Abstract: This paper describes the design and modeling
procedure of a novel 5-phase segment type switched reluctance motor
(ST-SRM) under simultaneous two-phase (bipolar) excitation of
windings. The rotor cores of ST-SRM are embedded in an aluminum
block as well as to improve the performance characteristics. The
magnetic circuit of the produced ST-SRM is constructed so that the
magnetic flux paths are short and exclusive to each phase, thereby
minimizing the commutation switching and eddy current losses in the
laminations. The design and simulation principles presented apply
primarily to conventional SRM and ST-SRM. It is proved that the
novel 5-phase switched reluctance motor under two-phase excitation
is superior among the criteria used in comparison. The purposed
model is particularly well suited for high torque and weight
constrained applications such as automobiles, aerospace and military
applications.
Abstract: In order to provide accurate heart rate variability
indices of sympathetic and parasympathetic activity, the low
frequency and high frequency components of an RR heart rate signal
must be adequately separated. This is not always possible by just
applying spectral analysis, as power from the high and low frequency
components often leak into their adjacent bands. Furthermore,
without the respiratory spectra it is not obvious that the low
frequency component is not another respiratory component, which
can appear in the lower band. This paper describes an adaptive filter,
which aids the separation of the low frequency sympathetic and high
frequency parasympathetic components from an ECG R-R interval
signal, enabling the attainment of more accurate heart rate variability
measures. The algorithm is applied to simulated signals and heart rate
and respiratory signals acquired from an ambulatory monitor
incorporating single lead ECG and inductive plethysmography
sensors embedded in a garment. The results show an improvement
over standard heart rate variability spectral measurements.
Abstract: Short message integrated distributed monitoring systems (SM-DMS) are growing rapidly in wireless communication applications in various areas, such as electromagnetic field (EMF) management, wastewater monitoring, and air pollution supervision, etc. However, delay in short messages often makes the data embedded in SM-DMS transmit unreliably. Moreover, there are few regulations dealing with this problem in SMS transmission protocols. In this study, based on the analysis of the command and data requirements in the SM-DMS, we developed a processing model for the control center to solve the delay problem in data transmission. Three components of the model: the data transmission protocol, the receiving buffer pool method, and the timer mechanism were described in detail. Discussions on adjusting the threshold parameter in the timer mechanism were presented for the adaptive performance during the runtime of the SM-DMS. This model optimized the data transmission reliability in SM-DMS, and provided a supplement to the data transmission reliability protocols at the application level.
Abstract: Game theory could be used to analyze the conflicted
issues in the field of information hiding. In this paper, 2-phase game
can be used to build the embedder-attacker system to analyze the
limits of hiding capacity of embedding algorithms: the embedder
minimizes the expected damage and the attacker maximizes it. In the
system, the embedder first consumes its resource to build embedded
units (EU) and insert the secret information into EU. Then the attacker
distributes its resource evenly to the attacked EU. The expected
equilibrium damage, which is maximum damage in value from the
point of view of the attacker and minimum from the embedder against
the attacker, is evaluated by the case when the attacker attacks a
subset from all the EU. Furthermore, the optimal equilibrium capacity
of hiding information is calculated through the optimal number of EU
with the embedded secret information. Finally, illustrative examples
of the optimal equilibrium capacity are presented.
Abstract: The binary phase-only filter digital watermarking
embeds the phase information of the discrete Fourier transform of the
image into the corresponding magnitudes for better image authentication.
The paper proposed an approach of how to implement watermark
embedding by quantizing the magnitude, with discussing how to
regulate the quantization steps based on the frequencies of the magnitude
coefficients of the embedded watermark, and how to embed the
watermark at low frequency quantization. The theoretical analysis and
simulation results show that algorithm flexibility, security, watermark
imperceptibility and detection performance of the binary phase-only
filter digital watermarking can be effectively improved with quantization
based watermark embedding, and the robustness against JPEG
compression will also be increased to some extent.
Abstract: Embedded hardware simulator is a valuable computeraided
tool for embedded application development. This paper focuses
on the ARM926EJ-S MMU, builds state transition models and
formally verifies critical properties for the models. The state transition
models include loading instruction model, reading data model, and
writing data model. The properties of the models are described by
CTL specification language, and they are verified in VIS. The results
obtained in VIS demonstrate that the critical properties of MMU are
satisfied in the state transition models. The correct models can be
used to implement the MMU component in our simulator. In the
end of this paper, the experimental results show that the MMU can
successfully accomplish memory access requests from CPU.
Abstract: Until recently it would have been unusual to consider classifying population movements and refugees as security problem. However, efforts at shaping our world to make ourselves secure have paradoxically led to ever greater insecurity. The feeling of uncertainty, pertinent throughout all discourses of security, has led to the creation of security production into seemingly benign routines of everyday life. Yet, the paper argues, neither of security discourses accounted for, disclosed and challenged the fundamental aporias embedded in Western security narratives. In turn, the paper aims to unpick the conventional security wisdom, which is haunted with strong ontologies, embedded in the politics of Orientalism, and (in)security nexus. The paper concludes that current security affair conceals the integral impossibility of fulfilling its very own promise of assured security. The paper also provides suggestions about alternative security discourse based on mutual dialogue.
