Abstract: Any rotation of a 3-dimensional object can be performed by three consecutive rotations over Euler angles. Intrinsic rotations produce the same result as extrinsic rotations in transformation. Euler rotations are the movement obtained by changing one of the Euler angles while leaving the other two constant. These Euler rotations are applied in a simple two-axis gimbals set mounted on an automotives. The values of Euler angles are [π/4, π/4, π/4] radians inside the angles ranges for a given coordinate system and these actual orientations can be directly measured from these gimbals set of moving automotives but it can occur the gimbals lock in application at [π/2.24, 0, 0] radians. In order to avoid gimbals lock, the values of quaternion must be [π/4.8, π/8.2, 0, π/4.8] radians. The four-gimbals set can eliminate gimbals lock.
Abstract: A major challenge in camel productivity is the high
mortality rate of camel calves in the early stage due to the lack of
colostrums. This study investigates the time required for the calves to
obtain the optimum amount of the immunoglobulin (IgG). Eleven
pregnant female camels (Camelus Dromedarus) were selected
randomly and variant in age and gestation. After delivery, 7 calves
were obtained and used for this investigation. Colostrum samples
were collected from mothers immediately after parturition. Blood
samples were obtained from the calves as follow: 0 day (before
suckling), 24, 48, 72, 96, 120 and 144 hours, 2nd, 3rd, and 4th weeks
post suckling. Blood serum and colostrums whey were separated and
used to determine IgG concentration, total protein and concentration
of Cortisol and Thyroxin. The results showed high levels of IgG in
camel colostrums (328.8 ± 4.5 mg / ml). The IgG concentration in
serum of calves was the highest within 1st 24 h after suckling (140.75
mg /ml), and then declined gradually reached lower level at 144 h
(41.97 mg / ml). The average turnover rate (t 1/2) of serum IgG in
the all cases was 3.22 days. The turnover of ranged from 2.56 days
for calves have values of IgG more than average and 7.7 days for
those with values below average. In spite of very high levels of
thyroxin in sera of new born the results showed no correlation
between cortisol and thyroxin with IgG levels.
Abstract: Piezoelectric transformers are electronic devices made
from piezoelectric materials. The piezoelectric transformers as the
name implied are used for changing voltage signals from one level to another. Electrical energy carried with signals is transferred by means of mechanical vibration. Characterizing in both electrical and
mechanical properties leads to extensively use and efficiency enhancement of piezoelectric transformers in various applications. In
this paper, study and analysis of electrical and mechanical properties of multi-layer piezoelectric transformers in forms of potential and
displacement distribution throughout the volume, respectively. This
paper proposes a set of quasi-static mathematical model of electromechanical
coupling for piezoelectric transformer by using a set of
partial differential equations. Computer-based simulation utilizing the three-dimensional finite element method (3-D FEM) is exploited
as a tool for visualizing potentials and displacements distribution
within the multi-layer piezoelectric transformer. This simulation was
conducted by varying a number of layers. In this paper 3, 5 and 7 of
the circular ring type were used. The computer simulation based on
the use of the FEM has been developed in MATLAB programming environment.
Abstract: This paper presents a new approach using Combined Artificial Neural Network (CANN) module for daily peak load forecasting. Five different computational techniques –Constrained method, Unconstrained method, Evolutionary Programming (EP), Particle Swarm Optimization (PSO), and Genetic Algorithm (GA) – have been used to identify the CANN module for peak load forecasting. In this paper, a set of neural networks has been trained with different architecture and training parameters. The networks are trained and tested for the actual load data of Chennai city (India). A set of better trained conventional ANNs are selected to develop a CANN module using different algorithms instead of using one best conventional ANN. Obtained results using CANN module confirm its validity.
