Вы находитесь на странице: 1из 34

KAPAK SAYFASI

ii

ACKNOWLEDGEMENT

I would like to express my gratitude to all those who gave me the possibility to complete this
thesis. I want to thank the Department of Transport of the former Interim Government of Namibia for
giving me permission to commence this thesis in the first instance, to do the necessary research
work and to use departmental data. I have furthermore to thank the former Secretary for Transport,
Mr C.N. Herloff-Petersen and the present Under-Secretary of Transport of the Ministry of Works,
Transport and Communication of the Republic of Namibia, Mr W. Ravenscroft who gave and
confirmed this permission and encouraged me to go ahead with my thesis. I am bound to the
Honourable Minister Richard Kapelwa Kabajani and to Dr Peindgondjabi Titus Shipoh, Permanent
Secretary in the Ministry of Works, Transport and Communication for their stimulating support.
I am deeply indebted to my supervisor Prof. Dr. S. Huschek from the Technical University
Berlin-Charlottenburg whose help, stimulating suggestions and encouragement helped me in all the
time of research for and writing of this thesis.
My former colleagues from the Department of Transport supported me in my research work.
I want to thank them for all their help, support, interest and valuable hints. Especially I am obliged to
Messrs C.L. von Solms, F.J. Poolman, K.J. Detering, E. Albrecht and G.K. Kleber. I also want to
thank Mr S. Augustyn for all his assistance on the ministerial computer. My private secretary Ms K.
Labuschagne was of great help in difficult times. My son, Alexander Dierks as well as Tove Dix
looked closely at the final version of the thesis for English style and grammar, correcting both and
offering suggestions for improvement.
Especially, I would like to give my special thanks to my wife Karen whose patient love
enabled me to complete this work.

Note: to start on a new page DONT USE ENTER ENTER ENTER just select Insert, then
Break, and then select Page break and OK.

iii

ABSTRACT

The abstract summarizes the problem, participants, hypotheses, methods used, results, and
conclusions. An abstract example is as follows:
Performance measurement of supply chain management (SCM) is a rapidly growing multicriteria decision-making problem owing to the large number of factors affecting decision-making. The
right choice of performance metrics and measures is critical to the success and competitiveness of
the firms in the era of globalisation. Recognising the multiple objective nature of the problem, this
paper proposes the use of the analytical hierarchy process (AHP) methodology as aid in making
SCM evaluation decisions. For pair-wise comparison in AHP, a survey methodology is used. The
methodology presented can help firms to prioritise and formulate viable performance measurement
strategies in the volatile and complex global decision environment from different balanced scorecard
(BSC) perspectives. A demonstration of the application of this methodology in a real life problem is
presented.

iv

ZET

Translate your abstract here.

TABLE OF CONTENTS

..............................................................................................................................................1
ACKNOWLEDGEMENT.....................................................................................................ii
ABSTRACT..........................................................................................................................iii
ZET.....................................................................................................................................iv
LIST OF FIGURES..............................................................................................................vii
LIST OF TABLES..............................................................................................................viii
LIST OF SYMBOLS............................................................................................................ix
1. INTRODUCTION...........................................................................................................10
2. INTERNET EMAIL TRAFFIC EMERGENCY............................................................11
2.1. Spams Alarming Disruptions..................................................................................11
2.2. A Constant Drain on IT Budgets..............................................................................12
2.2.1. Equipment Factors.............................................................................................12
2.2.2. Financial Factors...............................................................................................12
2.3. The Effect of Hacker Attacks...................................................................................13
3. WORLD STATISTICS ON INTERNET AND THREATS...........................................14
4. PROTECTION METHODS............................................................................................15
4.1. IronPort.....................................................................................................................15
4.2. McAfee.....................................................................................................................15
5. PROVIDING THE SAFEST SECURITY METHOD FOR X TELECOM...................16
5.1 X Telecom.................................................................................................................16
5.2 Four Important Criteria to Consider for Evaluation ................................................16
5.3 Conducting a Decision Support System Using AHP................................................16
5.4 The Result of the Analysis........................................................................................16
6. CONCLUSION...............................................................................................................17
APPENDIX A......................................................................................................................18
APPENDIX B.......................................................................................................................19
REFERENCES.....................................................................................................................20
REFERENCES NOT CITED...............................................................................................21
TABLE OF CONTENTS.................................................................................................25
Page.........................................................................................................................25
LIST OF TABLES...........................................................................................................26
Page...............................................................................................................................1
TABLE 2.1.
Reactor design data 5..........................................................................1
FIGURE 2.2. Schematic of fuel-to-coolant heat transfer model 14.............................2
FIGURE 3.1.1. Physical and analytical regions for the boundary value problem 37....2
FIGURE 3.2.1. A linear rectangular element 41............................................................2
FIGURE 4.1. Response 5P to -1 percent step change in steam flow rate 56.................2
FIGURE 4.2. Response 5Tf to -1 percent step change in steam flow rate 57................2
LIST OF SYMBOLS*........................................................................................................3
A Controller system matrix............................................................................................3
B Controller input matrix...............................................................................................3
G Plant input matrix.......................................................................................................3
Gj Plant disturbance input matrix...................................................................................3
REFERENCES.......................................................................................................................5