Abstract: A novel robust audio watermarking scheme is
proposed in this paper. In the proposed scheme, the host audio signals
are segmented into frames. Two consecutive frames are assessed if
they are suitable to represent a watermark bit. If so, frequency
transform is performed on these two frames. The compressionexpansion
technique is adopted to generate distortion over the two
frames. The distortion is used to represent one watermark bit.
Psychoacoustic model is applied to calculate local auditory mask to
ensure that the distortion is not audible. The watermarking schemes
using mono and stereo audio signals are designed differently. The
correlation-based detection method is used to detect the distortion
and extract embedded watermark bits. The experimental results show
that the quality degradation caused by the embedded watermarks is
perceptually transparent and the proposed schemes are very robust
against different types of attacks.
Abstract: In this paper test generation methods and appropriate fault models for testing and analysis of embedded systems described as (extended) finite state machines ((E)FSMs) are presented. Compared to simple FSMs, EFSMs specify not only the control flow but also the data flow. Thus, we define a two-level fault model to cover both aspects. The goal of this paper is to reuse well-known FSM-based test generation methods for automation of embedded system testing. These methods have been widely used in testing and validation of protocols and communicating systems. In particular, (E)FSMs-based specification and testing is more advantageous because (E)FSMs support the formal semantic of already standardised formal description techniques (FDTs) despite of their popularity in the design of hardware and software systems.
Abstract: The application of the synchronous dynamic random
access memory (SDRAM) has gone beyond the scope of personal
computers for quite a long time. It comes into hand whenever a big
amount of low price and still high speed memory is needed. Most of
the newly developed stand alone embedded devices in the field of
image, video and sound processing take more and more use of it. The
big amount of low price memory has its trade off – the speed. In
order to take use of the full potential of the memory, an efficient
controller is needed. Efficient stands for maximum random accesses
to the memory both for reading and writing and less area after
implementation. This paper proposes a target device independent
DDR SDRAM pipelined controller and provides performance
comparison with available solutions.
Abstract: People nowadays love to travel around the world.
Regardless of their location and time, they especially Muslims still need to perform their five times prayer. Normally for travelers, they
need to bring maps, compass and for Muslim, they even have to bring Qibla pointer when they travel. It is slightly difficult to
determine the Qibla direction and to know the time for each prayer. In this paper we present a new electronic device called Universal Qibla and Prayer Time Finder to locate the Qibla direction and to determine each prayer time based on the current user-s location. This device use PIC microcontroller equipped with digital compass and
Global Positioning System (GPS) where it will display the exact Qibla direction and prayer time automatically at any place in the world. This device is reliable, user friendly and accurate in
determining the Qibla direction and prayer time.
Abstract: Compaction testing methods allow at-speed detecting
of errors while possessing low cost of implementation. Owing to this
distinctive feature, compaction methods have been widely used for
built-in testing, as well as external testing. In the latter case, the
bandwidth requirements to the automated test equipment employed
are relaxed which reduces the overall cost of testing. Concurrent
compaction testing methods use operational signals to detect
misbehavior of the device under test and do not require input test
stimuli. These methods have been employed for digital systems only.
In the present work, we extend the use of compaction methods for
concurrent testing of analog-to-digital converters. We estimate
tolerance bounds for the result of compaction and evaluate the
aliasing rate.
Abstract: The study aimed to identify the nature of autistic
talent, the manifestations of their weak central coherence, and their
sensory characteristics. The case study consisted of four talented
autistic males. Two of them in drawing, one in clay formation and
one in jigsaw puzzle. Tools of data collection were Group Embedded
Figures Test, Block Design Test, Sensory Profile Checklist Revised,
Interview forms and direct observation. Results indicated that talent
among autistics emerges in limited domain and being extraordinary
for each case. Also overlapping construction properties. Indeed, they
show three perceptual aspects of weak central coherence: The weak
in visual spatial-constructional coherence, the weak in perceptual
coherence and the weak in verbal – semantic coherence. Moreover,
the majority of the study cases used the three strategies of weak
central coherence (segmentation, obliqueness and rotation). As for
the sensory characteristics, all study cases have numbers of that
characteristics that especially emerges in the visual system.
Abstract: The main objective of this article is to present the semi-active vibration control using an electro-rheological fluid embedded sandwich structure for a cantilever beam. ER fluid is a smart material, which cause the suspended particles polarize and connect each other to form chain. The stiffness and damping coefficients of the ER fluid can be changed in 10 micro seconds; therefore, ERF is suitable to become the material embedded in the tunable vibration absorber to become a smart absorber. For the ERF smart material embedded structure, the fuzzy control law depends on the experimental expert database and the proposed self-tuning strategy. The electric field is controlled by a CRIO embedded system to implement the real application. This study investigates the different performances using the Type-1 fuzzy and interval Type-2 fuzzy controllers. The Interval type-2 fuzzy control is used to improve the modeling uncertainties for this ERF embedded shock absorber. The self-tuning vibration controllers using Type-1 and Interval Type-2 fuzzy law are implemented to the shock absorber system. Based on the resulting performance, Internal Type-2 fuzzy is better than the traditional Type-1 fuzzy control for this vibration control system.
