Abstract: This paper presents the control performance of a high-precision positioning device using the hybrid actuator composed of a piezoelectric (PZT) actuator and a voice-coil motor (VCM). The combined piezo-VCM actuator features two main characteristics: a large operation range due to long stroke of the VCM, and high precision and heavy load positioning ability due to PZT impact force. A one-degree-of-freedom (DOF) experimental setup was configured to examine the fundamental characteristics, and the control performance was effectively demonstrated by using a switching controller. In rough positioning state, an integral variable structure controller (IVSC) was used for the VCM to conduct long range of operation; in precision positioning state, an impact force controller (IFC) for the PZT actuator coupled with presliding states of the sliding table was used to obtain high-precision position control and achieve both forward and backward actuations. The experimental results showed that the sliding table having a mass of 881g and with a preload of 10 N was successfully positioned within the positioning accuracy of 10 nm in both forward and backward position controls.
Abstract: This paper provides an introduction into the evolution
of information and communication technology and illustrates its
usage in the work domain. The paper is sub-divided into two parts.
The first part gives an overview over the different phases of
information processing in the work domain. It starts by charting the
past and present usage of computers in work environments and shows
current technological trends, which are likely to influence future
business applications. The second part starts by briefly describing,
how the usage of computers changed business processes in the past,
and presents first Ambient Intelligence applications based on
identification and localization information, which are already used in
the production and retail sector. Based on current systems and
prototype applications, the paper gives an outlook of how Ambient
Intelligence technologies could change business processes in the
future.
Abstract: Using spatial models as a shared common basis of
information about the environment for different kinds of contextaware
systems has been a heavily researched topic in the last years.
Thereby the research focused on how to create, to update, and to
merge spatial models so as to enable highly dynamic, consistent and
coherent spatial models at large scale. In this paper however, we
want to concentrate on how context-aware applications could use this
information so as to adapt their behavior according to the situation
they are in. The main idea is to provide the spatial model
infrastructure with a situation recognition component based on
generic situation templates. A situation template is – as part of a
much larger situation template library – an abstract, machinereadable
description of a certain basic situation type, which could be
used by different applications to evaluate their situation. In this
paper, different theoretical and practical issues – technical, ethical
and philosophical ones – are discussed important for understanding
and developing situation dependent systems based on situation
templates. A basic system design is presented which allows for the
reasoning with uncertain data using an improved version of a
learning algorithm for the automatic adaption of situation templates.
Finally, for supporting the development of adaptive applications, we
present a new situation-aware adaptation concept based on
workflows.
Abstract: This paper compares Hilditch, Rosenfeld, Zhang-
Suen, dan Nagendraprasad Wang Gupta (NWG) thinning algorithms
for Javanese character image recognition. Thinning is an effective
process when the focus in not on the size of the pattern, but rather on
the relative position of the strokes in the pattern. The research
analyzes the thinning of 60 Javanese characters.
Time-wise, Zhang-Suen algorithm gives the best results with the
average process time being 0.00455188 seconds. But if we look at
the percentage of pixels that meet one-pixel thickness, Rosenfelt
algorithm gives the best results, with a 99.98% success rate. From the
number of pixels that are erased, NWG algorithm gives the best
results with the average number of pixels erased being 84.12%. It can
be concluded that the Hilditch algorithm performs least successfully
compared to the other three algorithms.
Abstract: Nowadays the control of stator voltage at a constant frequency is one of the traditional and low expense methods in order to control the speed of induction motors near its nominal speed. The torque of induction motor is a nonlinear function of the firing angle, phase angle and speed. In this paper the speed control of induction motor regarding various load torque and under different conditions will be investigated based on a fuzzy controller with inverse training.
Abstract: This paper presents an approach based on the
adoption of a distributed cognition framework and a non parametric
multicriteria evaluation methodology (DEA) designed specifically to
compare e-commerce websites from the consumer/user viewpoint. In
particular, the framework considers a website relative efficiency as a
measure of its quality and usability. A website is modelled as a black
box capable to provide the consumer/user with a set of
functionalities. When the consumer/user interacts with the website to
perform a task, he/she is involved in a cognitive activity, sustaining a
cognitive cost to search, interpret and process information, and
experiencing a sense of satisfaction. The degree of ambiguity and
uncertainty he/she perceives and the needed search time determine
the effort size – and, henceforth, the cognitive cost amount – he/she
has to sustain to perform his/her task. On the contrary, task
performing and result achievement induce a sense of gratification,
satisfaction and usefulness. In total, 9 variables are measured,
classified in a set of 3 website macro-dimensions (user experience,
site navigability and structure). The framework is implemented to
compare 40 websites of businesses performing electronic commerce
in the information technology market. A questionnaire to collect
subjective judgements for the websites in the sample was purposely
designed and administered to 85 university students enrolled in
computer science and information systems engineering
undergraduate courses.