Abstract: Medical imaging uses the advantage of digital
technology in imaging and teleradiology. In teleradiology systems
large amount of data is acquired, stored and transmitted. A major
technology that may help to solve the problems associated with the
massive data storage and data transfer capacity is data compression
and decompression. There are many methods of image compression
available. They are classified as lossless and lossy compression
methods. In lossy compression method the decompressed image
contains some distortion. Fractal image compression (FIC) is a lossy
compression method. In fractal image compression an image is
coded as a set of contractive transformations in a complete metric
space. The set of contractive transformations is guaranteed to
produce an approximation to the original image. In this paper FIC is
achieved by PIFS using quadtree partitioning. PIFS is applied on
different images like , Ultrasound, CT Scan, Angiogram, X-ray,
Mammograms. In each modality approximately twenty images are
considered and the average values of compression ratio and PSNR
values are arrived. In this method of fractal encoding, the
parameter, tolerance factor Tmax, is varied from 1 to 10, keeping the
other standard parameters constant. For all modalities of images the
compression ratio and Peak Signal to Noise Ratio (PSNR) are
computed and studied. The quality of the decompressed image is
arrived by PSNR values. From the results it is observed that the
compression ratio increases with the tolerance factor and
mammogram has the highest compression ratio. The quality of the
image is not degraded upto an optimum value of tolerance factor,
Tmax, equal to 8, because of the properties of fractal compression.
Abstract: Directional over current relays (DOCR) are commonly used in power system protection as a primary protection in distribution and sub-transmission electrical systems and as a secondary protection in transmission systems. Coordination of protective relays is necessary to obtain selective tripping. In this paper, an approach for efficiency reduction of DOCRs nonlinear optimum coordination (OC) is proposed. This was achieved by modifying the objective function and relaxing several constraints depending on the four constraints classification, non-valid, redundant, pre-obtained and valid constraints. According to this classification, the far end fault effect on the objective function and constraints, and in consequently on relay operating time, was studied. The study was carried out, firstly by taking into account the near-end and far-end faults in DOCRs coordination problem formulation; and then faults very close to the primary relays (nearend faults). The optimal coordination (OC) was achieved by simultaneously optimizing all variables (TDS and Ip) in nonlinear environment by using of Genetic algorithm nonlinear programming techniques. The results application of the above two approaches on 6-bus and 26-bus system verify that the far-end faults consideration on OC problem formulation don-t lose the optimality.
Abstract: During more than a decade, many proposals and standards have been designed to deal with the mobility issues; however, there are still some serious limitations in basing solutions on them. In this paper we discuss the possibility of handling mobility at the application layer. We do this while revisiting the conventional implementation of the Two Phase Commit (2PC) protocol which is a fundamental asset of transactional technology for ensuring the consistent commitment of distributed transactions. The solution is based on an execution framework providing an efficient extension that is aware of the mobility and preserves the 2PC principle.
Abstract: In an interval graph G = (V,E) the distance between two vertices u, v is de£ned as the smallest number of edges in a path joining u and v. The eccentricity of a vertex v is the maximum among distances from all other vertices of V . The diameter (δ) and radius (ρ) of the graph G is respectively the maximum and minimum among all the eccentricities of G. The center of the graph G is the set C(G) of vertices with eccentricity ρ. In this context our aim is to establish the relation ρ = δ 2 for an interval graph and to determine the center of it.
Abstract: In this article, we introduce a new approach for
analyzing UML designs to detect the inconsistencies between
multiple state diagrams and sequence diagrams. The Super State
Analysis (SSA) identifies the inconsistencies in super states, single
step transitions, and sequences. Because SSA considers multiple
UML state diagrams, it discovers inconsistencies that cannot be
discovered when considering only a single UML state diagram. We
have introduced a transition set that captures relationship information
that is not specifiable in UML diagrams. The SSA model uses the
transition set to link transitions of multiple state diagrams together.
The analysis generates three different sets automatically. These sets
are compared to the provided sets to detect the inconsistencies. SSA
identifies five types of inconsistencies: impossible super states,
unreachable super states, illegal transitions, missing transitions, and
illegal sequences.
Abstract: Most high-performance ac drives utilize a current
controller. The controller switches a voltage source inverter (VSI)
such that the motor current follows a set of reference current
waveforms. Fixed-band hysteresis (FBH) current control has been
widely used for the PWM inverter. We want to apply the same
controller for the PWM AC chopper. The aims of the controller is to
optimize the harmonic content at both input and output sides, while
maintaining acceptable losses in the ac chopper and to control in
wide range the fundamental output voltage. Fixed band controller has
been simulated and analyzed for a single-phase AC chopper and are
easily extended to three-phase systems. Simulation confirmed the
advantages and the excellent performance of the modulation method
applied for the AC chopper.