vi

REFERENCES NOT CITED.............................................................................................7

Note: to update your table of contents, list of figures, and list of tables, just select the table, click right
on the table, choose update field and then select update entire table.
Dont forget to select the whole table and then provide 1,5 cm spacing. (from where? come on you
should know that from your Introduction to Computing course).

vii

LIST OF FIGURES

Figure 1: Heading levels and styles......................................................................................11


Figure 2. The most dangerous IT threats statistics...............................................................12
Figure 3. DDoS attacks, mozilla firefox diagram................................................................13
Figure 4. Internet hosts in 12 countries................................................................................14

viii

LIST OF TABLES

Table 1. Growth of hosting companies all over the world...................................................14


Table 2. Countries with their host numbers and growth of hosts.........................................14

ix

LIST OF SYMBOLS

Controller system matrix

Controller input matrix

Controller output matrix

Controller direct matrix

Three-dimensional Euclidean Space

Plant input matrix

Gj

Plant disturbance input matrix

A closed and bounded region in E

3R

Boundary of the region R

3 Rs , s = 1,2, .S

Complementary regular subsurface of the boundary 3 R,


S being a positive scalar

Sampling period

10

1. INTRODUCTION

Every paragraph, statement etc copied from a source will definitely have to have the
source referred at the end of the copied statement. For example:
Vvbvn bnvb jgjhhgjhg jgh jghjhg jhjg jhghjgjhuyu uyuyu uyuyu uy uyyu y uy yuy uy i yt
uy yu h jh jgjh jhjhgjh hgjg jgjg jhghjg jhg lkjgk lkjkj kfdjgkj dkjgd kdjkfjgd gljdfkjg fdjgklfjg flkjgkjdg
fldjgkfjgk fd lgjldjfgkjdfkgj (Doebelin,1985).
Drucker (1943) focuses on the changing prices over .hj hjdsfj hjhf djkh fdkjh dkjh kdjh
kjdfhg kfjhg dk gkjdhgkuhfg df kjh gdfjkhg fhjhgjfd gfdjhgjfg fhjkghg fkjhg kjfh kjhjkh kjhfg khkjh
Hjg jghjg hjh jg kjhejk gfdsh kdh kghdsk hkd kdh fdkhf kdjhf kjhd gjkhd fghdkj fgkjdfhf gkdj
kjdhfghdfghd gkjdfhg hdfjkg dfkjhg dfjkhg jkfdh gkjfhgjkfdhg fkj gkfhgkjfh gkjdh gkjdf gkdfjhg kdfkjgh
(Maiers and Sherif,1985) this is how you show the reference of a source that has 2 authors.
Fg gfghf ghf hghg hj ghj hjggjhghjgj jghjgg jhhghhj hghgh hgghh hjhh hjkljg jhg jhg jhg (Lowe
et al., 1988). this is how you show the reference of a source that has 3 or more authors.
The findings of this study are consistent with those of Lowe et al. (1988), where short-term
kj fkj gjkjj kj
Dont forget to cite the relevant references throughout your paper, as shown above.
Read the next page to learn more on creating main headings and subheadings in order to create
your Table of Contents (TOC).

11

2. INTERNET EMAIL TRAFFIC EMERGENCY

In order to create your Table of Contents (TOC) you need to mark the text in your document
that you want in the TOC. Mark the text you want as your main heading (ex: 2. Internet Email Traffic
Emergency), then in the left corner of your formatting toolbar (see Figure 1) select Heading 1 level
and also click the relevant format required for your main heading (ex: Times New Roman, 14, Bold,
Centered). For your second headings you will go through the same process, but you need to select
Heading 2 level and again provide the relevant format needed. For your third heading you will go
through the same process, but you need to select Heading 3 level and again provide the relevant
format needed; etc. Now to create TOC, click where you want to insert the table of contents. On the
Insert menu, click Reference, and then click Index and Tables. Click the Table of Contents tab.
Show the levels, and then click OK.

