Abstract: An approach to develop the FPGA of a flexible key
RSA encryption engine that can be used as a standard device in the
secured communication system is presented. The VHDL modeling of
this RSA encryption engine has the unique characteristics of
supporting multiple key sizes, thus can easily be fit into the systems
that require different levels of security. A simple nested loop addition
and subtraction have been used in order to implement the RSA
operation. This has made the processing time faster and used
comparatively smaller amount of space in the FPGA. The hardware
design is targeted on Altera STRATIX II device and determined that
the flexible key RSA encryption engine can be best suited in the
device named EP2S30F484C3. The RSA encryption implementation
has made use of 13,779 units of logic elements and achieved a clock
frequency of 17.77MHz. It has been verified that this RSA
encryption engine can perform 32-bit, 256-bit and 1024-bit
encryption operation in less than 41.585us, 531.515us and 790.61us
respectively.
Abstract: Robot manipulators are highly coupled nonlinear
systems, therefore real system and mathematical model of dynamics
used for control system design are not same. Hence, fine-tuning of
controller is always needed. For better tuning fast simulation speed
is desired. Since, Matlab incorporates LAPACK to increase the speed
and complexity of matrix computation, dynamics, forward and
inverse kinematics of PUMA 560 is modeled on Matlab/Simulink in
such a way that all operations are matrix based which give very less
simulation time. This paper compares PID parameter tuning using
Genetic Algorithm, Simulated Annealing, Generalized Pattern Search
(GPS) and Hybrid Search techniques. Controller performances for all
these methods are compared in terms of joint space ITSE and
cartesian space ISE for tracking circular and butterfly trajectories.
Disturbance signal is added to check robustness of controller. GAGPS
hybrid search technique is showing best results for tuning PID
controller parameters in terms of ITSE and robustness.
Abstract: In this study, lipase production has been investigated
using submerge fermentation by Aspergillus niger in Kilka fish oil as
main substrate. The Taguchi method with an L9 orthogonal array
design was used to investigate the effect of parameters and their
levels on lipase productivity. The optimum conditions for Kilka fish
oil concentration, incubation temperature and pH were obtained 3
gr./ml 35°C and 7, respectively. The amount of lipase activity in
optimum condition was obtained 4.59IU/ml. By comparing this
amount with the amount of productivity in the olive oil medium
based on the cost of each medium, it was that using Kilka fish oil is
84% economical. Therefore Kilka fish oil can be used as an
economical and suitable substrate in the lipase production and
industrial usages.
Abstract: This paper describes the architectural design
considerations for building a new class of application, a Personal
Knowledge Integrator and a particular example a Knowledge Theatre.
It then supports this description by describing a scenario of a child
acquiring knowledge and how this process could be augmented by
the proposed architecture and design of a Knowledge Theatre. David
Merrill-s first “principles of instruction" are kept in focus to provide
a background to view the learning potential.
Abstract: Trace element speciation of an integrated soil
amendment matrix was studied with a modified BCR sequential
extraction procedure. The analysis included pseudo-total
concentration determinations according to USEPA 3051A and
relevant physicochemical properties by standardized methods. Based
on the results, the soil amendment matrix possessed neutralization
capacity comparable to commercial fertilizers. Additionally, the
pseudo-total concentrations of all trace elements included in the
Finnish regulation for agricultural fertilizers were lower than the
respective statutory limit values. According to chemical speciation,
the lability of trace elements increased in the following order: Hg <
Cr < Co < Cu < As < Zn < Ni < Pb < Cd < V < Mo < Ba. The
validity of the BCR approach as a tool for chemical speciation was
confirmed by the additional acid digestion phase. Recovery of trace
elements during the procedure assured the validity of the approach
and indicated good quality of the analytical work.
Abstract: The design of distributed systems involves the
partitioning of the system into components or partitions and the
allocation of these components to physical nodes. Techniques have
been proposed for both the partitioning and allocation process.
However these techniques suffer from a number of limitations. For
instance object replication has the potential to greatly improve the
performance of an object orientated distributed system but can be
difficult to use effectively and there are few techniques that support
the developer in harnessing object replication.
