Loss Analysis of Half Bridge DC-DC Converters in High-Current and Low-Voltage Applications

In this paper, half bridge DC-DC converters with transformer isolation presented in the literature are analyzed for highcurrent and low-voltage applications under the same operation conditions, and compared in terms of losses and efficiency. The conventional and improved half-bridge DC-DC converters are simulated, and current and voltage waveforms are obtained for input voltage Vdc=500V, output current IO=450A, output voltage VO=38V and switching frequency fS=20kHz. IGBTs are used as power semiconductor switches. The power losses of the semiconductor devices are calculated from current and voltage waveforms. From simulation results, it is seen that the capacitor switched half bridge converter has the best efficiency value, and can be preferred at high power and high frequency applications.

On the Perfomance of Multiband OFDM under Log-normal Channel Fading

A modified Saleh-Valenzuela channel model has been adapted for Ultra Wideband (UWB) system. The suggested realistic channel is assessed by its distribution of fading amplitude and time of arrivals. Furthermore, the propagation characteristic has been distinct into four channel models, namely CM 1 to 4. Each are differentiate in terms of cluster arrival rates, rays arrival rate within each cluster and its respective constant decay rates. This paper described the multiband OFDM system performance simulates under these multipath conditions. Simulation work described in this paper is based on WiMedia ECMA-368 standard, which has been deployed for practical implementation of low cost and low power UWB devices.

Enhanced Data Access Control of Cooperative Environment used for DMU Based Design

Through the analysis of the process digital design based on digital mockup, the fact indicates that a distributed cooperative supporting environment is the foundation conditions to adopt design approach based on DMU. Data access authorization is concerned firstly because the value and sensitivity of the data for the enterprise. The access control for administrators is often rather weak other than business user. So authors established an enhanced system to avoid the administrators accessing the engineering data by potential approach and without authorization. Thus the data security is improved.

Modernization, Malay Matrimonial Foodways and the Community Social Bonding

Solidarity and kinship has long been an intangible emblem to Malay community especially in the rural area. It is visibly seen through the dependability among each unit of the community either in religious and social events including the matrimonial or wedding. Nevertheless, the inevitable phenomenon, modernization legitimately alters every facets of human life not only the routines, traditions, rituals, norms but also to the daily activities and the specific occasion. Using triangulation approach of interview and self completed questionnaire this study empirically examine the level of alteration of Malays wedding foodways which relate to the preparation and consumption of it and its impact on the community social bonding. Some meaningful insights were obtained whereby modernization through technology (modern equipments) and social factors (education, migration, and high disposal income) significantly contribute to the alteration of wedding foodways from preparation up to consumption stages. The domino effect of this alteration consequently leads to the fragility of social kinship or somehow reduced cohesiveness and interaction among the individual of Malay society in the rural area.

Securing Justice: A Critical Analysis of Kenya-s Post 9/11 Security Apparatus

The 9/11 suicide attacks in New York, Washington, D.C., and Pennsylvania, triggered a number of security responses both in the United States of America and other Countries in the World. Kenya, which is an ally and a close partner to North America and Europe, was not left behind. While many states had been parties to numerous terrorism conventions, their response in implementing them had been slow and needed this catalyst. This special case offered a window of opportunity for many “security conscious" regimes in cementing their legal-criminological and political security apparatus. At the international level, the 9/11 case led to the hasty adoption of Security Council resolution 1373 in 2001, which called upon states to adopt wide-ranging and comprehensive steps and strategies to combat international terrorism and to become parties to the relevant international conventions and protocols relating to terrorism. Since then, Kenya has responded with speed in devising social-legal-criminological-political actions.

Proteins Length and their Phenotypic Potential

Mendelian Disease Genes represent a collection of single points of failure for the various systems they constitute. Such genes have been shown, on average, to encode longer proteins than 'non-disease' proteins. Existing models suggest that this results from the increased likeli-hood of longer genes undergoing mutations. Here, we show that in saturated mutagenesis experiments performed on model organisms, where the likelihood of each gene mutating is one, a similar relationship between length and the probability of a gene being lethal was observed. We thus suggest an extended model demonstrating that the likelihood of a mutated gene to produce a severe phenotype is length-dependent. Using the occurrence of conserved domains, we bring evidence that this dependency results from a correlation between protein length and the number of functions it performs. We propose that protein length thus serves as a proxy for protein cardinality in different networks required for the organism's survival and well-being. We use this example to argue that the collection of Mendelian Disease Genes can, and should, be used to study the rules governing systems vulnerability in living organisms.