Figure 1: Heading levels and styles

In order to create your List of Figures and List of Tables, you need to add captions as you
insert figures and tables. To do this: on the Insert menu, click Reference, and then click Caption.
In the Label list, select the label that best describes the object. If the correct label doesnt exist,
click New Label, type the new label in the Label box (ex: Figure or Table), and then click OK. The
number will come automatically.
Note that in this paper the headings, TOC, figures, and tables have already been
prepared. But since you will need to add/change other levels into your paper, will have you need
this information to make the relevant changes.
Later on, dont forget to update you List of Figures, Tables and TOC.

2.1. Spams Alarming Disruptions

12

Vvbvn bnvb jgjhg lkjgk lkjkj kfdjgkj dkjgd kdjkfjgd gljdfkjg fdjgklfjg flkjgkjdg fldjgkfjgk fd
lgjldjfgkjdfkgj

2.2. A Constant Drain on IT Budgets

Gfhghg hghgfh hg kmndfk df kjd g fkjlfdkjg dfjglkfdj glkfdjg dfljglkfdj glkjdfgk dfkjglkfdj gdldlfjk

Figure 2. The most dangerous IT threats statistics

2.2.1. Equipment Factors

Jshdf sjdhf shfsdhfjk fjdh gfhsd hsdghsdg fghsdf sdhf shjgf shdf sdjfhsd jfhjd ftjhsd gjhsdg
sdfg hdgf hdfgjdsgjgfh fg

2.2.2. Financial Factors

Asfdas saf df sdfsadfds k gfkdfj dlotrjy rtjy rpk rtep rtlojk yport yr rtpoyj rtpy rtpojy r yprj
yxcxv
2.2.2.1. Employee Carelessness: asjh skahd ksa dkjh ksahd ksahd l askdhj fska dkhasf ksd
fkhsd fklsdhjf skdjf slkdf sd fksahdf kshaf ksahf
2.2.2.2. Data Disruptions: jkkd fksjflkjs dflskd jflksjd fslkfjlskd flksfdjksf lkjs df dljf ldjfklk kdldksl
2.2.2.2.1. Malicious Code: jksda jklsa jskj sk ldjfk dlajflksd flkjalkj dfkjksdjfkd fkdjfkl dfkd dkjf dlf dfd

13

2.2.2.2.2. Data Theft: sd fds sdkj sd dsjlk fsa fdskjsd fklsa f dkf d as sdjkds fs sdkjf s f flkjasf ds flsd
sdlkf fsldjf

2.3. The Effect of Hacker Attacks

Sdfsdfs dg dg dfg jkh kjkdg kjfdh gdjkfhg kjdhgkjoru ogo orouoruo eryut uery turtur
urturet r toureytuorey

Figure 3. DDoS attacks, mozilla firefox diagram

Gghhgg hgj hghghg ghltfg ddjhg dbg dskghdf gjkdf kdk kldjfkljds flkjsd kfjsdkj fkjdsk
flkjdkdjksd dsfgbdjkfgdhgdfgsdg dfg fsdg

14

3. WORLD STATISTICS ON INTERNET AND THREATS

Vjhggjh jkhhjggkhj jh dshf jkh kdjfhjk kjfdhh fkgjdhfkjg djh kjdhfj kkdjh kjd kdfkjhgkdjh jj.
Table 1. Growth of hosting companies all over the world

Number of hosts

Yearly growth

1996 21,800,000

+ 104 %

1997 28,700,000

+ 52 %

1998 42,200,000

+ 46 %

1999 72,400,000

+ 68 %

2000 109,600,000

+ 51 %

2001 147,300,000

+ 35 %

2002 171,600,000

+ 17 %

Figure 4. Internet hosts in 12 countries

Vjhggjh jkhhjggkhj jh dshf jkh kdjfhjk kjfdhh fkgjdhfkjg djh kjdhfj kkdjh kjd kdfkjhgkdjh jj.
Table 2. Countries with their host numbers and growth of hosts

Number of hosts
December 2002

% Growth
in a year

% of
total

Per 1000
inhab.

