± 1.53
36.72 ± 2.31
39.51 ± 2.34
41.48 ± 1.90
43.69 ± 2.71
45.44 ± 2.70
47.60 ± 2.63
49.06 ± 2.32
51.74 ± 3.23
53.14 ± 2.41
54.59 ± 2.69
t
0.39
-1.47
0.82
-1.91
-1.43
-1.69
-1.19
0.20
-0.94
-4.20
-3.97
-3.05
-3.98
-5.22
-2.95
-2.35
-2.73
-0.60
-3.11
-2.79
-2.33
-2.75
-4.79
-3.73
-3.22
-2.11
-0.17
2.16
-4.02
-3.31
-2.72
-2.92
-1.99
-1.12
-0.84
-0.49
***
***
**
***
***
**
*
**
**
**
*
**
***
***
**
*
*
***
**
**
**
*
*: significant at p<0.05, **: significant at p<0.0.1, ***: significant at p<0.001
Table 3: The Comparison of anthropometric measurements of girlsin 1999 and 2007
Discussion
Itis always obvious that updating of the data bank is necessary in terms of checking and following the
students’ growing and developing in a healthy way by determining the dimensions of desks and tables used by
the students who spend most of their daily life at school during teaching and educating period. Although
discussions are available aboutfor how long anthropometric measurements should be updated,the results of our
study reflect the difference of 8 year anthropometric measurements. Yip and their colleagues emphasize that
anthropometric measurements should be updated at every 5 years (Yip et al., 1988). According to the result of
our study, it was determined that there was q significant difference in the comparison of anthropometric
measurements of the same age and kind of group. Although it was considered that changing of climate
conditions, developing of socio and economical conditions and health services, increasing the percent of
individual education level and changing oftheirfeeding habitcaused anthropometric measurementsincrease,the
result of our study showed thatthis period was necessary for updating anthropometric measurements.
However,in spite ofthe factthat statistical difference wasn’tfound among anthropometric measurements
dealing with the height ofthe eye and the distance between the leg and knee at standing position from the point
of all age groups, on the other hand, it was determined that statistical difference was found in terms of the age
and the kind in every both periods withthe regard tothe height ofthe elbow and width of shoulder parameters at
standing position.
As a result, although the results of our study suggestthat anthropometric measurement values during the
childhood should be updated always needed at every ten years, new studies are the children living in different
socio and economic and altitude conditions.
192
�1st International Syposium on Sustainable Development, June 9-10 2009, Sarajevo
Acknowledgments
The authors would like to extend their deep appreciation to Prof. Dr. Behzat ÖZKA N of the Department
of Pediatrics, Faculty of Medicine at Atatürk University,for his suggestions on write-up ofthe study.
References
Floyd, W.F. & Roberts, D.F. (1958). Anatomical and physiological principles in chair and table design. Ergonomics, 2, 1–16
Floyd, W.F. & Word, J.S. (1969). Anthropometric and physiological considerations in school, office and factory seating.
Ergonomics, 12, 132–139
Hira, D.S. (1980). An ergonomic apprasial of educational desks. Ergonomics, 23, 213–221
Jeong, B.Y. & Park, K.S. (1990). Sex differences in anthropometry for school furniture design. Ergonomics, 33(12), 1511–
1521.
Kaya, M.D., Hasiloglu, A.S., Bayramoglu, M., Yesilyurt, H., & Ozok, A.F. (2003). A new approach to estimate
anthropometric measurements by adaptive neuro-fuzzy inference systems (ANFIS). International Journal of Industrial
Ergonomics, 32(2), 105–114.
Kaya, M.D., Yeşilyurt, H., Özkan, B. & Akdağ, R. (2000b). Orta dereceli irtifada (2000 m., Erzurum) yaşayan lise
öğrencilerinin antropometrik ölçümleri, YA/EM’2000 Yöneylem Araştırması ve Endüstri Mühendisliği XXI. Ulusal Kongresi,
12-14 Haziran 2000, Doğu Akdeniz Üniversitesi.
Kaya, M.D., Yeşilyurt, H., Özkan, B., Çapoğlu, Đ. & Akdağ, R. (2000a). Anthropometric measurements in adolescents living
at an intermediate altitude: the relationship between height, weight, head circumference and socioeconomics status, McCabe,
P.T., Hanson, M.A., Robertson, S.A. (Editör), Contemporary Ergonomics 2000, Taylor & Francis Inc., London, 38-43.
Kayış, B. & Özok, A.F. (1986). Đlkokul öğrencilerinin boyutsal ölçülerinin saptanması, TÜBĐTAK, YAE, Rapor no: h128,
Ankara.
Kayış, B. (1987). Đlk eğitim donanımlarının tasarımında antropometrik verilerin önemi, TÜBĐTAK, YAE, Rapor no: a67,
Ankara.
Mandal, A.C. (1982). The correct height of school furniture. Human Factors, 24, 257–269
Oxford, H.W. (1969). Anthropometric data for educational chairs. Ergonomics, 12, 140–161
Pheasant, S. (1988). Bodyspace: Anthropometry, Ergonomics and Design. London, Taylor & Francis; 1988.
Yip, R., Binkin, N.J. & Trowbridge F.L. (1988). Altitude and childhood growth. The Journal of Pediatrics, 113, 486–489.
193
�
Dublin Core
The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.
Extent
The size or duration of the resource.
507
Title
A name given to the resource
A Research on Updating of Anthropometric Measurements
Author
Author
KAYA, M. Dursun
MALKOÇ, ismail
ERDOĞAN, Osman
KARA, Aslı
YELSiYURT, Hakkı
Abstract
A summary of the resource.
By considering the dimensional measurements of the students who spend most of their time at school, the fact that their body and structural equipment haven’t been designed will affect their body and psychological improvements negatively. Anthropometric measurements are necessary for education equipment and designs of education-structural equipment of the children at the age of school. It is emphasized that anthropometric measurements of the people living in different climate and altitude conditions in literature will be different. It is mentioned that anthropometric data available for a certain region will be able to change in terms of changing socio-economical conditions and therefore, updating of anthropometric data is necessary in certain in period of times. For the reason, in 1999 anthropometric data obtained from the children, between the age of seven and fifteen, who were in sitting and standing position, were measured to plan a longitudinal study in 2007. In the result of comparison which was made, as reported in literature, it is clear that anthropometric data will be able to be updated in certain period of times.
Date
A point or period of time associated with an event in the lifecycle of the resource
2009-06
Keywords
Keywords.