Abstract: Lactic acid alone and its combined application with
nisin were evaluated for reducing population of naturally occurring
microorganisms on chilled shrimp. Fresh shrimps were dipped in 0,
1.0% and 2.0% (v/v) lactic acid alone and their combined application
with 0.04 (g/L/kg) nisin solution for 10 min. Total plate counts of
aerobic bacteria (TPCs), Psychrotrophic counts, population of
Pseudomonas spp., H2S producing bacteria and Lactic acid bacteria
(LAB) on shrimps were determined during storage at 4 °C. The
results indicated that total plate counts were 2.91 and 2.63 log CFU/g
higher on untreated shrimps after 7 and 14 days of storage,
respectively, than on shrimps treated with 2.0% lactic acid combined
with 0.04 (g/L/kg) nisin. Both concentrations of lactic acid indicated
significant reduction on Pseudomonas counts during storage, while
2.0% lactic acid combined with nisin indicated the highest reduction.
In addition, H2S producing bacteria were more sensitive to high
concentration of lactic acid combined with nisin during storage.
Abstract: This paper presents a hybrid approach for solving nqueen problem by combination of PSO and SA. PSO is a population based heuristic method that sometimes traps in local maximum. To solve this problem we can use SA. Although SA suffer from many iterations and long time convergence for solving some problems, By good adjusting initial parameters such as temperature and the length of temperature stages SA guarantees convergence. In this article we use discrete PSO (due to nature of n-queen problem) to achieve a good local maximum. Then we use SA to escape from local maximum. The experimental results show that our hybrid method in comparison of SA method converges to result faster, especially for high dimensions n-queen problems.
Abstract: In this paper we present a combined
hashing/watermarking method for image authentication. A robust
image hash, invariant to legitimate modifications, but fragile to
illegitimate modifications is generated from the local image
characteristics. To increase security of the system the watermark is
generated using the image hash as a key. Quantized Index
Modulation of DCT coefficients is used for watermark embedding.
Watermark detection is performed without use of the original image.
Experimental results demonstrate the effectiveness of the presented
method in terms of robustness and fragility.
Abstract: The identification and elimination of bad
measurements is one of the basic functions of a robust state estimator
as bad data have the effect of corrupting the results of state
estimation according to the popular weighted least squares method.
However this is a difficult problem to handle especially when dealing
with multiple errors from the interactive conforming type. In this
paper, a self adaptive genetic based algorithm is proposed. The
algorithm utilizes the results of the classical linearized normal
residuals approach to tune the genetic operators thus instead of
making a randomized search throughout the whole search space it is
more likely to be a directed search thus the optimum solution is
obtained at very early stages(maximum of 5 generations). The
algorithm utilizes the accumulating databases of already computed
cases to reduce the computational burden to minimum. Tests are
conducted with reference to the standard IEEE test systems. Test
results are very promising.
Abstract: Protection and proper management of archaeological heritage are an essential process of studying and interpreting the generations present and future. Protecting the archaeological heritage is based upon multidiscipline professional collaboration. This study aims to gather data by different sources (Photogrammetry and Geographic Information System (GIS)) integrated for the purpose of documenting one the of significant archeological sites (Ahl-Alkahf, Jordan). 3D modeling deals with the actual image of the features, shapes and texture to represent reality as realistically as possible by using texture. The 3D coordinates that result of the photogrammetric adjustment procedures are used to create 3D-models of the study area. Adding Textures to the 3D-models surfaces gives a 'real world' appearance to the displayed models. GIS system combined all data, including boundary maps, indicating the location of archeological sites, transportation layer, digital elevation model and orthoimages. For realistic representation of the study area, 3D - GIS model prepared, where efficient generation, management and visualization of such special data can be achieved.
Abstract: Incompressible Navier-Stokes equations are reviewed
in this work. Three-dimensional Navier-Stokes equations are solved
analytically. The Mathematical derivation shows that the solutions
for the zero and constant pressure gradients are similar. Descriptions
of the proposed formulation and validation against two laminar
experiments and three different turbulent flow cases are reported in
this paper. Even though, the analytical solution is derived for nonreacting
flows, it could reproduce trends for cases including
combustion.
Abstract: As mobile ad hoc networks (MANET) have different
characteristics from wired networks and even from standard wireless
networks, there are new challenges related to security issues that
need to be addressed. Due to its unique features such as open nature,
lack of infrastructure and central management, node mobility and
change of dynamic topology, prevention methods from attacks on
them are not enough. Therefore intrusion detection is one of the
possible ways in recognizing a possible attack before the system
could be penetrated. All in all, techniques for intrusion detection in
old wireless networks are not suitable for MANET. In this paper, we
classify the architecture for Intrusion detection systems that have so
far been introduced for MANETs, and then existing intrusion
detection techniques in MANET presented and compared. We then
indicate important future research directions.
