Abstract: In this paper, an ultra low power and low jitter 12bit
CMOS digitally controlled oscillator (DCO) design is presented.
Based on a ring oscillator implemented with low power Schmitt
trigger based inverters. Simulation of the proposed DCO using 32nm
CMOS Predictive Transistor Model (PTM) achieves controllable
frequency range of 550MHz~830MHz with a wide linearity and high
resolution. Monte Carlo simulation demonstrates that the time-period
jitter due to random power supply fluctuation is under 31ps and the
power consumption is 0.5677mW at 750MHz with 1.2V power
supply and 0.53-ps resolution. The proposed DCO has a good
robustness to voltage and temperature variations and better linearity
comparing to the conventional design.
Abstract: Genetic algorithms (GAs) have been widely used for
global optimization problems. The GA performance depends highly
on the choice of the search space for each parameter to be optimized.
Often, this choice is a problem-based experience. The search space
being a set of potential solutions may contain the global optimum
and/or other local optimums. A bad choice of this search space
results in poor solutions. In this paper, our approach consists in
extending the search space boundaries during the GA optimization,
only when it is required. This leads to more diversification of GA
population by new solutions that were not available with fixed search
space boundaries. So, these dynamic search spaces can improve the
GA optimization performances. The proposed approach is applied to
power system stabilizer optimization for multimachine power system
(16-generator and 68-bus). The obtained results are evaluated and
compared with those obtained by ordinary GAs. Eigenvalue analysis
and nonlinear system simulation results show the effectiveness of the
proposed approach to damp out the electromechanical oscillation and
enhance the global system stability.
Abstract: Industrial surveys shows that manufacturing
companies define the qualities of thermal removing process based on
the dimension and physical appearance of the cutting material
surface. Therefore, the roughness of the surface area of the material
cut by the plasma arc cutting process and the rate of the removed
material by the manual plasma arc cutting machine was importantly
considered. Plasma arc cutter Selco Genesis 90 was used to cut
Standard AISI 1017 Steel of 200 mm x100 mm x 6 mm manually
based on the selected parameters setting. The material removal rate
(MRR) was measured by determining the weight of the specimens
before and after the cutting process. The surface roughness (SR)
analysis was conducted using Mitutoyo CS-3100 to determine the
average roughness value (Ra). Taguchi method was utilized to
achieve optimum condition for both outputs studied. The
microstructure analysis in the region of the cutting surface is
performed using SEM. The results reveal that the SR values are
inversely proportional to the MRR values. The quality of the surface
roughness depends on the dross peak that occurred after the cutting
process.
Abstract: In this paper, an extended method of the directionally constrained minimization of power (DCMP) algorithm for broadband signals is proposed. The DCMP algorithm is one of the useful techniques of extracting a target signal from observed signals of a microphone array system. In the DCMP algorithm, output power of the microphone array is minimized under a constraint of constant responses to directions of arrival (DOAs) of specific signals. In our algorithm, by limiting the directional constraint to the perpendicular direction to the sensor array system, the calculating time is reduced.
Abstract: Sensors have been used in various kinds of academic
fields and applications. In this article, we propose the idea of
modularized sensors that combine multiple sensor modules into a
unique sensor. We divide a sensor into several units according to
functionalities. Each unit has different sensor modules, which share
the same type of connectors and can be serially and arbitrarily
connected each other. A user can combine different sensor modules
into a sensor platform according to requirements. Compared with
current modularized sensors, the proposed sensor platform is highly
flexible and reusable. We have implemented the prototype of the
proposed sensor platform, and the experimental results show the
proposed platform can work correctly.
Abstract: In this paper, a new dependable algorithm based on an adaptation of the standard variational iteration method (VIM) is used for analyzing the transition from steady convection to chaos for lowto-intermediate Rayleigh numbers convection in porous media. The solution trajectories show the transition from steady convection to chaos that occurs at a slightly subcritical value of Rayleigh number, the critical value being associated with the loss of linear stability of the steady convection solution. The VIM is treated as an algorithm in a sequence of intervals for finding accurate approximate solutions to the considered model and other dynamical systems. We shall call this technique as the piecewise VIM. Numerical comparisons between the piecewise VIM and the classical fourth-order Runge–Kutta (RK4) numerical solutions reveal that the proposed technique is a promising tool for the nonlinear chaotic and nonchaotic systems.
Abstract: In this paper, we propose an improved fast search
algorithm using combined histogram features and temporal division
method for short MPEG video clips from large video database. There
are two types of histogram features used to generate more robust
features. The first one is based on the adjacent pixel intensity
difference quantization (APIDQ) algorithm, which had been reliably
applied to human face recognition previously. An APIDQ histogram is
utilized as the feature vector of the frame image. Another one is
ordinal feature which is robust to color distortion. Combined with
active search [4], a temporal pruning algorithm, fast and robust video
search can be realized. The proposed search algorithm has been
evaluated by 6 hours of video to search for given 200 MPEG video
clips which each length is 30 seconds. Experimental results show the
proposed algorithm can detect the similar video clip in merely 120ms,
and Equal Error Rate (ERR) of 1% is achieved, which is more
accurately and robust than conventional fast video search algorithm.
