Abstract: Wheeled Mobile Robots (WMRs) are built with their
Wheels- drive machine, Motors. Depend on their desire design of
WMR, Technicians made used of DC Motors for motion control. In
this paper, the author would like to analyze how to choose DC motor
to be balance with their applications of especially for WMR.
Specification of DC Motor that can be used with desire WMR is to
be determined by using MATLAB Simulink model. Therefore, this
paper is mainly focus on software application of MATLAB and
Control Technology. As the driving system of DC motor, a
Peripheral Interface Controller (PIC) based control system is
designed including the assembly software technology and H-bridge
control circuit. This Driving system is used to drive two DC gear
motors which are used to control the motion of WMR. In this
analyzing process, the author mainly focus the drive system on
driving two DC gear motors that will control with Differential Drive
technique to the Wheeled Mobile Robot . For the design analysis of
Motor Driving System, PIC16F84A is used and five inputs of sensors
detected data are tested with five ON/OFF switches. The outputs of
PIC are the commands to drive two DC gear motors, inputs of Hbridge
circuit .In this paper, Control techniques of PIC
microcontroller and H-bridge circuit, Mechanism assignments of
WMR are combined and analyzed by mainly focusing with the
“Modeling and Simulink of DC Motor using MATLAB".
Abstract: System identification is the process of creating
models of dynamic process from input- output signals. The aim of
system identification can be identified as “ to find a model with
adjustable parameters and then to adjust them so that the predicted
output matches the measured output". This paper presents a method
of modeling and simulating with system identification to achieve the
maximum fitness for transformation function. First by using
optimized KLM equivalent circuit for PVDF piezoelectric transducer
and assuming different inputs including: sinuside, step and sum of
sinusides, get the outputs, then by using system identification
toolbox in MATLAB, we estimate the transformation function from
inputs and outputs resulted in last program. Then compare the fitness
of transformation function resulted from using ARX,OE(Output-
Error) and BJ(Box-Jenkins) models in system identification toolbox
and primary transformation function form KLM equivalent circuit.
Abstract: The paper shows that in the analysis of a queuing system with fixed-size batch arrivals, there emerges a set of polynomials which are a generalization of Chebyshev polynomials of the second kind. The paper uses these polynomials in assessing the transient behaviour of the overflow (equivalently call blocking) probability in the system. A key figure to note is the proportion of the overflow (or blocking) probability resident in the transient component, which is shown in the results to be more significant at the beginning of the transient and naturally decays to zero in the limit of large t. The results also show that the significance of transients is more pronounced in cases of lighter loads, but lasts longer for heavier loads.
Abstract: An enhanced particle swarm optimization algorithm
(PSO) is presented in this work to solve the non-convex OPF
problem that has both discrete and continuous optimization variables.
The objective functions considered are the conventional quadratic
function and the augmented quadratic function. The latter model
presents non-differentiable and non-convex regions that challenge
most gradient-based optimization algorithms. The optimization
variables to be optimized are the generator real power outputs and
voltage magnitudes, discrete transformer tap settings, and discrete
reactive power injections due to capacitor banks. The set of equality
constraints taken into account are the power flow equations while the
inequality ones are the limits of the real and reactive power of the
generators, voltage magnitude at each bus, transformer tap settings,
and capacitor banks reactive power injections. The proposed
algorithm combines PSO with Newton-Raphson algorithm to
minimize the fuel cost function. The IEEE 30-bus system with six
generating units is used to test the proposed algorithm. Several cases
were investigated to test and validate the consistency of detecting
optimal or near optimal solution for each objective. Results are
compared to solutions obtained using sequential quadratic
programming and Genetic Algorithms.
Abstract: This paper presents a comparative study on two most
popular control strategies for Permanent Magnet Synchronous Motor
(PMSM) drives: field-oriented control (FOC) and direct torque
control (DTC). The comparison is based on various criteria including
basic control characteristics, dynamic performance, and
implementation complexity. The study is done by simulation using
the Simulink Power System Blockset that allows a complete
representation of the power section (inverter and PMSM) and the
control system. The simulation and evaluation of both control
strategies are performed using actual parameters of Permanent
Magnet Synchronous Motor fed by an IGBT PWM inverter.
