فهرست مطالب

Journal of Majlesi Journal of Mechatronic Systems
Volume:12 Issue: 1, Mar 2023

  • تاریخ انتشار: 1402/09/30
  • تعداد عناوین: 6
|
  • Sayed Shahab Amelian, AmirHossein Zaeri Pages 1-4

    The article discusses a network failure-prone system. The current research aimed to determine the optimal production rate and the optimal preventive maintenance time for machines. Due to uncertainties in the problem, including stochastically machine breakdown, stochastic processing times and variable demand, the discrete event simulation method has been used for modeling the problem, and the SA algorithm has been used to determine the optimal decision variables. Since it is not possible to provide a mathematical model for the problem, the simulation method and the SA algorithm have been combined, and in fact, the SA algorithm has been coded in the ARENA software and presented a hedging point policy for the mentioned system.

    Keywords: Failure prone manufacturing system, optimization, preventive maintenance, production control
  • Nasrin Valipour, Mohsen Ashourian Pages 5-10

    The present article is an analysis on the development and improvement of information technology management software in the hospitals of Isfahan University of Medical Sciences. This study is practical in terms of purpose and it is descriptive in terms of the nature and method of implementation. The desired information is based on the library method for compiling the theoretical foundations and background of the research. To improve the development of HIS software, suggestions have been made based on the researcher's work experiences, such as creating a three-layer architecture and higher and using XMLs for data exchange. The findings of the research showed that due to the problems of the HIS system, the use of the traditional system is more popular among the users. The results indicate that the hospital information system has many capabilities and added value and can create a revolution in health and hospital services. Improving the quality of medical services, establishing scientific management in hospital administration, improving the economics of treatment, growing research in medical sciences, providing desirable medical information services, reforming macro policies in health and treatment, and developing education in medical sciences are among the results of this system.

    Keywords: Information Technology Management, Isfahan University of Medical Sciences, Hospitals, IT Infrastructure
  • S. Ibrahimi, Mansour Hakimollahi, M. Masih Tehrani, M. Azizi Pages 11-14

    The research discusses the steps involved in designing and construction of an effective metal detector. The process begins with defining the requirements, choosing the type of metal detector, designing the coil, and simulating the detector's performance using computer-aided design software. Once the design is optimized and simulated, the metal detector can be built using high-quality materials and tested to ensure it meets the performance requirements. By following these steps, an effective metal detector can be created to meet specific needs for industries such as security, mining, and archaeology. The research emphasizes the importance of understanding the physics involved and careful consideration of the design parameters to achieve the desired performance. The type of metal detector chosen depends on the target metal, required detection depth, and operating environment. The coil, which generates the electromagnetic field that detects metal objects, is critical to the metal detector's performance, and designing it with the help of computer-aided design software can optimize its design parameters. Simulating the metal detector's performance using simulation software can help detect potential design flaws and optimize the design parameters to achieve the best performance. Finally, building and testing the metal detector is essential to ensure its reliability and durability. By following these steps, an effective metal detector can be designed and constructed for various industries' specific needs.

    Keywords: Metal Detector, Design, Construction, Effective Detector, Proteus, Arduino Uno
  • Abbad Jamshidi Pages 15-20

    During the last two decades, the rapid growth of e-commerce, which is the main characteristic of the modern economy, has been established as one of the most important factors influencing the significant role in the development of societies, e-commerce accounts for a significant share in world trade and gives Provided for faster growth of financial sectors.One of the most obvious transformations that we have witnessed since the last decade of the 20th century is the rapid growth of new horizons for businessand commerce in the name of electronic commerce.In today's competitive world, due to the complexity of issues and problems, the need for information and statistics is felt more than ever. For the effective implementation of organizational strategies, information plays an important role. The expansion oftoday's organizations has followed a certain complexity. In general, decision-making without the use of technology and statistical surveys will not achieve the goals in the desired way. The purpose of thisresearch is to investigate the role of information systems and the development of digital banking in Iran's Qarz Al-Hasneh Mehr Bank.

    Keywords: Qarz Al-Hasneh Mehr Bank of Iran, Electronic Financial Transactions, customer relationship management (CMR), digital banking
  • Behnam Salimi, adel zakipour, Ehsan Nazemorroaya Pages 21-26

    One of the challenges of the Selective Harmonic Elimination Pulse Width Modulation (SHE-PWM) method is to solve the system of nonlinear equations to extract the switching angles. In the conventional approach, using Newton-Raphson equations, guessing initial values for the algorithm is difficult, as choosing incorrect initial values may lead to algorithm divergence. Therefore, the genetic algorithm is used to obtain the required initial values in the Newton-Raphson method, which reduces the number of iterations in calculating the desired values. This paper introduces a method for using the SHE-PWM technique for a wide range of modulation index to obtain a high-quality output waveform in a three-level three-phase inverter. This Technique reduces additional hardware and decreases design costs. The proposed strategies are tested by simulation in MATLAB-Simulink. The results indicate a significant improvement in the quality of the output waveform, a reduction in algorithm iterations, and its convergence.

    Keywords: Selective harmonic elimination modulation, Genetic algorithm, THD, SHE
  • M. Yasin Sediqy, Mansour Hakimollahi, M .Masih Tehrani Pages 27-35

    Router is the main device for making a network. There are many companies that provide router devices. Mikrotik router used for cheaper, faster, easy to setup, GUI and multitasking purpose. The main goal point of a hacker is the router of network, when a hacker access to network they can control your network for herself purpose. In this paper we use 6 phase to secure our Mikrotik router and implement basic security of Mikrotik router. To find the vulnerabilities of network use penetration testing method. One of the most dangerous vulnerable is winbox exploit (CVE-2018-14847). Updating and Firewall of Mikrotik router are used for prevention of network vulnerabilities. We restrict and Block all network vulnerabilities, Finally, we prepare a report of all the work we have done.

    Keywords: Hacker, Network security, Mikrotik security, Mikrotik firewall, Vulnerabilities, penetration test