Abstract: In determining the electromagnetic properties of
magnetic materials, hysteresis modeling is of high importance. Many
models are available to investigate those characteristics but they tend
to be complex and difficult to implement. In this paper a new
qualitative hysteresis model for ferromagnetic core is presented,
based on the function approximation capabilities of adaptive neuro
fuzzy inference system (ANFIS). The proposed ANFIS model
combined the neural network adaptive capabilities and the fuzzy
logic qualitative approach can restored the hysteresis curve with a
little RMS error. The model accuracy is good and can be easily
adapted to the requirements of the application by extending or
reducing the network training set and thus the required amount of
measurement data.
Abstract: One major difficulty that faces developers of
concurrent and distributed software is analysis for concurrency based
faults like deadlocks. Petri nets are used extensively in the
verification of correctness of concurrent programs. ECATNets are a
category of algebraic Petri nets based on a sound combination of
algebraic abstract types and high-level Petri nets. ECATNets have
'sound' and 'complete' semantics because of their integration in
rewriting logic and its programming language Maude. Rewriting
logic is considered as one of very powerful logics in terms of
description, verification and programming of concurrent systems We
proposed previously a method for translating Ada-95 tasking
programs to ECATNets formalism (Ada-ECATNet) and we showed
that ECATNets formalism provides a more compact translation for
Ada programs compared to the other approaches based on simple
Petri nets or Colored Petri nets. We showed also previously how the
ECATNet formalism offers to Ada many validation and verification
tools like simulation, Model Checking, accessibility analysis and
static analysis. In this paper, we describe the implementation of our
translation of the Ada programs into ECATNets.
Abstract: We propose a new perspective on speech
communication using blind source separation. The original speech is
mixed with key signals which consist of the mixing matrix, chaotic
signals and a random noise. However, parts of the keys (the mixing
matrix and the random noise) are not necessary in decryption. In
practice implement, one can encrypt the speech by changing the noise
signal every time. Hence, the present scheme obtains the advantages
of a One Time Pad encryption while avoiding its drawbacks in key
exchange. It is demonstrated that the proposed scheme is immune
against traditional attacks.
Abstract: Evolvable hardware (EHW) refers to a selfreconfiguration
hardware design, where the configuration is under
the control of an evolutionary algorithm (EA). A lot of research has
been done in this area several different EA have been introduced.
Every time a specific EA is chosen for solving a particular problem,
all its components, such as population size, initialization, selection
mechanism, mutation rate, and genetic operators, should be selected
in order to achieve the best results. In the last three decade a lot of
research has been carried out in order to identify the best parameters
for the EA-s components for different “test-problems". However
different researchers propose different solutions. In this paper the
behaviour of mutation rate on (1+λ) evolution strategy (ES) for
designing logic circuits, which has not been done before, has been
deeply analyzed. The mutation rate for an EHW system modifies
values of the logic cell inputs, the cell type (for example from AND
to NOR) and the circuit output. The behaviour of the mutation has
been analyzed based on the number of generations, genotype
redundancy and number of logic gates used for the evolved circuits.
The experimental results found provide the behaviour of the mutation
rate to be used during evolution for the design and optimization of
logic circuits. The researches on the best mutation rate during the last
40 years are also summarized.
Abstract: The overriding goal of software engineering is to
provide a high quality system, application or a product. To achieve
this goal, software engineers must apply effective methods coupled
with modern tools within the context of a mature software process
[2]. In addition, it is also must to assure that high quality is realized.
Although many quality measures can be collected at the project
levels, the important measures are errors and defects. Deriving a
quality measure for reusable components has proven to be
challenging task now a days. The results obtained from the study are
based on the empirical evidence of reuse practices, as emerged from
the analysis of industrial projects. Both large and small companies,
working in a variety of business domains, and using object-oriented
and procedural development approaches contributed towards this
study. This paper proposes a quality metric that provides benefit at
both project and process level, namely defect removal efficiency
(DRE).
Abstract: This paper proposes a VPN Accelerator Board
(VPN-AB), a virtual private network (VPN) protocol designed for
trust channel security system (TCSS). TCSS supports safety
communication channel between security nodes in internet. It
furnishes authentication, confidentiality, integrity, and access control
to security node to transmit data packets with IPsec protocol. TCSS
consists of internet key exchange block, security association block,
and IPsec engine block. The internet key exchange block negotiates
crypto algorithm and key used in IPsec engine block. Security
Association blocks setting-up and manages security association
information. IPsec engine block treats IPsec packets and consists of
networking functions for communication. The IPsec engine block
should be embodied by H/W and in-line mode transaction for high
speed IPsec processing. Our VPN-AB is implemented with high speed
security processor that supports many cryptographic algorithms and
in-line mode. We evaluate a small TCSS communication environment,
and measure a performance of VPN-AB in the environment. The
experiment results show that VPN-AB gets a performance throughput
of maximum 15.645Gbps when we set the IPsec protocol with
3DES-HMAC-MD5 tunnel mode.