Abstract: In this article, we propose a new surgical device for
circumferentially excision of high anal fistulas in a minimally
invasive manner. The new apparatus works on the basis of axially
rotating and moving a tubular blade along a fistulous tract
straightened using a rigid straight guidewire. As the blade moves
along the tract, its sharp circular cutting edge circumferentially
separates approximately 2.25 mm thickness of tract encircling the
rigid guidewire. We used the new set to excise two anal fistulas in a
62-year-old male patient, an extrasphincteric type and a long tract
with no internal opening. With regard to the results of this test, the
new device can be considered as a sphincter preserving mechanism
for treatment of high anal fistulas. Consequently, a major reduction
in the risk of fecal incontinence, recurrence rate, convalescence
period and patient morbidity may be achieved using the new device
for treatment of fistula-in-ano.
Abstract: Text categorization is the problem of classifying text documents into a set of predefined classes. After a preprocessing step the documents are typically represented as large sparse vectors. When training classifiers on large collections of documents, both the time and memory restrictions can be quite prohibitive. This justifies the application of features selection methods to reduce the dimensionality of the document-representation vector. Four feature selection methods are evaluated: Random Selection, Information Gain (IG), Support Vector Machine (called SVM_FS) and Genetic Algorithm with SVM (GA_FS). We showed that the best results were obtained with SVM_FS and GA_FS methods for a relatively small dimension of the features vector comparative with the IG method that involves longer vectors, for quite similar classification accuracies. Also we present a novel method to better correlate SVM kernel-s parameters (Polynomial or Gaussian kernel).
Abstract: This study focuses on examining why the range of
experience with respect to HIV infection is so diverse, especially in
regard to the latency period. An agent-based approach in modelling
the infection is used to extract high-level behaviour which cannot be
obtained analytically from the set of interaction rules at the cellular
level. A prototype model encompasses local variation in baseline
properties, contributing to the individual disease experience, and is
included in a network which mimics the chain of lymph nodes. The
model also accounts for stochastic events such as viral mutations.
The size and complexity of the model require major computational
effort and parallelisation methods are used.
Abstract: As the majority of faults are found in a few of its modules so there is a need to investigate the modules that are affected severely as compared to other modules and proper maintenance need to be done on time especially for the critical applications. In this paper, we have explored the different predictor models to NASA-s public domain defect dataset coded in Perl programming language. Different machine learning algorithms belonging to the different learner categories of the WEKA project including Mamdani Based Fuzzy Inference System and Neuro-fuzzy based system have been evaluated for the modeling of maintenance severity or impact of fault severity. The results are recorded in terms of Accuracy, Mean Absolute Error (MAE) and Root Mean Squared Error (RMSE). The results show that Neuro-fuzzy based model provides relatively better prediction accuracy as compared to other models and hence, can be used for the maintenance severity prediction of the software.
Abstract: Problem Statement:Rapid technological developments of the 21st century have advanced our daily lives in various ways. Particularly in education, students frequently utilize technological resources to aid their homework and to access information. listen to radio or watch television (26.9 %) and e-mails (34.2 %) [26]. Not surprisingly, the increase in the use of technologies also resulted in an increase in the use of e-mail, instant messaging, chat rooms, mobile phones, mobile phone cameras and web sites by adolescents to bully peers. As cyber bullying occurs in the cyber space, lesser access to technologies would mean lesser cyber-harm. Therefore, the frequency of technology use is a significant predictor of cyber bullying and cyber victims. Cyber bullies try to harm the victim using various media. These tools include sending derogatory texts via mobile phones, sending threatening e-mails and forwarding confidential emails to everyone on the contacts list. Another way of cyber bullying is to set up a humiliating website and invite others to post comments. In other words, cyber bullies use e-mail, chat rooms, instant messaging, pagers, mobile texts and online voting tools to humiliate and frighten others and to create a sense of helplessness. No matter what type of bullying it is, it negatively affects its victims. Children who bully exhibit more emotional inhibition and attribute themselves more negative self-statements compared to non-bullies. Students whose families are not sympathetic and who receive lower emotional support are more prone to bully their peers. Bullies have authoritarian families and do not get along well with them. The family is the place where the children-s physical, social and psychological needs are satisfied and where their personalities develop. As the use of the internet became prevalent so did parents- restrictions on their children-s internet use. However, parents are unaware of the real harm. Studies that explain the relationship between parental attitudes and cyber bullying are scarce in literature. Thus, this study aims to investigate the relationship between cyber bullying and parental attitudes in the primary school. Purpose of Study: This study aimed to investigate the relationship between cyber bullying and parental attitudes. A second aim was to determine whether parental attitudes could predict cyber bullying and if so which variables could predict it significantly. Methods:The study had a cross-sectional and relational survey model. A demographics information form, questions about cyber bullying and a Parental Attitudes Inventory were conducted with a total of 346 students (189 females and 157 males) registered at various primary schools. Data was analysed by multiple regression analysis using the software package SPSS 16.
