Abstract: Machine tools are improved capacity remarkably during the 20th century. Improving the precision of machine tools are related with precision of products and accurate processing is always associated with the subject of interest. There are a lot of the elements that determine the precision of the machine, as guides, motors, structure, control, etc. In this paper we focused on the phenomenon that vertical movement system has worse precision than horizontal movement system even they were made up with same components. The vertical movement system needs to be studied differently from the horizontal movement system to develop its precision. The vertical movement system has load on its transfer direction and it makes the movement system weak in precision than the horizontal one. Some machines have mechanical counter balance, hydraulic or pneumatic counter balance to compensate the weight of the machine head. And there is several type of compensating the weight. It can push the machine head and also can use chain or wire lope to transfer the compensating force from counter balance to machine head. According to the type of compensating, there could be error from friction, pressure error of hydraulic or pressure control error. Also according to what to use for transferring the compensating force, transfer error of compensating force could be occur.
Abstract: In this paper Lattice Boltzmann simulation of
turbulent natural convection with large-eddy simulations (LES) in a
square cavity which is filled by water has been investigated. The
present results are validated by finds of other investigations which
have been done with different numerical methods. Calculations were
performed for high Rayleigh numbers of Ra=108 and 109. The results
confirm that this method is in acceptable agreement with other
verifications of such a flow. In this investigation is tried to present
Large-eddy turbulence flow model by Lattice Boltzmann Method
(LBM) with a clear and simple statement. Effects of increase in
Rayleigh number are displayed on streamlines, isotherm counters and
average Nusselt number. Result shows that the average Nusselt
number enhances with growth of the Rayleigh numbers.
Abstract: The last two decades witnessed some advances in the development of an Arabic character recognition (CR) system. Arabic CR faces technical problems not encountered in any other language that make Arabic CR systems achieve relatively low accuracy and retards establishing them as market products. We propose the basic stages towards a system that attacks the problem of recognizing online Arabic cursive handwriting. Rule-based methods are used to perform simultaneous segmentation and recognition of word portions in an unconstrained cursively handwritten document using dynamic programming. The output of these stages is in the form of a ranked list of the possible decisions. A new technique for text line separation is also used.
Abstract: This paper presents a new method for read out of the piezoresistive accelerometer sensors. The circuit works based on Instrumentation amplifier and it is useful for reducing offset In Wheatstone Bridge. The obtained gain is 645 with 1μv/°c Equivalent drift and 1.58mw power consumption. A Schmitt trigger and multiplexer circuit control output node. a high speed counter is designed in this work .the proposed circuit is designed and simulated In 0.18μm CMOS technology with 1.8v power supply.
Abstract: In this paper a functional interpretation of quantum
theory (QT) with emphasis on quantum field theory (QFT) is proposed.
Besides the usual statements on relations between a functions
initial state and final state, a functional interpretation also contains
a description of the dynamic evolution of the function. That is, it
describes how things function. The proposed functional interpretation
of QT/QFT has been developed in the context of the author-s work
towards a computer model of QT with the goal of supporting
the largest possible scope of QT concepts. In the course of this
work, the author encountered a number of problems inherent in the
translation of quantum physics into a computer program. He came
to the conclusion that the goal of supporting the major QT concepts
can only be satisfied, if the present model of QT is supplemented
by a "functional interpretation" of QT/QFT. The paper describes a
proposal for that
Abstract: This paper investigates the effects of knowledge-based acceleration feedback control integrated with Automatic Generation Control (AGC) to enhance the quality of frequency control of governing system. The Intelligent Acceleration Feedback Controller (IAFC) is proposed to counter the over and under frequency occurrences due to major load change in power system network. Therefore, generator tripping and load shedding operations can be reduced. Meanwhile, the integration of IAFC with AGC, a well known Load-Frequency Control (LFC) is essential to ensure the system frequency is restored to the nominal value. Computer simulations of frequency response of governing system are used to optimize the parameters of IAFC. As a result, there is substantial improvement on the LFC of governing system that employing the proposed control strategy.