Conference or Workshop Item
PeerReviewed
Q Science (General)
-
https://eprints.ibu.edu.ba/files/original/0fac96c39ee07704574213534788ad71.pdf
8c5dcc209f0f7c3cbdab818a64d56a2c
PDF Text
Text
1st International Syposium on Sustainable Development, June 9-10 2009, Sarajevo
A Sample for the Environmental Protection Implementation in Turkey:
National Parks
Serkan Doğanay
Atatürk University, Turkey
sdoganay@atauni.edu.tr
Mete Alım
Atatürk University, Turkey
metealim @atauni.edu.tr
Na mık Tanfer ALTAŞ
Atatürk University, Turkey
ntanfer@atauni.edu.tr
Abstract: The rapid population growth, extreme and unplanned consumption, in line with
technological developments, cause intensive pressure upon natural sources. Likewise, the
human values that have a global importance due to historical and cultural features face the
similar problems. As one of the current global problems, environmental change and
destruction urge to be taken some precautions. The conscious occurrence of the national parks,
one of the precautions of environmental protection, goes back to the second half of the
nineteenth century. The Yellowstone National Park, in the USA opened in 1872 can be seen
as the official beginning of the environmental protection thought.
The natural and cultural sources are under serious danger in Turkey where its settlement is
very old. The first legal regulations in Turkey as for the national parks were made at the end
of the World War II. The first national park is Yozgat Camligi National Park opened in 1958.
Today, the number of these park is 40 and the protection area reaches 897 657 hectares. It is
seen that the 1.1 % of the whole area (814 578 km²) is under protection as national park field.
Intense tourism pressure causes ignorance of protection approach which is the basis of
sustainable environment understanding. Further, the restriction of economic benefit zones
causes the local people to develop negative attitudes towards protection areas. However, the
expectations of the local people should be taken into consideration by means of scientific
planning so that sustainable environment understanding can reach the optimum results.
In this study the legal regulations as for the national parks, national parks and their
geographical distribution, the fundamental problems and suggestions were examined.
Keywords: Environmental protection, national park, sustainable development, Turkey
Introduction
The rapidly growing world population and technological developments resultinthe use of natural sources
intensively. Especially the increase in manufacturing,the development of cities and the expansion of trade pave
the way forthe emergence of worldwide environmental problems. Environmental changes and impairment affect
also the natural sources negatively in terms of causing their reduction and losing their quality. It began to be
realized that environmental problems were reaching global level in 1960s. In this sense, almost every country
began to getinvolved in attempts to contribute to providing sustainable progress and reducing the deterioration
of natural balance. Scientific, social and economic benefits of nature protection zones began to be perceived
apparently and as a consequence of this,the amount of the conserved area today is 1 billion ha (Demirel 2005:
7)
The idea of forming national park which is one of the approaches to protect the nature came into
prominence in the second half of the 19th century. Yellowstone National Park which was taken under
preservation in 1872 in the USA was the first practice of this idea. In the same period, the concept of nature
conservation was adopted by countrieslike Australia, Canada, New Zealand and Mexico.
The geographicallocation of Turkey paved the way for the affluence of Turkey in terms of both natural
and culturalsources. However,the factthatthe firstsettlement dates back to old times and the intense beneficial
use of the area gave rise to many environmental problems. The idea to erect national parks in Turkey aiming at
protecting rare species of plants and animals, cultural entities,land forms and hydrographical sources began
223
�1st International Syposium on Sustainable Development, June 9-10 2009, Sarajevo
to develop in 1950s. The firstlegalregulation in Turkey regarding national parks was made withthe article 25 of
the Forest Law no 6831 which was implemented in 1956. Afterwards, the 2. article of National Parks Law no
2873 brought forward the concepts of nature protection zones, natural parks, natural monuments and recreation
spots in addition to national parks. (Doğanay 2001:151-153, Turkey Environmental Organization 1999:335). In
this article, the concept of national park is defined as the nature segments that own scientifically and
aesthetically unique national and international natural and cultural values, and also recreation and tourism spots
(Akıncı 1996:222). By the regulations made in this field, today totaling 206 protection zones including the
national parks (40), natural parks (30), natural monuments (105) and nature protection zones (31) are present in
Turkey. The aggregate surface area of the aforementioned protection zones is 1028565 ha and the 897657 ha of
which belong to national parks, and this constitutes 1.2 % ofthe country’stotalsurface area.In 1993, protection
zones (572395 ha) made up only 0.7 % of the total surface area of the country (Taşlıgil 1994:259). Just taking
the national parks into consideration, itis seen that about 1.1 % of Turkey has been taken under preservation.
This data revealsthatthere was an acceleration in the attempts to identify the protection zones after 1990. As a
matter of fact, 19 oftotal 40 national parks were identified after 1990.
National parks which are among the most efficient approaches to transferring natural and cultural sources
to the next generations after preserving them consciously are of great importance for scientific studies besides
their being the centre of attraction for tourists. Protection zones like national parks which are vitally important
for sustainable environmentalapproach are facing some basic problems which need to be solved as expeditiously
as possible. The negligence of the balance between preservation-utilization, and the high pressure oftourism are
the greatest problems. Accordingly, primarily Turkey’s national parks and their geographical distribution in
conjunction with their causes are discussed in this study. Afterwards,the problems encountered in national park
areas and in the neighboring areas are dealt with from the point of preservation- utilization balance, and local
economy and are attempted to come to a conclusion.
National Parks and Their Geographical Distribution
The most common way of preserving the nature in the world is national parks. Because of their natural
and cultural characteristics,that some geographical areas are protected and putinto the service of human beings
for cultural and touristic reasons forms the basis of the foundation of national parks (Doğaner 1985:119).
Therefore, in accordance with the idea of sustainable environment, the idea to build up a balance between
preservation and utilization isenvisaged.
Turkey isthe intersection point of the continents of Asia, Europe and Africa. Additionally,the variety of
land forms and its being surrounded with water provides Turkey with affluence interms of both plant and animal
existence. Nevertheless, the fact that the first settlement date goes long way back brought about the serious
devastation of natural sources. Though itis estimated that 10000 years before B.C, 75 % of the area on which
Turkey is located currently was covered with forest,today this rate has gone down to 25 %. Within the same
period, wetland has receded from 6 % to 1 %. Related to the intense exploitation, while forest, moor and
wetlands have diminished, agricultural and settlement areas have steadily increased. The alterations in the
natural habitatresulted inthe extinction of 12 kinds of endemic plant species and brought along 1189 more plant
species tothe verge of extinction (Demirel 2005:24).