United States

104,938,665

+ 10.0

64.7

369.6

Japan

9,260,117

+ 28.8

5.4

72.9

Italy

3,864,315

+ 69.2

2.2

68.6

Netherlands

3,148,098

+ 19.6

1.8

196.2

Canada

3,129,884

+ 8.3

1.9

104.3

15

4. PROTECTION METHODS

Dsgdfsg fghsf hfgh dfjkgn fd jdk glkdjg df glkjdsfglj djfg sdfgj ds gfgjkdlfg j gdfkg g dsfjg
sdfglkj gl dsflgkj df dsfgj dlf

4.1. IronPort

Vjhggjh jkhhjggkhj jh dshf jkh kdjfhjk kjfdhh fkgjdhfkjg djh kjdhfj kkdjh kjd kdfkjhgkdjh jj.

4.2. McAfee

Vjhggjh jkhhjggkhj jh dshf jkh kdjfhjk kjfdhh fkgjdhfkjg djh kjdhfj kkdjh kjd kdfkjhgkdjh jj.

16

5. PROVIDING THE SAFEST SECURITY METHOD FOR X TELECOM

Dsgfds dfgdf fd kfjd gdj kdfjg fdjkg fdlkjg fldjg ro te ert ret fdjvla df vdk df gdj df glfdj df gd d

5.1 X Telecom

Vjhggjh jkhhjggkhj jh dshf jkh kdjfhjk kjfdhh fkgjdhfkjg djh kjdhfj kkdjh kjd kdfkjhgkdjh jj.

5.2 Four Important Criteria to Consider for Evaluation

Vjhggjh jkhhjggkhj jh dshf jkh kdjfhjk kjfdhh fkgjdhfkjg djh kjdhfj kkdjh kjd kdfkjhgkdjh jj.

5.3 Conducting a Decision Support System Using AHP

Vjhggjh jkhhjggkhj jh dshf jkh kdjfhjk kjfdhh fkgjdhfkjg djh kjdhfj kkdjh kjd kdfkjhgkdjh jj.

5.4 The Result of the Analysis

Vjhggjh jkhhjggkhj jh dshf jkh kdjfhjk kjfdhh fkgjdhfkjg djh kjdhfj kkdjh kjd kdfkjhgkdjh jj.

17

6. CONCLUSION

The conclusion summarizes the outcomes, stresses the experiments value, and anticipates
further advances on the topic.

18

APPENDIX A

Kdfskg dfk j g fjk kfj kjfgkh fdkh fdgkjhjkf hkjfgh fgkljh flkjh glkfjh flkjgh fdlgkj hflgkh lfkgjh f

19

APPENDIX B

Kdfskg dfk j g fjk kfj kjfgkh fdkh fdgkjhjkf hkjfgh fgkljh flkjh glkfjh flkjgh fdlgkj hflgkh lfkgjh f

20

REFERENCES

Akn, H. Levent and Taolu, T., Nuclear Reactor Control Using Back-Propagation Neural
Networks, Proceedings of the 6 th International Symposium on Computer and Information Sciences,
Side-Antalya, 30 October-2 November 1991, Vol. 2., pp.889-905, Amsterdam, Elsevier, 1991.
Akin, H. Levent. "Development of A Knowledge-Based Regulator for A PWR-Type

Nuclear

Power Plant", Ph.D. Dissertation, Boazii University, 1989.


Doebelin, E., Control System Principles and Design, New York: John Wiley, 1985.
Drucker, D. C., "Photo elastic Separation of Principal Stresses by Oblique Incidence, Journal of
Applied Mechanics, Vol. 65, pp. A156-160, 1943.
Efstathiou, J., "Rule-based Process Control Using Fuzzy Logic," in E. Sanchez and L. A. Zadeh
(Eds.), Approximate Reasoning in Intelligent Systems, Decision and Control, pp. 145-158, Oxford:
Pergamon Press, 1987.
Maiers, J., and Y. S. Sherif, "Application of Fuzzy Set Theory", IEEE Transactions on Systems,
Man, and Cybernetics, Vol. SMC-15, No. 1, pp. 41-48, January 1985.
Miller, D., LambdaProlog: An Introduction to the Language and its Logic, 1996,
http://www.cis.upenn.edu/-dale/lProlog/mdex.html.
Taolu, T., "Application of Neural Networks to Digital Computer Control of Nuclear Reactors," M.S.
Thesis, Boazii University, 1991.
Lowe, A.R., D. Webb and M.D. Bedworth, A Comparison of Nonlinear Optimization Strategies for
Feed Forward Adaptive Layered Networks, RSRE Memorandum No. 4157, RSRE Malvern, 1988