Abstract: In recent years multi-agent systems have emerged as one of the interesting architectures facilitating distributed collaboration and distributed problem solving. Each node (agent) of the network might pursue its own agenda, exploit its environment, develop its own problem solving strategy and establish required communication strategies. Within each node of the network, one could encounter a diversity of problem-solving approaches. Quite commonly the agents can realize their processing at the level of information granules that is the most suitable from their local points of view. Information granules can come at various levels of granularity. Each agent could exploit a certain formalism of information granulation engaging a machinery of fuzzy sets, interval analysis, rough sets, just to name a few dominant technologies of granular computing. Having this in mind, arises a fundamental issue of forming effective interaction linkages between the agents so that they fully broadcast their findings and benefit from interacting with others.
Abstract: In IETF RFC 2002, Mobile-IP was developed to
enable Laptobs to maintain Internet connectivity while moving
between subnets. However, the packet loss that comes from
switching subnets arises because network connectivity is lost while
the mobile host registers with the foreign agent and this encounters
large end-to-end packet delays. The criterion to initiate a simple and
fast full-duplex connection between the home agent and foreign
agent, to reduce the roaming duration, is a very important issue to be
considered by a work in this paper. State-transition Petri-Nets of the
modeling scenario-based CIA: communication inter-agents procedure
as an extension to the basic Mobile-IP registration process was
designed and manipulated to describe the system in discrete events.
The heuristic of configuration file during practical Setup session for
registration parameters, on Cisco platform Router-1760 using IOS
12.3 (15)T and TFTP server S/W is created. Finally, stand-alone
performance simulations from Simulink Matlab, within each subnet
and also between subnets, are illustrated for reporting better end-toend
packet delays. Results verified the effectiveness of our Mathcad
analytical manipulation and experimental implementation. It showed
lower values of end-to-end packet delay for Mobile-IP using CIA
procedure-based early registration. Furthermore, it reported packets
flow between subnets to improve losses between subnets.
Abstract: Since the advent of the information era, the Internet has
brought various positive effects in everyday life. Nevertheless,
recently, problems and side-effects have been noted. Internet
witch-trials and spread of pornography are only a few of these
problems.In this study, problems and causes of malicious replies on
internet boards were analyzed, using the key ideas of game theory. The
study provides a mathematical model for the internet reply game to
devise three possible plans that could efficiently counteract malicious
replies. Furthermore, seven specific measures that comply with one of
the three plans were proposed and evaluated according to the
importance and utility of each measure using the orthogonal array
survey and SPSS conjoint analysis.The conclusion was that the most
effective measure would be forbidding unsigned user access to
malicious replies. Also notable was that some analytically proposed
measures, when implemented, could backfire and encourage malicious
replies.
Abstract: Decision feedback equalizers are commonly employed to reduce the error caused by intersymbol interference. Here, an adaptive decision feedback equalizer is presented with a new adaptation algorithm. The algorithm follows a block-based approach of normalized least mean square (NLMS) algorithm with set-membership filtering and achieves a significantly less computational complexity over its conventional NLMS counterpart with set-membership filtering. It is shown in the results that the proposed algorithm yields similar type of bit error rate performance over a reasonable signal to noise ratio in comparison with the latter one.
Abstract: Spam mails are unwanted mails sent to large number
of users. Spam mails not only consume the network resources, but
cause security threats as well. This paper proposes an efficient
technique to detect, and to prevent spam mail in the sender side rather
than the receiver side. This technique is based on a counter set on the
sender server. When a mail is transmitted to the server, the mail server
checks the number of the recipients based on its counter policy. The
counter policy performed by the mail server is based on some
pre-defined criteria. When the number of recipients exceeds the
counter policy, the mail server discontinues the rest of the process, and
sends a failure mail to sender of the mail; otherwise the mail is
transmitted through the network. By using this technique, the usage of
network resources such as bandwidth, and memory is preserved. The
simulation results in real network show that when the counter is set on
the sender side, the time required for spam mail detection is 100 times
faster than the time the counter is set on the receiver side, and the
network resources are preserved largely compared with other
anti-spam mail techniques in the receiver side.