Abstract: fifteen cultivars of Strawberries (Queen Eliza, Sequia,
Paros, Mcdonance, Selva, Chandler, Mrak, Ten beauty, Aliso, Pajero,
Kordestan, Camarosa, Blackmore, Gaviota and Fresno) were
investigated in 2011, under hydroponic system condition. Yield and
fruit Firmness was determinate. Chemical analyses of soluble solids
content (SSC), titratable acidity (TA), ascorbic acid (AA) and pH
were done. 4 cultivars (Aliso, Selva, Paros and Gaviota) yielded more
than 250 g/plant, while cultivar Black more, Fresno and Kordestan
produced less than 100g/plant. The amounts of fruit firmness
indicated that 'Camarosa' fruit was firmer than others cultivars.
Cultivar 'Fresno' had the highest pH (3.27). Ttitratable acidity varied
from 1.03g/l00g for cultivar 'Sequia' and 'Gaviota' to 1.48g/l00g for
cultivar 'Chandler'. Fresno, Kordestan, Aliso and Chandler showed
the highest soluble solid concentration. Ascorbic acid averaged for
most cultivars between 30.26 and 79.73 mg/100gf.w. Present results
showed that different cultivars of strawberry contain highly variable
in fruit quality.
Abstract: Nuclear energy sources have been widely used in the
past decades in order to power spacecraft subsystems. Nevertheless,
their use has attracted controversy because of the risk of harmful
material released into the atmosphere if an accident were to occur
during the launch phase of the mission, leading to the general
adoption of photovoltaic systems.
As compared to solar cells, wind turbines have a great advantage
on Mars, as they can continuously produce power both during dust
storms and at night-time: this paper focuses on the potential of a wind
energy conversion system (WECS) considering the atmospheric
conditions on Mars. Wind potential on Martian surface has been
estimated, as well as the average energy requirements of a Martian
probe or surface rover. Finally, the expected daily energy output of
the WECS has been computed on the basis of both the swept area of
the rotor and the equivalent wind speed at the landing site.
Abstract: This work presents an approach for the measurement
of mutual inductance on near field inductive coupling. The mutual
inductance between inductive circuits allows the simulation of energy
transfer from reader to tag, that can be used in RFID and powerless
implantable devices. It also allows one to predict the maximum
voltage in the tag of the radio-frequency system.
Abstract: We consider linear regression models where both input data (the values of independent variables) and output data (the observations of the dependent variable) are interval-censored. We introduce a possibilistic generalization of the least squares estimator, so called OLS-set for the interval model. This set captures the impact of the loss of information on the OLS estimator caused by interval censoring and provides a tool for quantification of this effect. We study complexity-theoretic properties of the OLS-set. We also deal with restricted versions of the general interval linear regression model, in particular the crisp input – interval output model. We give an argument that natural descriptions of the OLS-set in the crisp input – interval output cannot be computed in polynomial time. Then we derive easily computable approximations for the OLS-set which can be used instead of the exact description. We illustrate the approach by an example.
Abstract: The wireless sensor networks have been extensively
deployed and researched. One of the major issues in wireless sensor
networks is a developing energy-efficient clustering protocol.
Clustering algorithm provides an effective way to prolong the lifetime
of a wireless sensor networks. In the paper, we compare several
clustering protocols which significantly affect a balancing of energy
consumption. And we propose an Energy-Efficient Distributed
Unequal Clustering (EEDUC) algorithm which provides a new way of
creating distributed clusters. In EEDUC, each sensor node sets the
waiting time. This waiting time is considered as a function of residual
energy, number of neighborhood nodes. EEDUC uses waiting time to
distribute cluster heads. We also propose an unequal clustering
mechanism to solve the hot-spot problem. Simulation results show that
EEDUC distributes the cluster heads, balances the energy
consumption well among the cluster heads and increases the network
lifetime.
Abstract: Policies that support entrepreneurship are keys to the
generation of new business. In Brazil, seed capital, installation of
technology parks, programs and zero interest financing, economic
subsidy as Program First Innovative Company (PRIME) are
examples of incentive policies. For the implementation of PRIME, in
particular the Brazilian Innovation Agency (FINEP) decentralized
operationalization so that business incubators could select innovative
projects. This paper analyzes the program PRIME Business Incubator
Center of the State of Sergipe (CISE) after calculating the mean and
standard deviation of the grades obtained by companies in the factors
of innovation, market potential, financial return economic, market
strategy and staff and application of the Mann-Whitney test.
Abstract: This paper proposes a methodology for analysis of
the dynamic behavior of a robotic manipulator in continuous
time. Initially this system (nonlinear system) will be decomposed
into linear submodels and analyzed in the context of the Linear
and Parameter Varying (LPV) Systems. The obtained linear
submodels, which represent the local dynamic behavior of the
robotic manipulator in some operating points were grouped in
a Takagi-Sugeno fuzzy structure. The obtained fuzzy model was
analyzed and validated through analog simulation, as universal
approximator of the robotic manipulator.