Abstract: This paper describes various stages of design and prototyping of a modular robot for use in various industrial applications. The major goal of current research has been to design and make different robotic joints at low cost capable of being assembled together in any given order for achieving various robot configurations. Five different types of joins were designed and manufactured where extensive research has been carried out on the design of each joint in order to achieve optimal strength, size, modularity, and price. This paper presents various stages of research and development undertaken to engineer these joints that include material selection, manufacturing, and strength analysis. The outcome of this research addresses the birth of a new generation of modular industrial robots with a wider range of applications and greater efficiency.
Abstract: In this study a neural network (NN) was proposed to
predict the sorption of binary mixture of copper-cobalt ions into
clinoptilolite as ion-exchanger. The configuration of the
backpropagation neural network giving the smallest mean square
error was three-layer NN with tangent sigmoid transfer function at
hidden layer with 10 neurons, linear transfer function at output layer
and Levenberg-Marquardt backpropagation training algorithm.
Experiments have been carried out in the batch reactor to obtain
equilibrium data of the individual sorption and the mixture of coppercobalt
ions. The obtained modeling results have shown that the used
of neural network has better adjusted the equilibrium data of the
binary system when compared with the conventional sorption
isotherm models.
Abstract: D-erythro-cyclohexylserine (D
chiral unnatural β-hydroxy amino acid expected for the synthesis of drug for AIDS treatment. To develop a continuous bioconversion
system with whole cell biocatalyst of D-threonine aldolase (D genes for the D-erythro-CHS production, D-threonine aldolase gene
was amplified from Ensifer arboris 100383 by direct PCR amplication using two degenerated oligonucleotide primers designed based on
genomic sequence of Shinorhizobium meliloti
Sequence analysis of the cloned DNA fragment revealed one
open-reading frame of 1059 bp and 386 amino acids. This putative
D-TA gene was cloned into NdeI and EcoRI (pEnsi
His-tag sequence or BamHI (pEnsi-DTA[2])
sequence of the pET21(a) vector. The expression level of the cloned gene was extremely overexpressed by E. coli BL21(DE3) transformed with pEnsi-DTA[1] compared to E. coli BL21(DE3) transformed with
pEnsi-DTA[2]. When the cells expressing the wild
used for D-TA enzyme activity, 12 mM glycine was successfully
detected in HPLC analysis. Moreover, the whole cells harbouring the
recombinant D-TA was able to synthesize D-erythro
of 0.6 mg/ml in a batch reaction.
Abstract: Access control is a critical security service in Wire- less
Sensor Networks (WSNs). To prevent malicious nodes from joining
the sensor network, access control is required. On one hand, WSN
must be able to authorize and grant users the right to access to the
network. On the other hand, WSN must organize data collected by
sensors in such a way that an unauthorized entity (the adversary)
cannot make arbitrary queries. This restricts the network access only
to eligible users and sensor nodes, while queries from outsiders will
not be answered or forwarded by nodes. In this paper we presentee
different access control schemes so as to ?nd out their objectives,
provision, communication complexity, limits, etc. Using the node
density parameter, we also provide a comparison of these proposed
access control algorithms based on the network topology which can
be flat or hierarchical.
Abstract: The scope of this research was to study the relation between the facial expressions of three lecturers in a real academic lecture theatre and the reactions of the students to those expressions. The first experiment aimed to investigate the effectiveness of a virtual lecturer-s expressions on the students- learning outcome in a virtual pedagogical environment. The second experiment studied the effectiveness of a single facial expression, i.e. the smile, on the students- performance. Both experiments involved virtual lectures, with virtual lecturers teaching real students. The results suggest that the students performed better by 86%, in the lectures where the lecturer performed facial expressions compared to the results of the lectures that did not use facial expressions. However, when simple or basic information was used, the facial expressions of the virtual lecturer had no substantial effect on the students- learning outcome. Finally, the appropriate use of smiles increased the interest of the students and consequently their performance.