Abstract: In accordance with environmental impacts contended in Kyoto Protocol, the study aims to explore the different administrative and non-administrative measurements that industrial countries, such as America, German, Japan, Korea, Holland and British take to face with the increasing Global Warming phenomena. By large, these measurements consist of versatile dimensions, including of education and advocating, economical instruments, research developments and instances, restricted instruments, voluntary contacts, exchangeable permit for carbon-release and public investments. The results of discussion for the study are as follows: both economical impacts as well as reformations for nations that are affected via Kyoto Protocol, and human testifying for variables of global surroundings in the age of Kyoto Protocol.
Abstract: Although the field of parametric Pattern Recognition (PR) has been thoroughly studied for over five decades, the use of the Order Statistics (OS) of the distributions to achieve this has not been reported. The pioneering work on using OS for classification was presented in [1] for the Uniform distribution, where it was shown that optimal PR can be achieved in a counter-intuitive manner, diametrically opposed to the Bayesian paradigm, i.e., by comparing the testing sample to a few samples distant from the mean. This must be contrasted with the Bayesian paradigm in which, if we are allowed to compare the testing sample with only a single point in the feature space from each class, the optimal strategy would be to achieve this based on the (Mahalanobis) distance from the corresponding central points, for example, the means. In [2], we showed that the results could be extended for a few symmetric distributions within the exponential family. In this paper, we attempt to extend these results significantly by considering asymmetric distributions within the exponential family, for some of which even the closed form expressions of the cumulative distribution functions are not available. These distributions include the Rayleigh, Gamma and certain Beta distributions. As in [1] and [2], the new scheme, referred to as Classification by Moments of Order Statistics (CMOS), attains an accuracy very close to the optimal Bayes’ bound, as has been shown both theoretically and by rigorous experimental testing.
Abstract: Quantum cryptography offers a way of key agreement,
which is unbreakable by any external adversary. Authentication is
of crucial importance, as perfect secrecy is worthless if the identity
of the addressee cannot be ensured before sending important information.
Message authentication has been studied thoroughly, but no
approach seems to be able to explicitly counter meet-in-the-middle
impersonation attacks. The goal of this paper is the development of
an authentication scheme being resistant against active adversaries
controlling the communication channel. The scheme is built on top
of a key-establishment protocol and is unconditionally secure if built
upon quantum cryptographic key exchange. In general, the security
is the same as for the key-agreement protocol lying underneath.
Abstract: In this paper, a worm-like micro robot designed for inpipe
application with intelligent active force control (AFC) capability
is modelled and simulated. The motion of the micro robot is based on
an impact drive mechanism (IDM) that is actuated using piezoelectric
device. The trajectory tracking performance of the modelled micro
robot is initially experimented via a conventional proportionalintegral-
derivative (PID) controller in which the dynamic response of
the robot system subjected to different input excitations is
investigated. Subsequently, a robust intelligent method known as
active force control with fuzzy logic (AFCFL) is later incorporated
into the PID scheme to enhance the system performance by
compensating the unwanted disturbances due to the interaction of the
robot with its environment. Results show that the proposed AFCFL
scheme is far superior than the PID control counterpart in terms of
the system-s tracking capability in the wake of the disturbances.
Abstract: Optimum communication and performance in
Wireless Sensor Networks, constitute multi-facet challenges due to
the specific networking characteristics as well as the scarce resource
availability. Furthermore, it is becoming increasingly apparent that
isolated layer based approaches often do not meet the demands posed
by WSNs applications due to omission of critical inter-layer
interactions and dependencies. As a counterpart, cross-layer is
receiving high interest aiming to exploit these interactions and
increase network performance. However, in order to clearly identify
existing dependencies, comprehensive performance studies are
required evaluating the effect of different critical network parameters
on system level performance and behavior.This paper-s main
objective is to address the need for multi-parametric performance
evaluations considering critical network parameters using a well
known network simulator, offering useful and practical conclusions
and guidelines. The results reveal strong dependencies among
considered parameters which can be utilized by and drive future
research efforts, towards designing and implementing highly efficient
protocols and architectures.