21

REFERENCES NOT CITED

Campbell, W.B. , Form and Style in Thesis Writing, Boston: Houghton Mifflin Co., 1954.
Duadale, K., A Manual of Form for Theses and Term-Reports, Indiana University Bookstore, 1950.
Perrin, P. G., Writer's Guide and Index to English, Rev. ed. Chicago and New York: Scott, Foresman and Co..
1950.
Trelease, S. F., Scientific Paper: How to Prepare It, How to Write It, Baltimore: Williams and
Wilkins. 1947.
Turanian, K.L., A Manual for Writers of Term Papers. Theses, and Dissertations, 5th ed., revised
and expanded by Bonnie Birthwistle Honigsblum. Chicago: University of Chicago Press. 1990.

22

STANBUL KLTR UNIVERSITY


FACULTY OF ENGINEERING AND ARCHITECTURE
CIVIL ENGINEERING DEPARTMENT
FORMAT
The written report part of the project will not be less than 20 pages.
Character Fonts: As a character font, use Times New Roman. The font size must be 12 point in the text
and at least 8 point in the figures; main headings should be in 14 point and bold typeface.
Table of Contents: A model for the table of contents is also given at the end of the report.
Margins: Margins of pages shall conform to the following specifications (example: this page);

Left margin
Right margin
Top margin
Bottom margin

3.5 cm. from edge of paper.


2 cm. from edge of paper.
3.5 cm. from edge of paper.
2 cm. from edge of paper.

The above margins shall be observed on charts, graphs, tables, and drawings. Examples for tables
and figures are given at the end of the report. Folded papers will not be accepted unless there is
absolutely no other way for the material to be presented.
Spacing: Spacing of the text material shall be 1.5 cm.
Headings used in the dissertation shall conform to the following rules:
a) Main headings - Arabic (1,2,3, etc.) or Roman (I, II, III, etc.) numerals
1.
2.
3.
4.

Must begin a new page and be centered.


Main headings are to be titled names that reflect content of the text that follows.
The number of the headings shall be followed by a period and two spaces.
Must precede the following text material or second heading by three single spacing.

b) Second headings -2.1, 2.2, 2.3, etc. (alternatively letters A, B, C, etc. or II.1, II.2, II.3, etc.)
Must be centered and be typed in capital and lower case letters; i.e., the first letter of each word except
conjunctions, prepositions, and articles must be a capital letter. Omit period at the end of heading.
c) First sub-headings- 2.2.1, 2.2.2, etc. (alternatively Arabic numbers 1, 2, 3, etc. or II. 1.2, II. 2.2, etc.)
1. Must be typed on separate lines beginning at the left margin line of the text, but need not
begin a new page.
2. Must be typed in capital and lower case letters except conjunctions, prepositions, and
articles.
d) Second sub-headings
1. Must be typed on the same line as the text it introduces beginning at the left margin line of

23

the text.
2. Must be typed in capital and lower case letters except conjunctions, prepositions, and articles.
Bibliographical References:
One of the following two citation methods must be used:
a) The numerical reference of bibliographical material shall be indicated in the text by an Arabic numeral
in square brackets placed in the text immediately following the name, word, phrase, or sentence
which the reference concerns (in most cases this will be the author's name). The number in square
brackets should indicate the order of first appearance of the reference in the text. The listing of references
in the bibliography shall be in the order in which they are used in the text and shall bear the same number
as was used in the text and shall bear the same number as was used in the reference in the text.
b) Citation of the relevant reference could also be done in the (surname of the first author, year) type. If an
author has more than one reference in a calendar year, letters a, b or c should follow the year, e.g.,
(Daniel, 1990a), (Daniel, 1990b). The listing of references in the bibliography in this case, shall be in the
alphabetical order by the surname of the first author.
Pagination: Each page in dissertation is expected to bear a number. Only one side of the paper may be
used. The following plan should be used exclusively:
a) The title page counts as Page i, but the number does not appear. The sequence of preliminary section
is as follows:
Title Page....................................... ..................
Foreword, Preface or Acknowledgments..........
Abstract.......................................... .................
Ksa zet........................................ ..................
Table of Contents............................ ..................
List of Figures................................ ..................
List of Tables ................................. ..................
List of Symbols.............................. ..................