When Explanations “Cause“ Error: A Look at Representations and Compressions

We depend upon explanation in order to “make sense" out of our world. And, making sense is all the more important when dealing with change. But, what happens if our explanations are wrong? This question is examined with respect to two types of explanatory model. Models based on labels and categories we shall refer to as “representations." More complex models involving stories, multiple algorithms, rules of thumb, questions, ambiguity we shall refer to as “compressions." Both compressions and representations are reductions. But representations are far more reductive than compressions. Representations can be treated as a set of defined meanings – coherence with regard to a representation is the degree of fidelity between the item in question and the definition of the representation, of the label. By contrast, compressions contain enough degrees of freedom and ambiguity to allow us to make internal predictions so that we may determine our potential actions in the possibility space. Compressions are explanatory via mechanism. Representations are explanatory via category. Managers are often confusing their evocation of a representation (category inclusion) as the creation of a context of compression (description of mechanism). When this type of explanatory error occurs, more errors follow. In the drive for efficiency such substitutions are all too often proclaimed – at the manager-s peril..

Instability of Soliton Solutions to the Schamel-nonlinear Schrödinger Equation

A variational method is used to obtain the growth rate of a transverse long-wavelength perturbation applied to the soliton solution of a nonlinear Schr¨odinger equation with a three-half order potential. We demonstrate numerically that this unstable perturbed soliton will eventually transform into a cylindrical soliton.

Seamless Multicast Handover in Fmipv6-Based Networks

This paper proposes a fast tree join scheme to provide seamless multicast handover in the mobile networks based on the Fast Mobile IPv6 (FMIPv6). In the existing FMIPv6-based multicast handover scheme, the bi-directional tunnelling or the remote subscription is employed with the packet forwarding from the previous access router (AR) to the new AR. In general, the remote subscription approach is preferred to the bi-directional tunnelling one, since in the remote subscription scheme we can exploit an optimized multicast path from a multicast source to many mobile receivers. However, in the remote subscription scheme, if the tree joining operation takes a long time, the amount of data packets to be forwarded and buffered for multicast handover will increase, and thus the corresponding buffer may overflow, which results in severe packet losses. In order to reduce these costs associated with packet forwarding and buffering, this paper proposes the fast join to multicast tree, in which the new AR will join the multicast tree as fast as possible, so that the new multicast data packets can also arrive at the new AR, by which the packet forwarding and buffering costs can be reduced. From numerical analysis, it is shown that the proposed scheme can give better performance than the existing FMIPv6-based multicast handover schemes in terms of the multicast packet delivery costs.

Comparison of the Effects of Three Different Types of Probiotics on the Sucrase Activities of the Small Intestine Mucosa of Broiler Chicks

An experiment was conducted to study the effects of different types of probiotic on Sucrase enzyme activity of the small intestine mucosa in male broilers. The experimental design was arranged as randomized completely blocks in 4 × 2 factorial arrangement of treatment. 180 male broilers of Ross 308 commercial hybrid were designated into 4 groups. Three replicates of 15 birds were assigned to each treatment. Control treatments (diet contained no probiotic) were fed according to the NRC as base diet and three treatment groups were fed from the same diet plus three different types of probiotics. Birds were slaughtered after 21 and 42 days and different segments of small intestine (at 1,10,30,50,70 and 90% of total length the small intestine) were taken from each replicates (N=2) Sucrase enzyme activities were measured and recorded. Obtained data were analyzed by Spss (P

Representation of Coloured Petri Net in Abductive Logic Programming (CPN-LP) and Its Application in Modeling an Intelligent Agent

Coloured Petri net (CPN) has been widely adopted in various areas in Computer Science, including protocol specification, performance evaluation, distributed systems and coordination in multi-agent systems. It provides a graphical representation of a system and has a strong mathematical foundation for proving various properties. This paper proposes a novel representation of a coloured Petri net using an extension of logic programming called abductive logic programming (ALP), which is purely based on classical logic. Under such a representation, an implementation of a CPN could be directly obtained, in which every inference step could be treated as a kind of equivalence preserved transformation. We would describe how to implement a CPN under such a representation using common meta-programming techniques in Prolog. We call our framework CPN-LP and illustrate its applications in modeling an intelligent agent.

Thematic Role Extraction Using Shallow Parsing

Extracting thematic (semantic) roles is one of the major steps in representing text meaning. It refers to finding the semantic relations between a predicate and syntactic constituents in a sentence. In this paper we present a rule-based approach to extract semantic roles from Persian sentences. The system exploits a twophase architecture to (1) identify the arguments and (2) label them for each predicate. For the first phase we developed a rule based shallow parser to chunk Persian sentences and for the second phase we developed a knowledge-based system to assign 16 selected thematic roles to the chunks. The experimental results of testing each phase are shown at the end of the paper.