Abstract: This paper proposes a solution to the motion planning
and control problem of car-like mobile robots which is required to
move safely to a designated target in a priori known workspace
cluttered with swarm of boids exhibiting collective emergent
behaviors. A generalized algorithm for target convergence and
swarm avoidance is proposed that will work for any number of
swarms. The control laws proposed in this paper also ensures
practical stability of the system. The effectiveness of the proposed
control laws are demonstrated via computer simulations of an
emergent behavior.
Abstract: The objective of the paper is twofold. First, to develop a
formal framework for planning for mobile agents. A logical language
based on a temporal logic is proposed that can express a type of
tasks which often arise in network management. Second, to design a
planning algorithm for such tasks. The aim of this paper is to study
the importance of finding plans for mobile agents. Although there
has been a lot of research in mobile agents, not much work has been
done to incorporate planning ideas for such agents. This paper makes
an attempt in this direction. A theoretical study of finding plans for
mobile agents is undertaken. A planning algorithm (based on the
paradigm of mobile computing) is proposed and its space, time, and
communication complexity is analyzed. The algorithm is illustrated
by working out an example in detail.
Abstract: In this paper, we consider the problem of tracking
multiple maneuvering targets using switching multiple target motion
models. With this paper, we aim to contribute in solving the problem
of model-based body motion estimation by using data coming from
visual sensors. The Interacting Multiple Model (IMM) algorithm is
specially designed to track accurately targets whose state and/or
measurement (assumed to be linear) models changes during motion
transition. However, when these models are nonlinear, the IMM
algorithm must be modified in order to guarantee an accurate track.
In this paper we propose to avoid the Extended Kalman filter because
of its limitations and substitute it with the Unscented Kalman filter
which seems to be more efficient especially according to the
simulation results obtained with the nonlinear IMM algorithm (IMMUKF).
To resolve the problem of data association, the JPDA
approach is combined with the IMM-UKF algorithm, the derived
algorithm is noted JPDA-IMM-UKF.
Abstract: In this article, the authors reviewed and analyzed the survey materials similarities ornament proto-Turkic and northern Indians. The study examined the materials scientists - geneticists, archaeologists, anthropologists. Numerous studies of scientists from different directions once again prove the relevance of the topic. The authors approached the subject from an artistic side. The study authors have made the appropriate conclusions. This publication is based on the proceedings of the investigation.
Abstract: In this paper, a TSK-type Neuro-fuzzy Inference
System that combines the features of fuzzy sets and neural networks
has been applied for the identification of MIMO systems. The procedure of adapting parameters in TSK model employs a Shuffled
Frog Leaping Algorithm (SFLA) which is inspired from the memetic evolution of a group of frogs when seeking for food. To demonstrate
the accuracy and effectiveness of the proposed controller, two nonlinear systems have been considered as the MIMO plant, and results have been compared with other learning methods based on
Particle Swarm Optimization algorithm (PSO) and Genetic
Algorithm (GA).
Abstract: Cavitation, usually known as a destructive
phenomenon, involves turbulent unsteady two-phase flow. Having
such features, cavitating flows have been turned to a challenging
topic in numerical studies and many researches are being done for
better understanding of bubbly flows and proposing solutions to
reduce its consequent destructive effects. Aeration may be regarded
as an effective protection against cavitation erosion in many
hydraulic structures, like gated tunnels. The paper concerns
numerical simulation of flow in discharge gated tunnel of a dam
using ing RNG k -ε model coupled with the volume of fluid (VOF)
method and the zone which is susceptible of cavitation inception in
the tunnel is predicted. In the second step, a vent is considered in the
mentioned zone for aeration and the numerical simulation is done
again to study the effects of aeration. The results show that aeration
is an impressively useful method to exclude cavitation in mentioned
tunnels.
Abstract: This paper proposes an alternative control mechanism
for an interactive Pan/Tilt/Zoom (PTZ) camera control system.
Instead of using a mouse or a joystick, the proposed mechanism
utilizes a Nintendo Wii remote and infrared (IR) sensor bar. The Wii
remote has buttons that allows the user to control the movement of a
PTZ camera through Bluetooth connectivity. In addition, the Wii
remote has a built-in motion sensor that allows the user to give
control signals to the PTZ camera through pitch and roll movement.
A stationary IR sensor bar, placed at some distance away opposite the
Wii remote, enables the detection of yaw movement. In addition, the
Wii remote-s built-in IR camera has the ability to detect its spatial
position, and thus generates a control signal when the user moves the
Wii remote. Some experiments are carried out and their performances
are compared with an industry-standard PTZ joystick.