Page i (number does not appear)


Page ii, iii, as necessary
Page iii,iv, as necessary
Page iv,v, as necessary
Page v, vi, as necessary
Page vi,vii, as necessary
Page vii,viii, as necessary
Page viii,ix, as necessary

b) For the remainder of the dissertation, Arabic numbers are used. Each page must be numbered. Page
numbers are to be placed two centimeters from the top and right hand margins on the pages. Include
all pages for illustrations, tables, appendices, bibliography, etc. Use of suffixes, such as 25a, 25b,
etc., will not be approved. The numbering in the main body of the dissertation should begin with Page
1 and run consecutively to the last page. No punctuation, such as dash or a period, should
accompany the page number.
c) Paragraphs. Paragraph indentations must be uniformly eight letter spaces long. A new paragraph
must not begin at the bottom of a page if there is not sufficient space for at least two lines. A
paragraph must be separated from the preceding and succeeding paragraphs by three single spacing.
On the following pages, examples for table of content, list of tables, list of figures, list of symbols, references,
figures and tables are given.

24

25

(Example of Table of Contents)

TABLE OF CONTENTS

Page
ACKNOWLEDGMENTS ....................................................................................................................iii
ABSTRACT .......................................................................................................................................iv
OZET ..............................................................................................................................................vi
LIST OF FIGURES .............................................................................................................................X
LIST OF TABLES ..............................................................................................................................xi
LIST OF SYMBOLS .........................................................................................................................xv
1. ( INTRODUCTION, REVIEW OF THE LITERATURE, BACKGROUND OF
THE PROBLEM, etc.) ............................................................................................................ 1
1.1.

................................................................................................................................... 5

1.2.

................................................................................................................................... 8

2. ( STATEMENT OF PROBLEM ) ............................................................................................10


3. ( OTHER MAIN HEADING ) ..................................................................................................13
3.1. .....................................................................................................................................15
3.2. .....................................................................................................................................17
3.2.1. ....................................................................................................................19
3.2.2. ....................................................................................................................20
3.2.2.1. ...................................................................................................21
3.2.2.2. ...................................................................................................22
3.3. ....................................................................................................................................23
4. ( OTHER MAIN HEADING ) .................................................................................................30
4.1. ....................................................................................................................................36
4.2. ....................................................................................................................................39
5. ( CONCLUSIONS OR SUMMARY OF FINDINGS ) .............................................................40
APPENDIX A ................................................................................................................................45
APPENDIX B ................................................................................................................................47
REFERENCES ...............................................................................................................................49
REFERENCES NOT CITED ...........................................................................................................51

26

(Example of List of Tables)

LIST OF TABLES

Page
TABLE 2.1.

Reactor design data...............................................................................5

TABLE 2.2.

Delayed neutron constants...................................................................................8

TABLE 2.3.

Pressurizer design data......................................................................................15

TABLE 2.4.

Steam generator data (for each unit)..................................................................21

TABLE 3.3.1.

A typical finite-element algorithm........................................................................25

TABLE 3.3.2.

(4,4) finite-element solution of the eigenvalue problem (3.3.1-3)


for t = 0.5..........................................................................................................32

TABLE 3.3.3.

(4,4) finite-element solution of the eigenvalue problem (3.3.1-3)


for c = 1.0...........................................................................................................35

TABLE 3.3.4.

(4,4) finite-element solution of the eigenvalue problem (3.3.1-3)


for t = 2..............................................................................................................38

TABLE 4.1.

Broken-line fuzzy subsets used in this study......................................................45

TABLE 4.2.

S-shaped fuzzy sets used in this study...............................................................50

(Example of List of Figures)


LIST OF FIGURES

Page
FIGURE 2.1.

Schematic of the H. B. Robinson Nuclear Plant..................................................5

FIGURE 2.2.

Schematic of fuel-to-coolant heat transfer model..............................14

FIGURE 3.1.

A block diagram of an expert system...............................................................36

FIGURE 3.1.1.

Physical and analytical regions for the boundary value problem......37

FIGURE 3.1.2.

A typical finite-element model approximating


the region [0,tjx[-1,1].......................................................................................39

FIGURE 3.2.1.

A linear rectangular element...............................................................41

FIGURE 4.1.

Response 5P to -1 percent step change in steam flow rate...............56

FIGURE 4.2.