Abstract: Ranking of fuzzy numbers play an important role in
decision making, optimization, forecasting etc. Fuzzy numbers must
be ranked before an action is taken by a decision maker. In this
paper, with the help of several counter examples it is proved that
ranking method proposed by Chen and Chen (Expert Systems with
Applications 36 (2009) 6833-6842) is incorrect. The main aim of this
paper is to propose a new approach for the ranking of generalized
trapezoidal fuzzy numbers. The main advantage of the proposed
approach is that the proposed approach provide the correct ordering
of generalized and normal trapezoidal fuzzy numbers and also the
proposed approach is very simple and easy to apply in the real life
problems. It is shown that proposed ranking function satisfies all
the reasonable properties of fuzzy quantities proposed by Wang and
Kerre (Fuzzy Sets and Systems 118 (2001) 375-385).
Abstract: Whilst there is growing evidence that activity across
the lifespan is beneficial for improved health, there are also many
changes involved with the aging process and subsequently the
potential for reduced indices of health. The nexus between all forms
of health, physical activity and aging is complex and has raised much
interest in recent times due to the realization that a multifaceted
approached is necessary in order to counteract a growing obesity
epidemic. By investigating age based trends within a population
adherring to competitive sport at older ages, further insight might be
gleaned to assist in understanding one of many factors influencing
this relationship. This study evaluated those sport psychological
constructs of health, physical fitness, mental health states, and social
dimension factors in sport that were associated with factors to
participate in sport and physical activity based on responses from the
2009 World Masters Games in Sydney. The sample consisted of
7846 athletes who competed at the games and who completed a 56
item sports participation survey using a 7-point Likert response (1 -
not important to 7 - very important). Questions focuses on factors
thought to promote participation, such as weight control, living
longer, improving mental health (self-esteem, mood states),
improving physical health and factors related to the athlete-s
competitive perspective. The most significant factors related to
participation with this cohort of masters athletes were the socializing
environment of sport, getting physically fit and improving
competitive personal best performances. Strategies to increase
participation in masters sport should focus on these factors as other
factors such as weight loss, improving mental health and living
longer were not identified as important determinates of sports
participation at the World Masters level.
Abstract: EPC Class-1 Generation-2 UHF tags, one of Radio
frequency identification or RFID tag types, is expected that most
companies are planning to use it in the supply chain in the short term
and in consumer packaging in the long term due to its inexpensive
cost. Because of the very cost, however, its resources are extremely
scarce and it is hard to have any valuable security algorithms in it. It
causes security vulnerabilities, in particular cloning the tags for
counterfeits. In this paper, we propose a product authentication
solution for anti-counterfeiting at application level in the supply chain
and mobile RFID environment. It aims to become aware of
distribution of spurious products with fake RFID tags and to provide a
product authentication service to general consumers with mobile
RFID devices like mobile phone or PDA which has a mobile RFID
reader. We will discuss anti-counterfeiting mechanisms which are
required to our proposed solution and address requirements that the
mechanisms should have.
Abstract: In this experimental study, performance of a counter
flow Ranque-Hilsch vortex tube (RHVT) with threads cut on its inner
surface was investigated experimentally (pitch is 1 and 2 mm). The
inner diameter of the vortex tube used was D=9 mm and the ratio of
the tube’s length to diameter was L/D=12. The experimental system
was a thermodynamic open system. Flow was controlled by a valve
on the hot outlet side, where the valve was changed from a nearly
closed position to its nearly open position. Fraction of cold flow (ξ) =
0.1-0.9, was determined under 300 and 350 kPa pressurized air. All
experimental data were compared with each other, the maximum
heating performance of the RHVT system was found to be 38.2 oC
and the maximum cooling performance of the RHVT in this study
was found to be -30.9 oC at pitch 1 mm.