Abstract: Adhesively bonded joints are preferred over the
conventional methods of joining such as riveting, welding, bolting
and soldering. Some of the main advantages of adhesive joints
compared to conventional joints are the ability to join dissimilar
materials and damage-sensitive materials, better stress distribution,
weight reduction, fabrication of complicated shapes, excellent
thermal and insulation properties, vibration response and enhanced
damping control, smoother aerodynamic surfaces and an
improvement in corrosion and fatigue resistance. This paper presents
the behavior of adhesively bonded joints subjected to combined
thermal loadings, using the numerical methods. The joint
configuration considers aluminum as central adherend with six
different outer adherends including aluminum, steel, titanium, boronepoxy,
unidirectional graphite-epoxy and cross-ply graphite-epoxy
and epoxy-based adhesives. Free expansion of the joint in x
direction was permitted and stresses in adhesive layer and interfaces
calculated for different adherends.
Abstract: Phishing, or stealing of sensitive information on the
web, has dealt a major blow to Internet Security in recent times. Most
of the existing anti-phishing solutions fail to handle the fuzziness
involved in phish detection, thus leading to a large number of false
positives. This fuzziness is attributed to the use of highly flexible and
at the same time, highly ambiguous HTML language. We introduce a
new perspective against phishing, that tries to systematically prove,
whether a given page is phished or not, using the corresponding
original page as the basis of the comparison. It analyzes the layout of
the pages under consideration to determine the percentage distortion
between them, indicative of any form of malicious alteration. The
system design represents an intelligent system, employing dynamic
assessment which accurately identifies brand new phishing attacks
and will prove effective in reducing the number of false positives.
This framework could potentially be used as a knowledge base, in
educating the internet users against phishing.
Abstract: Prediction of bacterial virulent protein sequences can
give assistance to identification and characterization of novel
virulence-associated factors and discover drug/vaccine targets against
proteins indispensable to pathogenicity. Gene Ontology (GO)
annotation which describes functions of genes and gene products as a
controlled vocabulary of terms has been shown effectively for a
variety of tasks such as gene expression study, GO annotation
prediction, protein subcellular localization, etc. In this study, we
propose a sequence-based method Virulent-GO by mining informative
GO terms as features for predicting bacterial virulent proteins.
Each protein in the datasets used by the existing method
VirulentPred is annotated by using BLAST to obtain its homologies
with known accession numbers for retrieving GO terms. After
investigating various popular classifiers using the same five-fold
cross-validation scheme, Virulent-GO using the single kind of GO
term features with an accuracy of 82.5% is slightly better than
VirulentPred with 81.8% using five kinds of sequence-based features.
For the evaluation of independent test, Virulent-GO also yields better
results (82.0%) than VirulentPred (80.7%). When evaluating single
kind of feature with SVM, the GO term feature performs much well,
compared with each of the five kinds of features.
Abstract: Biofuels, like biobutanol, have been recognized for
being renewable and sustainable fuels which can be produced from
lignocellulosic biomass. To convert lignocellulosic biomass to
biofuel, pretreatment process is an important step to remove
hemicelluloses and lignin to improve enzymatic hydrolysis. Dilute
acid pretreatment has been successful developed for pretreatment of
corncobs and the optimum conditions of dilute sulfuric and
phosphoric acid pretreatment were obtained at 120 °C for 5 min with
15:1 liquid to solid ratio and 140 °C for 10 min with 10:1 liquid to
solid ratio, respectively. The result shows that both of acid
pretreatments gave the content of total sugar approximately 34–35
g/l. In case of inhibitor content (furfural), phosphoric acid
pretreatment gives higher than sulfuric acid pretreatment.
Characterizations of corncobs after pretreatment indicate that both of
acid pretreatments can improve enzymatic accessibility and the better
results present in corncobs pretreated with sulfuric acid in term of
surface area, crystallinity, and composition analysis.
Abstract: Manufacturing processes demand tight dimensional
tolerances. The paper concerns a transducer for precise measurement
of displacement, based on a camera containing a linescan chip.