Abstract: This study presents an exact general solution for
steady-state conductive heat transfer in cylindrical composite
laminates. Appropriate Fourier transformation has been obtained
using Sturm-Liouville theorem. Series coefficients are achieved by
solving a set of equations that related to thermal boundary conditions
at inner and outer of the cylinder, also related to temperature
continuity and heat flux continuity between each layer. The solution
of this set of equations are obtained using Thomas algorithm. In this
paper, the effect of fibers- angle on temperature distribution of
composite laminate is investigated under general boundary
conditions. Here, we show that the temperature distribution for any
composite laminates is between temperature distribution for
laminates with θ = 0° and θ = 90° .
Abstract: Luneberg lens is a new generation of antennas that is
developed in the last few years and inserts itself strongly in
Microwaves, Communications and Telescopes area. The idea of this
research is to improve the radiation pattern by decreasing the side
lobes and increasing the main lobe. The new design is proposed to
work in the X-band. The simulated result and analysis are presented.
Abstract: A new method for color image segmentation using fuzzy logic is proposed in this paper. Our aim here is to automatically produce a fuzzy system for color classification and image segmentation with least number of rules and minimum error rate. Particle swarm optimization is a sub class of evolutionary algorithms that has been inspired from social behavior of fishes, bees, birds, etc, that live together in colonies. We use comprehensive learning particle swarm optimization (CLPSO) technique to find optimal fuzzy rules and membership functions because it discourages premature convergence. Here each particle of the swarm codes a set of fuzzy rules. During evolution, a population member tries to maximize a fitness criterion which is here high classification rate and small number of rules. Finally, particle with the highest fitness value is selected as the best set of fuzzy rules for image segmentation. Our results, using this method for soccer field image segmentation in Robocop contests shows 89% performance. Less computational load is needed when using this method compared with other methods like ANFIS, because it generates a smaller number of fuzzy rules. Large train dataset and its variety, makes the proposed method invariant to illumination noise
Abstract: This paper considers the autonomous navigation
problem of multiple n-link nonholonomic mobile manipulators within
an obstacle-ridden environment. We present a set of nonlinear
acceleration controllers, derived from the Lyapunov-based control
scheme, which generates collision-free trajectories of the mobile
manipulators from initial configurations to final configurations in a
constrained environment cluttered with stationary solid objects of
different shapes and sizes. We demonstrate the efficiency of the
control scheme and the resulting acceleration controllers of the
mobile manipulators with results through computer simulations of an
interesting scenario.
Abstract: A neurofuzzy approach for a given set of input-output training data is proposed in two phases. Firstly, the data set is partitioned automatically into a set of clusters. Then a fuzzy if-then rule is extracted from each cluster to form a fuzzy rule base. Secondly, a fuzzy neural network is constructed accordingly and parameters are tuned to increase the precision of the fuzzy rule base. This network is able to learn and optimize the rule base of a Sugeno like Fuzzy inference system using Hybrid learning algorithm, which combines gradient descent, and least mean square algorithm. This proposed neurofuzzy system has the advantage of determining the number of rules automatically and also reduce the number of rules, decrease computational time, learns faster and consumes less memory. The authors also investigate that how neurofuzzy techniques can be applied in the area of control theory to design a fuzzy controller for linear and nonlinear dynamic systems modelling from a set of input/output data. The simulation analysis on a wide range of processes, to identify nonlinear components on-linely in a control system and a benchmark problem involving the prediction of a chaotic time series is carried out. Furthermore, the well-known examples of linear and nonlinear systems are also simulated under the Matlab/Simulink environment. The above combination is also illustrated in modeling the relationship between automobile trips and demographic factors.