Response 5Tf to -1 percent step change in steam flow rate..............57

FIGURE 4.3.

Variation of PI with control interval.......................................................................72

FIGURE 5.1.

Effect of noise on controller performance.........................................................80

(Example of List of Symbols)

LIST OF SYMBOLS*

Controller system matrix

Controller input matrix

Controller output matrix

Controller direct matrix

Three-dimensional Euclidean Space

Plant input matrix

Gj

Plant disturbance input matrix

A closed and bounded region in E

3R

Boundary of the region R

3 Rs , s = 1,2, .S

Complementary regular subsurface of the boundary 3 R,


S being a positive scalar

Sampling period

Control

Measurement noise

xc

Controller state

o.c cte

Control and estimation characteristic polynomials

Discrete plant control input matrix

TI

Discrete plant noise input matrix

Plant delay time or transportation lag

Discrete plant system matrix

Optical distance

Optical thickness or optical half thickness

* First Latin, then Greek letters, both in alphabetical order.

(Example of References)

REFERENCES

Examples of journal article referencing:


1. Maiers, J., and Y. S. Sherif, "Application of Fuzzy Set Theory", IEEE Transactions on Systems,
Man, and Cybernetics, Vol. SMC-15, No. 1, pp. 41-48, January 1985.
2. Drucker, D. C., "Photo elastic Separation of Principal Stresses by Oblique Incidence, Journal of
Applied Mechanics, Vol. 65, pp. A156-160, 1943.
Examples of book referencing:
3. Doebelin, E., Control System Principles and Design, New York: John Wiley, 1985.
4. Simmons, G. F., Introduction to Topology and Modern Analysis, McGraw-Hill, New York, 1963.
5. Banerjee, P. K. and R. Butterfield (Eds.), Development of Boundary Element Methods -1, Applied
Science Publishers, London, 1980.
Example of referencing of an article in a book:
6. Efstathiou, J., "Rule-based Process Control Using Fuzzy Logic," in E. Sanchez and L. A. Zadeh
(Eds.), Approximate Reasoning in Intelligent Systems, Decision and Control, pp. 145-158, Oxford:
Pergamon Press, 1987.
Example of referencing of a M.S. Thesis:
7. Taolu, T., "Application of Neural Networks to Digital Computer Control of Nuclear Reactors,"
M.S. Thesis, Boazii University, 1991.
Examples of referencing of a Ph.D. Dissertation:
8. Akin, H. Levent. "Development of A Knowledge-Based Regulator for A PWR-Type
Power Plant", Ph.D. Dissertation, Boazii University, 1989.

Nuclear

9. Liu, W. K., "Development of Finite Element Procedures for Fluid-Structure Interaction", Ph.D.
Dissertation, California Institute of Technology, 1981.
Example of referencing of a conference paper:
10. Akn, H. Levent and Taolu, T., Nuclear Reactor Control Using Back-Propagation Neural
Networks, Proceedings of the 6 th International Symposium on Computer and Information Sciences,
Side-Antalya, 30 October-2 November 1991, Vol. 2., pp.889-905, Amsterdam, Elsevier, 1991.
Example of referencing of a report:
11. Webb, A.R., D. Lowe and M.D. Bedworth, A Comparison of Nonlinear Optimization Strategies
for Feed Forward Adaptive Layered Networks, RSRE Memorandum No. 4157, RSRE Malvern,
1988
Example of referencing of an article in Internet:
12. Miller, D., LambdaProlog: An Introduction to the Language and its Logic, 1996,
http://www.cis.upenn.edu/-dale/lProlog/mdex.html.

(Example of References not cited)

REFERENCES NOT CITED

Campbell, W.B. , Form and Style in Thesis Writing, Boston: Houghton Mifflin Co., 1954.
Duadale, K., A Manual of Form for Theses and Term-Reports, Indiana University Bookstore, 1950.
Perrin, P. G., Writer's Guide and Index to English, Rev. ed. Chicago and New York: Scott, Foresman and Co..
1950.
Trelease, S. F., Scientific Paper: How to Prepare It, How to Write It, Baltimore: Williams and
Wilkins. 1947.
Turanian, K.L., A Manual for Writers of Term Papers. Theses, and Dissertations, 5th ed., revised
and expanded by Bonnie Birthwistle Honigsblum. Chicago: University of Chicago Press. 1990.

Вам также может понравиться