This paper presents a methodological technique that helps
developers decide how objects should be allocated in order to
improve performance in a distributed system that supports
replication. The performance of the proposed technique is
demonstrated and tested on an example system.
Abstract: This paper proposes a solution to the motion planning
and control problem of a point-mass robot which is required to move
safely to a designated target in a priori known workspace cluttered
with fixed elliptical obstacles of arbitrary position and sizes. A
tailored and unique algorithm for target convergence and obstacle
avoidance is proposed that will work for any number of fixed
obstacles. The control laws proposed in this paper also ensures that
the equilibrium point of the given system is asymptotically stable.
Computer simulations with the proposed technique and applications
to a planar (RP) manipulator will be presented.
Abstract: Application-Specific Instruction (ASI ) set Processors
(ASIP) have become an important design choice for embedded
systems due to runtime flexibility, which cannot be provided by
custom ASIC solutions. One major bottleneck in maximizing ASIP
performance is the limitation on the data bandwidth between the
General Purpose Register File (GPRF) and ASIs. This paper presents
the Implicit Registers (IRs) to provide the desirable data bandwidth.
An ASI Input/Output model is proposed to formulate the overheads of
the additional data transfer between the GPRF and IRs, therefore,
an IRs allocation algorithm is used to achieve the better performance
by minimizing the number of extra data transfer instructions. The
experiment results show an up to 3.33x speedup compared to the
results without using IRs.
Abstract: Current technological advances pale in comparison to the changes in social behaviors and 'sense of place' that is being empowered since the Internet made it on the scene. Today-s students view the Internet as both a source of entertainment and an educational tool. The development of virtual environments is a conceptual framework that needs to be addressed by educators and it is important that they become familiar with who these virtual learners are and how they are motivated to learn. Massively multiplayer online role playing games (MMORPGs), if well designed, could become the vehicle of choice to deliver learning content. We suggest that these games, in order to accomplish these goals, must begin with well-established instructional design principles that are co-aligned with established principles of video game design. And have the opportunity to provide an instructional model of significant prescriptive power. The authors believe that game designers need to take advantage of the natural motivation player-learners have for playing games by developing them in such a way so as to promote, intrinsic motivation, content learning, transfer of knowledge, and naturalization.
Abstract: The induction hardening machines are utilized in
the industries which modify machine parts and tools needed to
achieve high ware resistance. This paper describes the model of
induction heating process design of inverter circuit and the results
of induction surface hardening of heating coil. In the design of
heating coil, the shape and the turn numbers of the coil are very
important design factors because they decide the overall operating
performance of induction heater including resonant frequency, Q
factor, efficiency and power factor. The performance will be tested
by experiments in some cases high frequency induction hardening
machine.
Abstract: In this paper, the trajectory tracking problem for carlike mobile robots have been studied. The system comprises of a leader and a follower robot. The purpose is to control the follower so that the leader-s trajectory is tracked with arbitrary desired clearance to avoid inter-robot collision while navigating in a terrain with obstacles. A set of artificial potential field functions is proposed using the Direct Method of Lyapunov for the avoidance of obstacles and attraction to their designated targets. Simulation results prove the efficiency of our control technique.
Abstract: Bridge is an architectural symbol in Iran as Badgir
(wind catcher); fire temples and arch are vaults are such. Therefore, from the very old ages, construction of bridges in Iran has mixed with
architecture, social customs, alms and charity and holiness. Since long ago, from Mad, Achaemenid, Parthian and Sassanid times which construction of bridges got an inseparable relation with social dependency and architecture, based on those dependency bridges and
dams got holy names; as Dokhtar castle and Dokhtar bridges were constructed. This method continued even after Islam and whenever
Iranians got free from political fights and the immunity of roads were established the bridge construction did also prospered. In ancient
times bridge construction passes through it growing and completion process and in Sassanid time in some way it reached to the peak of art
and glory; as after Islam especially during 4th. century (Arab calendar) it put behind a period of glory and in Safavid time it
reached to an exceptional glory and magnificence by constructing
glorious bridges on Zayandeh Roud River in Isfahan.