When tests were conducted using a track of black and white stripes
with a 2mm pitch, errors in measuring on individual cycle amounted
to 1.75%, suggesting that a precision of 35 microns is achievable.
Abstract: Most routing protocols (DSR, AODV etc.) that have
been designed for wireless adhoc networks incorporate the broadcasting
operation in their route discovery scheme. Probabilistic broadcasting
techniques have been developed to optimize the broadcast operation
which is otherwise very expensive in terms of the redundancy
and the traffic it generates. In this paper we have explored percolation
theory to gain a different perspective on probabilistic broadcasting
schemes which have been actively researched in the recent years.
This theory has helped us estimate the value of broadcast probability
in a wireless adhoc network as a function of the size of the network.
We also show that, operating at those optimal values of broadcast
probability there is at least 25-30% reduction in packet regeneration
during successful broadcasting.
Abstract: Baltic competitiveness is quite controversial. In a
situation with the rapid structural changes, economy develops in
balance very rarely - in different fields will always be more rapid
changes in another more stagnation.
Analyzing different economic indices developed by international
organizations the situation in three Baltic countries are described
from a different competitiveness positions highlighting strengths and
weaknesses of each country.
Exploring the openness of the economy, it is possible to observe
certain risks included in the reports describing situation of
competitiveness where government policies competing in the tax
system, the rates of labour market policies, investment environment,
etc. This is a very important factor resulting in competitive
advantage.
Baltic countries are still at a weak position from a technological
perspective, and need to borrow the knowledge and technology from
more developed countries.
Abstract: A lateral trench-gate power metal-oxide-semiconductor on 4H-SiC is proposed. The device consists of two separate trenches in which two gates are placed on both sides of P-body region resulting two parallel channels. Enhanced current conduction and reduced-surface-field effect in the structure provide substantial improvement in the device performance. Using two dimensional simulations, the performance of proposed device is evaluated and compare of with that of the conventional device for same cell pitch. It is demonstrated that the proposed structure provides two times higher output current, 11% decrease in threshold voltage, 70% improvement in transconductance, 70% reduction in specific ON-resistance, 52% increase in breakdown voltage, and nearly eight time improvement in figure-of-merit over the conventional device.
Abstract: The challenge for software development house in
Bangladesh is to find a path of using minimum process rather than CMMI or ISO type gigantic practice and process area. The small and medium size organization in Bangladesh wants to ensure minimum
basic Software Process Improvement (SPI) in day to day operational
activities. Perhaps, the basic practices will ensure to realize their company's improvement goals. This paper focuses on the key issues in basic software practices for small and medium size software
organizations, who are unable to effort the CMMI, ISO, ITIL etc. compliance certifications. This research also suggests a basic software process practices model for Bangladesh and it will show the mapping of our suggestions with international best practice. In this IT
competitive world for software process improvement, Small and medium size software companies that require collaboration and
strengthening to transform their current perspective into inseparable global IT scenario. This research performed some investigations and analysis on some projects- life cycle, current good practice, effective approach, reality and pain area of practitioners, etc. We did some
reasoning, root cause analysis, comparative analysis of various
approach, method, practice and justifications of CMMI and real life. We did avoid reinventing the wheel, where our focus is for minimal
practice, which will ensure a dignified satisfaction between
organizations and software customer.
Abstract: In this work, we study the impact of dynamically changing link slowdowns on the stability properties of packetswitched networks under the Adversarial Queueing Theory framework. Especially, we consider the Adversarial, Quasi-Static Slowdown Queueing Theory model, where each link slowdown may take on values in the two-valued set of integers {1, D} with D > 1 which remain fixed for a long time, under a (w, p)-adversary. In this framework, we present an innovative systematic construction for the estimation of adversarial injection rate lower bounds, which, if exceeded, cause instability in networks that use the LIS (Longest-in- System) protocol for contention-resolution. In addition, we show that a network that uses the LIS protocol for contention-resolution may result in dropping its instability bound at injection rates p > 0 when the network size and the high slowdown D take large values. This is the best ever known instability lower bound for LIS networks.