Itis getting more and more crucial to conserve the wealthy diversity of plants against the rising human
activities. Protection zones like national parks undertake a prettyimportantfunction in conserving especially the
endangered species.
The conservation and declaration of national parks are carried out by General Directorate of Nature
Protection and National Parks which is affiliated to the Ministry of Environment and Forestry. The first national
park which was taken under protection in 1958 is Yozgat Çamlığı National Park (Figure 2). The latest national
park is Yumurtalık Lagoon National Park which was declared in 2008 (Figure 3). The number of national parks
inthe country has reached 40 today. The grand total ofthe surface area of national parksis around 897657 ha.In
our country, between the years 1950-1959 4, 1960-1969 5,1970-1979 7, 1980-1989 5, 1990-1999 11, 2000-2009
8 national parks were identified and established (Table 1).Yozgat Çamlığı (264 ha) and Bird Paradise National
Park (64 ha) are the ones with the smallest area (Arı, 2003: 9). Bird Paradise National Park, which was certified
to have 64 ha surface area in 1959, was scaled up to 24047 ha in 2005. The largest one of allthe national parks
in Turkey is Beyşehir Lake National Park with its 88750 ha of surface area. Historicalrelics, geomorphological
formations,flora, hydrologicalfeatures and the presence of diverse bird species compose the value of this park.
Ağrı Mountain National Park (87380 ha), Kızıl Mountain National Park (59400 ha), Aladağlar National Park
(54524 ha) and Kaçkar Mountains National Park (51550 ha) are following the previously mentioned national
park in the order of magnitude (Table1).
Natural, cultural, historical and archaelogical values they possess are regarded in the process of
224
�1st International Syposium on Sustainable Development, June 9-10 2009, Sarajevo
designating the national parks in Turkey (Figure 4). Justto give an example, while Gelibolu Peninsula National
Park and Başkomutan Historical National Park have been taken under protection due totheirimportance in terms
of war history, Güllük Mountain (Termessos), Karatepe-Aslantaş, Olimpos-Beydağları Beach, Köprülü Canyon,
Boğazköy- Alacahöyük and Troya Historical National Parks have been designated as national parks for their
high historical value areas and for harbouring archealogical relics. We also have national parks which were
designated as national parks because of their natural vegetation and wild life. Yedigöller National Park, Dilek
Peninsula- Müyük Menderes Delta National Park, Ilgaz Mountain National Park, Kovada Lake National Park,
Đğneada Longoz Forests National Park, Tek Tek Mountains National Park and Yumurtalık Lagoon National Park
are some examples of these kinds of national parks. Some ofthe national parks in Turkey come into focus with
their different source of values. To illustrate this, Köprülü Canyon National Park owns rich flora besides
archaeological relics. Altındere Valley National Park, which islocated in the Eastern part of Black Sea Region,
is known forits embodying a universal archaeological and historicalstructurelike Sümela Monasteryin addition
to its natural values (Doğanay, 2003: 43-64). Göreme Historical National Park has been declared as protection
zone as it possesses amazing geological formations like fairy chimneys, old settlements, churches and a high
tourism potential. Uludağ, Saklıkent, and Ilgaz Mountain National Parks are also of great importance as winter
tourism centers.
Taking a look atthe regional distribution of national parks,itis vividly seen that 31 of 40 national parks
are situated in the regions on the coast. Mediterranean (11)isthe region with the most national parks. Black Sea
(8), Marmara (7), Egean (5), Central Anatolia (4), Eastern Anatolia (3) and Southeastern Anatolia (2) are the
regions coming after it (Figure 1, Table 1). Morphological characteristics, diverse flora, historical and cultural
values arethe reasons why national parks are situated mostly in coastalregions (Yaşar, 2000: 185).
1
2
3
4
5
6
7
8
Name
Region
Province
Area
(ha)
Date
Aladağlar N.P.
Mediterranean
Niğde, Adana,
Kayseri
54524
1995
Mediterranean
Adana
16430
2008
Southeastern
Anatolia
Adıyaman
13850
1988
Aegean
Afyon, Kütahya,
Uşak
40742
1981
Eastern Anatolia
Ağrı, Iğdır
87380
2004
Black Sea
Ankara
1195
1959
Mediterranean
Antalya
6702
1970
Mediterranean
Antalya
34425
1972
Yumurtalık
Lagoon N.P.
Nemrut
Mountain N.P.
Başkomutan
Historical N.P.
Ağrı Mountain
N.P.
Soğuksu N.P.
Güllük
Mountain
(Termessos)N.P.
OlimposBeydağları
Coast N.P.
9
Köprülü Canyon
N.P.
Mediterranean
Antalya
36614
1973
10
Altınbeşik Cave
N.P.
Mediterranean
Antalya
1156
1994
11
Hatila Valley
N.P.
Black Sea
Artvin
17138
1994
12
Karagöl-Sahara
N.P.
Black Sea
Artvin
3766
1994
13
Dilek PeninsulaBüyük
Menderes Delta
N.P.
Aegean
Aydın
27675
1966
14
Bird Paradise
N.P.
Marmara
Balıkesir
24047
1959
Source Value
- Geological and
geomorphological structure
- Flora and fauna
- Bird existence
- Sea turtle and Flora
- Historical open air museum
- Watching sunrise
- Cultural values
- Cultural values
- Flora and fauna
-Flora
- Recreation and entertainment
-Archaeological relics
-Flora
- Recreation and entertainment
- Archaeological relics
-Flora
- Recreation and entertainment
- Archaeological relics
-Flora
- Geological formations
- Geological and
geomorphological formations
- Cave ecosystems
- Geological and
geomorphological formations
- Flora and fauna
- Hydrographical structure -Flora
- Well protected maquis flora of
the Mediterranean
- Geological structure
- Flora and fauna
- Recreation and entertainment
- Diverse bird species -Flora
- Bird observation
225
�1st International Syposium on Sustainable Development, June 9-10 2009, Sarajevo
-Flora and fauna
- Multiplicity of tourism
- Flora and fauna
- Geological and
geomorphological formations
15
Kazdağı N.P.
Marmara
Balıkesir
21300
1993
16
Küre Mountain
N.P.
Black Sea
Kastamonu,
Bartın
37172
2000
17
Yedigöller N.P.
Black Sea
Bolu, Zonguldak
2019
1965
18
Uludağ N.P.
Marmara
Bursa
12732
1961
19
Gelibolu
Peninsula
Historical N.P.
Marmara
Çanakkale
33000
1973
20
Troya Historical
N.P.