Having a combined style and changeability into bridge barrier, some of these bridges develop into magnificent constructions. The
sustainable structures, mentioned above, are constructed for various
reasons as follows: connecting two sides of a river, storing water,
controlling floods, using water energy to operate water windmills, making lanes of streams for farms- use, and building recreational
places for people, etc. These studies carried in bridges reveals the fact
that in construction and designing mentioned above, lots of
technological factors have been taken into consideration such as
exceeding floods in the rives, hydraulic and hydrology of the rivers and bridges, geology, foundation, structure, construction material, and adopting appropriate executing methods, all of which are being analyzed in this article.
Abstract: Tracing and locating the geographical location of users (Geolocation) is used extensively in todays Internet. Whenever we, e.g., request a page from google we are - unless there was a specific configuration made - automatically forwarded to the page with the relevant language and amongst others, dependent on our location identified, specific commercials are presented. Especially within the area of Network Security, Geolocation has a significant impact. Because of the way the Internet works, attacks can be executed from almost everywhere. Therefore, for an attribution, knowledge of the origination of an attack - and thus Geolocation - is mandatory in order to be able to trace back an attacker. In addition, Geolocation can also be used very successfully to increase the security of a network during operation (i.e. before an intrusion actually has taken place). Similar to greylisting in emails, Geolocation allows to (i) correlate attacks detected with new connections and (ii) as a consequence to classify traffic a priori as more suspicious (thus particularly allowing to inspect this traffic in more detail). Although numerous techniques for Geolocation are existing, each strategy is subject to certain restrictions. Following the ideas of Endo et al., this publication tries to overcome these shortcomings with a combined solution of different methods to allow improved and optimized Geolocation. Thus, we present our architecture for improved Geolocation, by designing a new algorithm, which combines several Geolocation techniques to increase the accuracy.
Abstract: This paper presents implementation of attitude controller for a small UAV using field programmable gate array (FPGA). Due to the small size constrain a miniature more compact and computationally extensive; autopilot platform is needed for such systems. More over UAV autopilot has to deal with extremely adverse situations in the shortest possible time, while accomplishing its mission. FPGAs in the recent past have rendered themselves as fast, parallel, real time, processing devices in a compact size. This work utilizes this fact and implements different attitude controllers for a small UAV in FPGA, using its parallel processing capabilities. Attitude controller is designed in MATLAB/Simulink environment. The discrete version of this controller is implemented using pipelining followed by retiming, to reduce the critical path and thereby clock period of the controller datapath. Pipelined, retimed, parallel PID controller implementation is done using rapidprototyping and testing efficient development tool of “system generator", which has been developed by Xilinx for FPGA implementation. The improved timing performance enables the controller to react abruptly to any changes made to the attitudes of UAV.
Abstract: Reliable secure multicast communication in mobile
adhoc networks is challenging due to its inherent characteristics of
infrastructure-less architecture with lack of central authority, high
packet loss rates and limited resources such as bandwidth, time and
power. Many emerging commercial and military applications require
secure multicast communication in adhoc environments. Hence key
management is the fundamental challenge in achieving reliable
secure communication using multicast key distribution for mobile
adhoc networks. Thus in designing a reliable multicast key
distribution scheme, reliability and congestion control over
throughput are essential components. This paper proposes and
evaluates the performance of an enhanced optimized multicast cluster
tree algorithm with destination sequenced distance vector routing
protocol to provide reliable multicast key distribution. Simulation
results in NS2 accurately predict the performance of proposed
scheme in terms of key delivery ratio and packet loss rate under
varying network conditions. This proposed scheme achieves
reliability, while exhibiting low packet loss rate with high key
delivery ratio compared with the existing scheme.