Abstract: Conventional approaches in the implementation of logic programming applications on embedded systems are solely of software nature. As a consequence, a compiler is needed that transforms the initial declarative logic program to its equivalent procedural one, to be programmed to the microprocessor. This approach increases the complexity of the final implementation and reduces the overall system's performance. On the contrary, presenting hardware implementations which are only capable of supporting logic programs prevents their use in applications where logic programs need to be intertwined with traditional procedural ones, for a specific application. We exploit HW/SW codesign methods to present a microprocessor, capable of supporting hybrid applications using both programming approaches. We take advantage of the close relationship between attribute grammar (AG) evaluation and knowledge engineering methods to present a programmable hardware parser that performs logic derivations and combine it with an extension of a conventional RISC microprocessor that performs the unification process to report the success or failure of those derivations. The extended RISC microprocessor is still capable of executing conventional procedural programs, thus hybrid applications can be implemented. The presented implementation is programmable, supports the execution of hybrid applications, increases the performance of logic derivations (experimental analysis yields an approximate 1000% increase in performance) and reduces the complexity of the final implemented code. The proposed hardware design is supported by a proposed extended C-language called C-AG.
Abstract: With the turn of this century, many researchers
started showing interest in Embedded Firewall (EF) implementations.
These are not the usual firewalls that are used as checkpoints at network gateways. They are, rather, applied near those hosts that need protection. Hence by using them, individual or grouped network
components can be protected from the inside as well as from external attacks.
This paper presents a study of EF-s, looking at their architecture and problems. A comparative study assesses how practical each kind is. It particularly focuses on the architecture, weak points, and
portability of each kind. A look at their use by different categories of users is also presented.
Abstract: In this paper, the effects of radiation, chemical
reaction and double dispersion on mixed convection heat and mass
transfer along a semi vertical plate are considered. The plate is
embedded in a Newtonian fluid saturated non - Darcy (Forchheimer
flow model) porous medium. The Forchheimer extension and first
order chemical reaction are considered in the flow equations. The
governing sets of partial differential equations are nondimensionalized
and reduced to a set of ordinary differential
equations which are then solved numerically by Fourth order Runge–
Kutta method. Numerical results for the detail of the velocity,
temperature, and concentration profiles as well as heat transfer rates
(Nusselt number) and mass transfer rates (Sherwood number) against
various parameters are presented in graphs. The obtained results are
checked against previously published work for special cases of the
problem and are found to be in good agreement.
Abstract: In recent years image watermarking has become an
important research area in data security, confidentiality and image
integrity. Many watermarking techniques were proposed for medical
images. However, medical images, unlike most of images, require
extreme care when embedding additional data within them because
the additional information must not affect the image quality and
readability. Also the medical records, electronic or not, are linked to
the medical secrecy, for that reason, the records must be confidential.
To fulfill those requirements, this paper presents a lossless
watermarking scheme for DICOM images. The proposed a fragile
scheme combines two reversible techniques based on difference
expansion for patient's data hiding and protecting the region of
interest (ROI) with tamper detection and recovery capability.
Patient's data are embedded into ROI, while recovery data are
embedded into region of non-interest (RONI). The experimental
results show that the original image can be exactly extracted from the
watermarked one in case of no tampering. In case of tampered ROI,
tampered area can be localized and recovered with a high quality
version of the original area.
Abstract: In this contribution, the use of a new genetic operator is proposed. The main advantage of using this operator is that it is able to assist the evolution procedure to converge faster towards the optimal solution of a problem. This new genetic operator is called ''intuition'' operator. Generally speaking, one can claim that this operator is a way to include any heuristic or any other local knowledge, concerning the problem, that cannot be embedded in the fitness function. Simulation results show that the use of this operator increases significantly the performance of the classic Genetic Algorithm by increasing the convergence speed of its population.
Abstract: The polyfunctional and highly reactive bio-polymer,
the chitosan was first regioselectively converted into dialkylated
chitosan using dimsyl anionic solution(NaH in DMSO) and
bromodecane after protecting amino groups by phthalic anhydride.
The dibenzo-18-crown-6-ether, on the other hand, was converted into
its carbonyl derivatives via Duff reaction prior to incorporate into
chitosan by Schiff base formation. Thus formed diformylated
dibenzo-18-crown-6-ether was condensed with lipophilic chitosan to
prepare the novel solvent extraction reagent. The products were
characterized mainly by IR and 1H-NMR. Hence, the multidentate
crown ether-embedded polyfunctional bio-material was tested for
extraction of Pd(II) and Pt(IV) in aqueous solution.