Marmara
Çanakkale
13350
1996
21
Ilgaz Mountain
N.P.
Black Sea
Çankırı,
Kastamonu
1088
1976
-Flora
- Mountain and winter sports
- Recreation and entertainment
22
BoğazköyAlacahöyük
N.P.
Central Anatolia
Çorum
2634
1988
- Archaeological relics (Hittite
state center)
23
Honaz Mountain
N.P.
Aegean
Denizli
9616
1995
24
Gala Lake N.P.
Marmara
Edirne
6090
2005
25
SarıkamışAllahuekber
Mountain
N.P.
Eastern Anatolia
Kars, Erzurum
22980
2004
26
Kızıldağ N.P.
Mediterranean
Isparta
59400
1969
Mediterranean
Isparta
6534
1970
Central Anatolia
Kayseri
24523
2006
Marmara
Kırklareli
3115
2007
27
28
29
Kovada Lake
N.P.
Sultansazlığı
N.P.
Đğneada Longoz
Forests
N.P.
30
Beyşehir Lake
N.P.
Mediterranean
Konya
88750
1993
31
Spil Mountain
N.P.
Aegean
Manisa
6694
1968
32
Marmaris N.P.
Aegean
Muğla
33350
1996
33
Saklıkent N.P.
Mediterranean
Muğla, Antalya
12390
1996
34
Göreme
Historical N.P.
Central Anatolia
Nevşehir
9572
1986
35
KaratepeAslantaş N.P.
Mediterranean
Osmaniye
7715
1958
226
- Flora and fauna
- Recreation and entertainment
- Geological formations
- Flora
- Mountain and winter sports
- War history
- Flora and fauna
- Geomorphological formations
- Historical relics
- Geological structure
- Geological and
geomorphological formations
- Archaeological relics
-Flora (endemic species)
- Wetland areas
- Lake and forest ecosystems
- Diverse bird species
- Historical relics and war history
-Flora (Pinus sylvestris forests)
- Mountain and winter sports
-Flora
- Recreation and entertainment
- Flora and fauna
- Recreation and entertainment
- Fresh and salty water ecosystems
- Diverse bird species
- Longoz forest
- Mountain and forest sports
- Historical relics
- Geomorphological formations
-Flora
- Hydrological features
- Diverse bird species
- Geological structure
- Flora and fauna
- Recreation and entertainment
- Geomorphological formations
- Flora and fauna
- Historical relics
- Geomorphological formations
- Flora and fauna
- Historical settlements
- Geological formations (Fairy
Chimney)
- Recreation and entertainment
- Archaeological relics
-Flora
- Recreation and entertainment
�1st International Syposium on Sustainable Development, June 9-10 2009, Sarajevo
36
Kaçkar
Mountain N.P.
Black Sea
Rize
51550
1994
37
Tek Tek
Mountain N.P.
Southeastern
Anatolia
Şanlıurfa
19335
2007
38
Altındere Valley
N.P.
Black Sea
Trabzon
4800
1987
Eastern Anatolia
Tunceli
42000
1971
Central Anatolia
Yozgat
264
1958
39
40
Munzur Valley
N.P.
Yozgat Çamlığı
N.P.
- Geological and
geomorphological structure
- Flora and fauna
- Mountain and winter sports
- Flora and fauna
- Historical and archaeological
characteristics
- Cultural values (Sümela
Monastery)
- Flora and fauna
- Recreation and entertainment
- Geological structure
- Flora and fauna
- Flora and fauna
- Recreation and entertainment
Table 1: National parks in Turkey,1958-2009 (http://www.milliparklar.gov.tr-20.04.2009).
Figure 1: Geographical distribution of national parks in Turkey (2009).
National Parks:
1.Aladağlar N.P. 2.Yumurtalık Lagoon N.P. 3.Nemrut Mountain N.P. 4.Başkomutan Historical N.P. 5.Ağrı
Mountain N.P. 6.Soğuksu N.P. 7.Güllük Mountain (Termessos) N.P. 8.Olimpos-Beydağları Coast N.P.
9.Köprülü Canyon N.P. 10.Altınbeşik Cave N.P. 11.Hatila Valley N.P. 12.Karagöl-Sahara N.P. 13.Dilek
Peninsula-Büyük Menderes Delta N.P. 14.Bird Paradise N.P. 15.Kazdağı N.P. 16.Küre Mountain N.P.
17.Yedigöller N.P. 18.Uludağ N.P. 19.Gelibolu Peninsula Historical N.P. 20.Troya Historical N.P. 21.Ilgaz
Mountain N.P. 22.Boğazköy-Alacahöyük N.P. 23.Honaz Mountain N.P. 24.Gala Lake N.P. 25.SarıkamışAllahuekber Mountain N.P. 26.Kızıldağ N.P. 27.Kovada Lake N.P. 28.Sultansazlığı N.P. 29.Đğneada Longoz
Forests N.P. 30.Beyşehir Lake N.P. 31.Spil Mountain N.P. 32.Marmaris N.P. 33.Saklıkent N.P. 34.Göreme
Historical N.P. 35.Karatepe-Aslantaş N.P. 36.Kaçkar Mountain N.P. 37.Tek Tek Mountain N.P. 38.Altındere
Valley N.P. 39.Munzur Valley N.P. 40.Yozgat Çamlığı N.P.
227
�1st International Syposium on Sustainable Development, June 9-10 2009, Sarajevo
Figure 2: Yozgat Çamlığı N.P.
Altındere Valley N.P.
Gala Lake N.P
Başkomutan Historical N.P.
228
Figure 3: Yumurtalık Lagoon N.P.
Karagöl-Sahara N.P.
Troya Historical N.P
Dilek Peninsula-Büyük Menderes Delta N.P.
�1st International Syposium on Sustainable Development, June 9-10 2009, Sarajevo
Nemrut Mountain N.P.
Ağrı Mountain N.P.
Figure 4: Views of some national parks inTurkey.
Discussion and Conlusion
The greatest threat the world faces today is the deterioration of the natural environment. The fact that
environmental problems have ascended to desperate straitsin the global scale entailsinternational collaboration.
Almost every country in the world aims at developing by establishing a balance between human being and
natural sources, and also without depleting the natural sources. With this purpose in mind, sustainable growth is
given alot ofimportance with respectto social, ecological, economic,locational and cultural dimensions.
The diverse natural and cultural sources Turkey contains are witnessing a heavy exploitation of them.
Because of this, a balance policy between preservation and utilization related to the use of them without
contaminating, mutilating and depleting has been adopted. In this sense, national parks also draw attention.