Abstract: Design for cost (DFC) is a method that reduces life
cycle cost (LCC) from the angle of designers. Multiple domain
features mapping (MDFM) methodology was given in DFC. Using
MDFM, we can use design features to estimate the LCC. From the
angle of DFC, the design features of family cars were obtained, such
as all dimensions, engine power and emission volume. At the
conceptual design stage, cars- LCC were estimated using back
propagation (BP) artificial neural networks (ANN) method and
case-based reasoning (CBR). Hamming space was used to measure the
similarity among cases in CBR method. Levenberg-Marquardt (LM)
algorithm and genetic algorithm (GA) were used in ANN. The
differences of LCC estimation model between CBR and artificial
neural networks (ANN) were provided. ANN and CBR separately
each method has its shortcomings. By combining ANN and CBR
improved results accuracy was obtained. Firstly, using ANN selected
some design features that affect LCC. Then using LCC estimation
results of ANN could raise the accuracy of LCC estimation in CBR
method. Thirdly, using ANN estimate LCC errors and correct errors in
CBR-s estimation results if the accuracy is not enough accurate.
Finally, economically family cars and sport utility vehicle (SUV) was
given as LCC estimation cases using this hybrid approach combining
ANN and CBR.
Abstract: In this paper we present the design of a new encryption scheme. The scheme we propose is a very exible encryption and authentication primitive. We build this scheme on two relatively new design principles: t-functions and fast pseudo hadamard transforms. We recapitulate the theory behind these principles and analyze their security properties and efficiency. In more detail we propose a streamcipher which outputs a message authentication tag along with theencrypted data stream with only little overhead. Moreover we proposesecurity-speed tradeoffs. Our scheme is faster than other comparablet-function based designs while offering the same security level.
Abstract: Today-s Wi Fi generation utilize the latest technology in their daily lives. Instructors at National University, the second largest non profit private institution of higher learning in California, are incorporating these new tools to modify their Online class formats to better accommodate these new skills in their distance education delivery modes. The University provides accelerated learning in a one-course per month format both Onsite and Online. Since there has been such a significant increase in Online classes over the past three years, and it is expected to grow even more over the over the next five years, Instructors cannot afford to maintain the status quo and not take advantage of these new options. It is at the discretion of the instructors which accessory they use and how comfortable and familiar they are with the technology. This paper explores the effects and summarizes students- comments of some of these new technological options which have been recently provided in order to make students- online learning experience more exciting and meaningful.
Abstract: The increasing demand for higher data rates in wireless communication systems has led to the more effective and efficient use of all allocated frequency bands. In order to use the whole bandwidth at maximum efficiency, one needs to have RF power amplifiers with a higher linear level and memory-less performance. This is considered to be a major challenge to circuit designers. In this thesis the linearity and memory are studied and examined via the behavior of the intermodulation distortion (IMD). A major source of the in-band distortion can be shown to be influenced by the out-of-band impedances presented at either the input or the output of the device, especially those impedances terminated the low frequency (IF) components. Thus, in order to regulate the in-band distortion, the out of-band distortion must be controllable. These investigations are performed on a 12W LDMOS device characterised at 2.1 GHz within a purpose built, high-power measurement system.
Abstract: A feasibility study for the design and construction of a
pilot plant for the extraction of castor oil in South Africa was
conducted. The study emphasized the four critical aspects of project
feasibility analysis, namely technical, financial, market and
managerial aspects. The technical aspect involved research on
existing oil extraction technologies, namely: mechanical pressing and
solvent extraction, as well as assessment of the proposed production
site for both short and long term viability of the project. The site is
on the outskirts of Nkomazi village in the Mpumalanga province,
where connections for water and electricity are currently underway,
potential raw material supply proves to be reliable since the province
is known for its commercial farming. The managerial aspect was
evaluated based on the fact that the current producer of castor oil will
be fully involved in the project while receiving training and technical
assistance from Sasol Technology, the TSC and SEDA. Market and
financial aspects were evaluated and the project was considered
financially viable with a Net Present Value (NPV) of R2 731 687 and
an Internal Rate of Return (IRR) of 18% at an annual interest rate of
10.5%. The payback time is 6years for analysis over the first 10
years with a net income of R1 971 000 in the first year. The project
was thus found to be feasible with high chance of success while
contributing to socio-economic development. It was recommended
for lab tests to be conducted to establish process kinetics that would
be used in the initial design of the plant.