Nevertheless,there are some problems present which need to be solved as urgently as possible forthe protection
of source values of national park zones,reforming them and increasing their significance in terms oftourism.
Com mon problems regarding national parks are managerial,legal, economic and educational (Demirel,
2005: 394-401). Furthermore, that intense tourism pressure and local inhabitants can’t be associated with
protection zones threatens preservation and utilization balance. The duty of the management of national parks is
carried out by General Directorate of Nature Protection and National Parks which is directly affiliated to the
Ministry of Environment and Forestry. A large number of organizations take it upon themselves to protect the
nature directly orindirectly. This kind of administrative structure createslack of coordination and it hampers the
practicality of plans in protection zones. To resolve the problem, a new restructuring in which there are expert
staff who can devise the source values national parks own is required. The protection zones in our country are
protected with 6 differentlaws. Thisindicatesthat protection zones are in greatlegal disorder. Nature Protection
Law which embraces all otherlaws is needed immediately in this field. High cost and scarcity of grantis one of
the burning issuesinthe process of protection.In orderto dispose ofthisissue, more fund should be allocated to
national parks and the revenue generated out of national parks should be submitted to park administration.
Financial affairs have downgraded national parks in terms oftrained staff and equipment.The existing problems
are the utmost hurdles on the way to the protection of the source values national parks have and their
enhancement.
Itis a common belief in developed countries that natural environment must be protected. However, the
sense of responsibilityto protectthe nature istoo low in countrieslike Turkey. For this reason,the best solution
tothis problem is educating individualsregarding the issue ofenvironment and its protection. Allthe classesthat
constitute our country should lay claim to preservation policy in collaboration.
One ofthe burning problems of national parksis high tourism pressure. Therefore,theidea of exploitation
wins out over the preservation and utilization balance in the institutions which were established with the idea of
providing this balance. With the above stated approach,itis notlikely to conserve the source values of national
parks and to improve them too. This situation gives the illusion that the national parks of the country were
established with the intention of serving tourism. For Turkey to get rid of this dilemma, an elaborate plan of
national parks must be prepared. In these plans, source values and their importance must be identified
thoroughly. Additionally,the zones which are not available to people and the zones the source values of which
will be taken under protection, and the zones which are available for daily use should be determined.
Accordingly,touristfacilitiesmust be deployed outside national park zones.
One of the major deficiencies of the idea of preservation in Turkey is that local population can’t be
associated with protection zones. The traditional perception model which restricts human activities and
229
�1st International Syposium on Sustainable Development, June 9-10 2009, Sarajevo
anticipatesthe migration of human beings that are within the borders of protection zone or their utilizing natural
sources is being abandoned. Instead of this,there is an attempt in which local elements can get involved in the
decision making process and with theirlifestyles,they can become an integral part of source utilization strategies
(Arı 2003: 29). Protection zones in our country generally constrain locals’ economic utilization zones. Due to
financial difficulty,this paves the way for migration and locals’ developing negative attitude towards protection
zones. Bearing this in mind, making the locals an integral part of preservation, allowing them to utilize the
source values of national parks economically without damaging them will be a modern approach.
The most efficient way to preserve historical and cultural values and passthem down to future generations
without depleting and devastating them is national parks. Collaborating with one another,all groups of people in
the society should develop an integrated approach that can meet the expectations. This approach which also
forms the basis of sustainable progress will be a milestone in determining not only our nation’s but also the
common future of whole humanity.
References
Akıncı, M. (1996). Oluşum ve yapılanma sürecinde Türk çevre hukuku. Kocaeli Kitap Kulübü Yay., Bilim
Dizisi: 1,Đzmit.
Arı, Y. (2003). Kuş Cenneti Milli Parkı’nda park yönetimi-yöre halkıilişkisi. Doğu Coğrafya Dergisi, 8 (9), 737.
Demirel, Ö.(2005). Doğa koruma ve milli parklar. Karadeniz Teknik Üniv. Yay. No: 219, Orman Fak. Yay. No:
37, Trabzon.
Doğanay, H. (2001). Türkiye turizm coğrafyası. Çizgi Kitabevi, Konya.
Doğanay, S. (2003). Coğrafi özellikleri açısından Altındere Vadisi Milli Parkı. Doğu Coğrafya Dergisi, 8 (10),
43-64.
Doğaner, S.(1985). Turizmde Doğanın Önemi ve Türkiye’de Doğayı Koruma Çalışmaları.Đstanbul Üniv. Deniz
Bil. ve Coğrafya Enstitüsü Dergisi, 2,(2).
Doğaner, S.(2001). Türkiye turizm coğrafyası. Çantay Kitabevi,Đstanbul.
Özgüç, N. (1998). Turizm coğrafyası(özellikler-bölgeler). Çantay Kitabevi,Đstanbul.
Sarı, C. (2007). Çeşitli koruma statülerindeki alanların turizm amaçlı kullanımı: Güllük Dağı (Termessos) Milli
Parkı örneği. Atatürk Üniv. Fen-Edebiyat Fak. Sosyal Bilimler Dergisi, 7 (39).
Sever, R. & Bekdemir, Ü. (2007). Eko-turizm açısından Karagöl-Sahara Milli Parkı (Artvin-Şavşat). Atatürk
Üniv. Fen-Edebiyat Fak. Sosyal Bilimler Dergisi, 7 (39).
Sezer, Đ.(2006). Dilek Yarımadası-Büyük Menderes Deltası Milli Parkı’nın coğrafi etüdü (Basılmamış Yüksek
Lisans Tezi), Atatürk Üniv. Sosyal Bilimler Enstitüsü, Erzurum.
Somuncu, M. (2003). Türkiye’nin koruma altındaki dağlık alanlarda turizm/rekreasyon ve çevre etkileşimi:
Aladağlar ve Kaçkar DağlarıMilli Parkı örnekleri. CoğrafiÇevre Koruma ve Turizm Sempozyumu, 2003, Đzmir.
Somuncu, M. (2004). Dağcılık ve Dağ Turizmindeki Đkilem: Ekonomik Yarar ve Ekolojik Bedel. Ankara Üniv.
Türkiye Coğrafyası Araştırma ve Uygulama Merkezi Coğrafi Bilimler Dergisi, Cilt: 2, Sayı: 1, Ankara.
Taşlıgil, N. (1994). Spil Dağı Milli Parkı. Türk Coğrafya Dergisi, Sayı: 29,Đstanbul.
Yaşar, O. (2000). Ülkemizde Milli Park ve Benzer Statüdeki Alanların Dağılımı. Türk Coğrafya Dergisi, Sayı:
35, Đstanbul.
http://www.milliparklar.gov.tr
230
�
Dublin Core
The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.
Extent
The size or duration of the resource.
515
Title
A name given to the resource
A Sample for the Environmental Protection Implementation in Turkey: National Parks
Author
Author
Doğanay, Serkan
Alım, Mete
ALTAS, Namık Tanfer
Abstract
A summary of the resource.
The rapid population growth, extreme and unplanned consumption, in line with technological developments, cause intensive pressure upon natural sources. Likewise, the human values that have a global importance due to historical and cultural features face the similar problems. As one of the current global problems, environmental change and destruction urge to be taken some precautions. The conscious occurrence of the national parks, one of the precautions of environmental protection, goes back to the second half of the nineteenth century. The Yellowstone National Park, in the USA opened in 1872 can be seen as the official beginning of the environmental protection thought. The natural and cultural sources are under serious danger in Turkey where its settlement is very old. The first legal regulations in Turkey as for the national parks were made at the end of the World War II. The first national park is Yozgat Camligi National Park opened in 1958. Today, the number of these park is 40 and the protection area reaches 897 657 hectares. It is seen that the 1.1 % of the whole area (814 578 km²) is under protection as national park field. Intense tourism pressure causes ignorance of protection approach which is the basis of sustainable environment understanding. Further, the restriction of economic benefit zones causes the local people to develop negative attitudes towards protection areas. However, the expectations of the local people should be taken into consideration by means of scientific planning so that sustainable environment understanding can reach the optimum results. In this study the legal regulations as for the national parks, national parks and their geographical distribution, the fundamental problems and suggestions were examined.
Date
A point or period of time associated with an event in the lifecycle of the resource
2009-06
Keywords
Keywords.
Conference or Workshop Item
PeerReviewed
Q Science (General)
-
https://eprints.ibu.edu.ba/files/original/d81943d5437961711d62b0eee53683a0.pdf
7b0f44563ee119b17cc60b833e38dde2
PDF Text
Text
A Survey Of Network Modelıng And Sımulatıon Tools: Devs Comparıson
Bülent Çobanoğlu
Sakarya University Electronics and Computer Science Department
54187 Sakarya, TURKEY
bcobanoglu@sakarya.edu.tr
Ahmet Zengin
Sakarya University Electronics and Computer Science Department
54187 Sakarya, TURKEY
azengin@sakarya.edu.tr
Sinan Tüncel
Sakarya University Electronics and Computer Science Department
54187 Sakarya, TURKEY
stuncel@sakarya.edu.tr
Hüseyin Ekiz
Sakarya University Electronics and Computer Science Department
54187 Sakarya, TURKEY
ekiz@sakarya.edu.tr
Abstract: Speed, hardware, cost, diversity of user demands and interoperability requirements
of today’s network systems cause several difficulties in network research. In design phase,
due to time and cost advantage of modeling and simulation science it is widely used by
researchers working on network systems. In order to expedite and simplify the design process,
to design and develop network simulation tools is an active research area. Today, many
modeling and simulation tools are available in computer networks research and education. In
this study, to assist researchers working on computer networks in the selection of modeling
and simulation tools, several best-known simulators are selected and compared. Especially to
examine the advantages and disadvantages of network simulators used for training purposes,
an OSPF protocol implementation was devised to discuss strengths and weaknesses of
simulators. At the same time, executing a general purpose DEVS based OSPF model in
DEVS-Suite simulator; the advantages of the method are summarized.
1. Introduction
The primary aim of computer networks is providing connection among users to access resources. Currently,
computer networks has become a very complex structure including variety of applications such as operating
systems, communication protocols, link technologies, traffic flow, routing algorithms and protocols.
Network design process is a difficult task in case of meeting user requirements, cost and capacity. To simplify
the design process, researchers and manufacturers maintain different network modeling and simulation (M & S)
tools have already developed and still under development. These network modeling and simulation tools (M &
S) can be used for practical purposes and they can be also used for educational and research purposes.
Modeling and simulation (M & S) methodologies play an important role in computer network research and
design. Real networks can be investigated by modeling the new networking technologies that efficient
development and testing, various network conditions and scenarios under the communication protocol
development and evaluation [7] [8] [12]. To investigate interactions with other protocols and to make
comparisons with other approaches, to study the behavior and properties of the protocols are very important.
There are a wide range of network modeling and simulation tools used today. In general, these tools can be
divided into four classes: analytics, simulation, network topology discovery and production tools. Analytical
tools help the design of a network model calculation (eg, reliability, usability, etc.). Analytical model, among
418
�other methods have the advantage of simplicity and often simplified assumptions. If network discovery tools
available to a system, real network components and their graphic or textual (text) can be obtained. Simulation
tools are used to simulate the dynamic behavior a network components such as packet switch, link errors, TCP
protocol, etc [1, 12].
Today, number of network simulators and simulation tools are found to design and analysis of networks (see
Figure 1).
Tools
Analytical
Topology
Generation
Simulation
Educational
tools
Commercial
tools
Network
Discovery
Specialized
tools
Figure 1. Classification of the network design and simulation tools.
2. Network Sımulatıon Tools
Network simulators were developed to help researchers in network design and development processes. The large
number of network simulators for training purposes and commercial purposes are available. Their features and
capabilities will be examined in this. In this study we compared OPNET, ns-22 and OMNET with specialpurpose simulator DEVS Suite.
Most known simulators for training are ns-2, pdns, Netsim, GTNetS, WIPSIM, OMNET++ and commercial
simulators are OPNET, QualNet, COMNET, REAL, SSFNet and Ted, special-purpose simulators are Glomosim,
QUIPS-II, the ATM-TN, and Devs Suite.
In this study, commonly used network simulation software and tools are given in Table 1 and a survey research
conducted among the results obtained [1, 3, 9, 20].
2.1 Educational tools
2.1.1 OMNET++
Figure 2. OMNET screenshot of the simple network consisting of router nodes and duplex links
419
�OMNET + + (Objective Modular Network Testbed in C + +), object-oriented (object-oriented) and this software
is a modular discrete event network simulator itemized below can be used in the simulation of the process.
- Communication modeling of traffic
- Modeling of communication protocols
- Multi-processor and other distributed hardware systems, modeling
- Hardware structure review
- Evaluation of performance analysis of complex systems
- Discrete event approach is suitable for modeling of other systems.
OMNeT + + software models a network as composed of interconnected modules. The top-level module is
network module. The depth last module is connected to the user so that models of complex systems can be
realized easily. Modules can be divided into two categories: simple and compound. A simple module is to
describe the behavior of a model associated with C + + file. This file is written by the user using OMNET + +
simulation class library. Compounds from a combination of the modules consists of the simple modules and are
not directly associated with a C + + file. Modules communicate among themselves and with the help of the
messages of the simulation time, a module receives a message from the module itself or another is progressing.
The structure of modules and interfaces and the simulation parameters can be organized using Network
Definition Language (Network Description Languages - NED) and are created as a startup file (. Ini) which is
easily adjustable. [22], [6]
2.1.2 The network simulator ns-2
The network simulator ns-2 is developed based on REAL network simulator project. It is designed for research
for local and wide-area network simulations and network education. Ns-2 is an object-oriented, open source,
discrete event network simulator, which is written in C++ and uses OTcl as a command and configuration
interface. It is based on a seven-layer network synthesis and designed as packet-based, which means that all
packet interactions are in focus during simulation. It implements network transmission protocols such as TCP
and UPD, traffic source behavior such as FTP, Telnet, Web, CBR and VBR, router queue management
mechanism such as DropTail, RED and CBQ, routing algorithms such as Dijkstra , and other algorithms.
Network simulator 2 provides an important support for modeling and simulation of TCP, routing, and multicast
protocols over wired and wireless networks and is primarily useful for simulating local and wide area networks.
Although ns-2 is fairly easy to use once you get to know the simulator, it is quite difficult for a first-time user,
because there are few user-friendly manuals and it is difficult to install. Various extensions of parallel and
distributed variations are developed to achieve execution scalability (e.g., pdns).
Many researches including design, test and comparison of new network algorithms, protocols, and technologies
are done with ns-2. Some deficiencies of ns-2 include limited support for visualization and complex simulator
design. Since ns-2 is dependent on different technologies, it can be very difficult to make changes to the existing
models. Furthermore, from the modeling methodology vantage point, ns-2 can be considered a domain-specific
simulator which is intimately tied to the computer network concepts.
2.2 Commercial tools
2.2.1 OPNET (OPtimised Network Engineering Tool)
OPNET, which was developed in 1987 is the first commercial network simulation tool. Network can be
established very easily, with a graphical interface, user-friendly, widely used in industry, a powerful discrete
event network simulator.
Figure. 3. NAM screenshot of the simple network consisting of router nodes and duplex links
OPNET software of the system behavior and the analysis of discrete event simulation can be performed. OPNET
simulation program has three levels: network, node and process. These levels can be developed using the visual
420
�editor. The programs also edit the parameters of the simulation and data analysis tools to create the graph
contains.
Network structure, node and process models are included in a project file is created in the scenarios. Simulation
tool will be collected with the help of the design is complete, statistics are determined and work. Even with the
program analysis tool obtained data can be displayed in the desired chart type. Of data from more than one
scenario is also possible to compare the same show on the graph [1,10,11,13].
Node model and process model, with the help of an editor for creating user-defined nodes and protocols can be
created. Profile descriptions and application definitions can be changed with the help of the editors.
Figure 4. OPNET screenshot of the simple network consisting of router nodes and duplex links
2.3 Specialized tools
2.3.1 DEVS Suite:
To use modeling and simulation as problem solving technique, there is need for a modeling formalism. As a
formal system definition, formalism renders possible to create virtual worlds in our limited computation
frameworks and tools. Limitations of the computation environments demand new high performance modeling
formalisms and approaches. Large scale network systems exhibit very high level complex, dynamic and parallel
characteristics. Therefore, complex and distributed behaviors of the large scale systems make modeling effort of
the networks difficult. However, discrete event modeling formalisms bringing abstraction and simplification
mechanisms to modeling and simulation discipline facilitates modeling and simulation study systems such as
computer networks demonstrating complex, dynamic, distributed and unpredicted behavior. The dynamics of
network systems can be described using discrete event modeling. This is because the dynamics of network
systems can be characterized in terms of components that can process and generate events. Among discrete event
modeling approaches, the Discrete Event Systems Specification (DEVS) is well suited for formally describing
concurrent processing and the event-driven nature of arbitrary configuration of nodes and links forming network
systems. This modeling approach supports hierarchical modular model construction, distributed execution, and
therefore characterizing complex, large-scale systems with atomic and coupled models. Atomic models represent
the structure and behavior of individual components via inputs (X), outputs (Y), states (S), and functions.
Parallel DEVS, which extends the classical DEVS, is capable of processing multiple input events and concurrent
occurrences of internal and external transition functions. Parallel DEVS atomic model supports local control on
the handling of simultaneous internal and external events.
421
�Figure 5. DEVS Suite OSPF Simulator screenshot of the simple network consisting of router nodes and
duplex links
DEVS formalism can be executed using simulation engines such as DEVS-Suite and DEVSJAVA. DEVS-Suite
and DEVSJAVA are object oriented realization of Parallel DEVS and its associated simulators. They support
describing complex structures and behaviors of network systems using object-oriented modeling techniques and
advanced features of the Java programming language. The formal foundation of DEVS, its efficient execution,
and the availability of sequential, parallel, or distributed simulation engines using alternative computational
environments such as CORBA, HLA, and Web-services are important considerations. Furthermore, the DEVS
models are extended with other kinds of models such as fuzzy logic.
3. Comparison Of The Simulation Tools
As shown in Table 1, network simulators characteristics and their capabilities can be examined under the
following aspects:
Purpose: commercial, educational and private purposes to indicate the intended use.
License: simulator open source (free) if you indicate whether a commercial product.
Ease of Use: Graphical interface to support the flexibility of existing models and interfaces to enhance the new
models can be added
User Interface: Graphical user interface (GUI) to have
Parallel Operation: Parallel simulator can run in a distributed environment
Scalability: The maximum number of nodes that can be used in the simulation (Medium: thousands Good: Ten
thousand, Very Good: hundreds of thousands)
Programming language: programming language that specifies the simulator is written
Documentation: Network simulator, presented in conjunction with / accessible documentation indicates
Rate: indicates the operating speed of the simulation.
Platform: simulator operating environment (operating system) indicates.
Level Simulation (Abstraction): Simulation indicates the lowest level of abstraction. This level of package, the
message transfer or may nodal.
Properties
OPNET
QualNet
NS-2
SSFNet
OMNET
DEVS Suite
Purpose
Commercial
Commercial
Educational
, Resource
Commercial,
Resource
Resource
Specialized
License
Commercial
Commercial
Free
Free
Free
Free
Ease of Use
Very Good
Very Good
Bad
Good
Good
Good
Flexibility
Good
Good
Medium
Good
Very Good
Very Good
User Interface
Good GUI
Good GUI
Poor GUI
Good GUI
Good GUI
Good GUI
422
�Parallelism
Yes
Yes
No
Yes
Yes
Yes
Scalability
Medium
Very Good
Medium
Very Good
Good
Good
Programming
Language
Documentation
C++
C++
Java, C++
C++
Java
Very Good
Good
C++
OTcl
Good
Good
Good
Good
Speed
Bad
Medium
Medium
Good
Good
Good
Platform
X window
Unix
Linux, Unix,
Windows
Windows
Windows,
Linux
Simulation Level
(Abstraction)
Packet Level
Linux,
Unix,
Windows
Packet
Level
Packet
Level
IP Packet
Packet
level
Packet
Level
and
Table 1. Simulators comparison
4. Conclusions
To choose between the existing hundreds network simulators is very difficult. In this study, modeling and
simulation tools that used for studying on the network are examined, especially in network simulators used for
training purposes as the advantages and disadvantages are analyzed. DEVS is also taken into consideration
which is providing useful features for network community. In addition, this study can help to most researchers in
the selection of appropriate network modeling and simulation tool.
References
[1] M.A. Rahman et al. / Simulation Modelling Practice and Theory 17 (2009) 1011–1031
[2]http://en.wikipedia.org/wiki/DEVS
[3] Zeigler, B.P., Mittal, S., Modeling and Simulation of Ultra-large Networks: A Framework for New Research Directions,
supported by NSF Grant ANI-0135530, ULN Workshop, July 2002 (addendum to the ULN Workshop 2001)
{http://www.acims.arizona.edu/EVENTS/ULN/ULN_doc2.pdf }
[4]. {http://qualnet.com/pdf/glomosim.pdf }
[5].{http://www-static.cc.gatech.edu/computing/compass/pdns}
[6] http://www.omnetpp.org/
[7] Bajaj, S., Breslau, L., Estrin, D., et al., Improving Simulation for Network Research, 1999, USC Computer Science Dept.
Technical Report 99-702.
[8] http://www.isi.edu/~johnh/PAPERS/Breslau00a.pdf
[9] Richard M. Fujimoto, Kalyan Perumalla, Alfred Park, Hao Wu, Mostafa H. Ammar, George F. Riley. Large-Scale
Network Simulation: How Big? How Fast?, Modeling, Analysis and Simulation of Computer Telecommunications Systems,
2003. MASCOTS 2003. 11th IEEE/ACM International Symposium on
[10] B.P. Zeigler, H. Praehofer, T.G. Kim, “Theory of Modeling and Simulation,” Academic Press, 2000.
[11] Zengin, A. “Dağıtık Simülasyon Sistemleri Đçin Yeni Bir Yönlendirme Algoritması ve Uygulaması” , Doktora Tezi, Fen
Bilimleri Enstitüsü, Sakarya Üniversitesi, 2004
[12] Richard M. Fujimoto, Kalyan S. Perumalla and George F. Riley, “Network Simulation”, Morgan & Claypool, 2007
423
�[13] Ming Zhang , “Toward A Flexible And Reconfıgurable Dıstrıbuted Sımulatıon: A New Approach To Dıstrıbuted Devs”
PhD
Dissertation,
Electrical
and
Computer
Engr,
University
of
Arizona,
May.
2007.{http://acims6.eas.asu.edu/PUBLICATIONS/PDF/Thesis_Zhang.pdf}
[14] Saurabh Mittal, “Devs Unified Process For Integrated Development And Testıng Of Servıce Orıented Archıtectures”
PhD Dissertation, University of Arizona, 2007
[15] X. Liu and A. A. Chien, “Realistic Large-Scale Online Network Simulation”,
Performance Computing Applications, 2006
International Journal of High
[16] http://www.modelica.org
[17] Zengin A, Ekiz H., Çobanoğlu B., Tuncel S., "Ağların Eğitimi ve Araştırılması için DEVS Tabanlı Simülatör Tasarımı
ve Uygulaması" 5. Uluslararası Đleri Teknolojiler Sempozyumu (IATS’09), 13-15 Mayıs 2009, Karabük, Türkiye
[18] Steenstrup, M. E. (Ed.). (1995). Routing in Communications Network. Prentice-Hall.
[19] http://www.faqs.org/rfcs
[20] R. Waupotitsch, S. Eidenbenz, L. Kroc, and J. Smith, “Multi-Scale Integrated Information and Telecommunications
System (MIITS): First Results From A Large-Scale End-To-End Network Simulator”, wsc, pp.2132-2139, Proceedings of the
2006 Winter Simulation Conference, 2006
[21] William Buchanan, “Distributed Systems and Networks”, pp. 380-381, McGraw-Hill Pub., 2000
[22] Çakıroğlu, M. Doktora Tezi, “Kablosuz Algılayıcı Ağlar için Dinamik Kanal Atlamalı Güvenlik Sistemi Tasarımı”,
Doktora Tezi, Fen Bilimleri Enstitüsü, Sakarya Üniversitesi, 2008
424
�
Dublin Core
The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.
Extent
The size or duration of the resource.
538
Title
A name given to the resource
A Survey Of Network Modeling And Simulation Tools: Devs Comparison
Author
Author
Çobanoğlu, Bülent
Zengin, Ahmet
Tüncel, Sinan
Ekiz, Hüseyin
Abstract
A summary of the resource.
Speed, hardware, cost, diversity of user demands and interoperability requirements of today’s network systems cause several difficulties in network research. In design phase, due to time and cost advantage of modeling and simulation science it is widely used by researchers working on network systems. In order to expedite and simplify the design process, to design and develop network simulation tools is an active research area. Today, many modeling and simulation tools are available in computer networks research and education. In this study, to assist researchers working on computer networks in the selection of modeling and simulation tools, several best-known simulators are selected and compared. Especially to examine the advantages and disadvantages of network simulators used for training purposes, an OSPF protocol implementation was devised to discuss strengths and weaknesses of simulators. At the same time, executing a general purpose DEVS based OSPF model in DEVS-Suite simulator; the advantages of the method are summarized.
Date
A point or period of time associated with an event in the lifecycle of the resource
2010-06
Keywords
Keywords.
Conference or Workshop Item
PeerReviewed
Q Science (General)