Concurrent Testing of ADC for Embedded System

Compaction testing methods allow at-speed detecting of errors while possessing low cost of implementation. Owing to this distinctive feature, compaction methods have been widely used for built-in testing, as well as external testing. In the latter case, the bandwidth requirements to the automated test equipment employed are relaxed which reduces the overall cost of testing. Concurrent compaction testing methods use operational signals to detect misbehavior of the device under test and do not require input test stimuli. These methods have been employed for digital systems only. In the present work, we extend the use of compaction methods for concurrent testing of analog-to-digital converters. We estimate tolerance bounds for the result of compaction and evaluate the aliasing rate.

Study about the Development of Small Towns in the Metropolitan Fringe in Developed Area of China–A Case Study of Sandun Town in Hangzhou

Due to the Rapid Urbanization in China, the influence of metropolises to surrounding areas grows by a tremendous speed in developed region. One of the most obvious influences is the expansion of the urban built-up areas which covers the land belongs to small towns. Around metropolitan fringe, the boundary between city and village becomes more and more obscure. So being the most sensitive area, the small towns on the fringe of metropolises have the special meaning on the research into the small towns- development. This paper chooses Sandun Town in Hangzhou of Zhejiang Province as an example, emphatically focus on aspects such as the central area proliferation, the industrial shift, the position effect, the subway effect and the commercial development, reviews a few problems of small towns in the future and the important problems in their planning by the analysis of the characteristics of the present conditions and the developing motive mechanism, so that guides small towns to develop properly by liking with these small towns and center metropolises.

Numerical Optimization Design of PEM Fuel Cell Performance Applying the Taguchi Method

The purpose of this paper is applied Taguchi method on the optimization for PEMFC performance, and a representative Computational Fluid Dynamics (CFD) model is selectively performed for statistical analysis. The studied factors in this paper are pressure of fuel cell, operating temperature, the relative humidity of anode and cathode, porosity of gas diffusion electrode (GDE) and conductivity of GDE. The optimal combination for maximum power density is gained by using a three-level statistical method. The results confirmed that the robustness of the optimum design parameters influencing the performance of fuel cell are founded by pressure of fuel cell, 3atm; operating temperature, 353K; the relative humidity of anode, 50%; conductivity of GDE, 1000 S/m, but the relative humidity of cathode and porosity of GDE are pooled as error due to a small sum of squares. The present simulation results give designers the ideas ratify the effectiveness of the proposed robust design methodology for the performance of fuel cell.

Recognition and Reconstruction of Partially Occluded Objects

A new automatic system for the recognition and re¬construction of resealed and/or rotated partially occluded objects is presented. The objects to be recognized are described by 2D views and each view is occluded by several half-planes. The whole object views and their visible parts (linear cuts) are then stored in a database. To establish if a region R of an input image represents an object possibly occluded, the system generates a set of linear cuts of R and compare them with the elements in the database. Each linear cut of R is associated to the most similar database linear cut. R is recognized as an instance of the object 0 if the majority of the linear cuts of R are associated to a linear cut of views of 0. In the case of recognition, the system reconstructs the occluded part of R and determines the scale factor and the orientation in the image plane of the recognized object view. The system has been tested on two different datasets of objects, showing good performance both in terms of recognition and reconstruction accuracy.

The Response of Winter Wheat to Flooding

The effect of flooding can be a serious problem for wheat farmers, even at dry land condition. Amount of flooding damage depends on duration flooding, developmental stage, wheat type and variety. Therefore as a factorial experiment in randomized complete design based on winter bread wheat cultivars (Pishtaz, Marvdasht, Shiraz, Zarin, Shahriar, C-81-4, Sardari, Agosta seed, FGS and Azar2) at stages (Non- flooding stress, flooding at tillering and stem elongation stages for 15 days) carried out in Faculty of Agriculture, Razi University, Kermanshah, Iran. During flooding, soil environment of plant roots were water saturated. Analysis of variance showed that flooding had a significant effect on the number of grains per spike, grain weight per spike and a grain weight. Hence flooding reduces the number of grain per spike between 27.1 to 42.5 percent, grain weight per spike between 34.7 to 54.4 percent and single grain weight between 12.1 to 15.1 percent. Effects of flooding at the tillering stage reduced higher than stem elongation stage on studied traits. The result also showed that flooding at tillering stage delayed spikelet primordial and floret. Between wheat cultivars was significant for traits, but were different reactions. "Shiraz", "Zarin" and "Shahriar" had the most no. grain per spike, but "Zarin" and "Sardari" had the most grain weight per spike and single grain weight, respectively. Also, interaction between start of flooding and cultivar was significant.

Weight Functions for Signal Reconstruction Based On Level Crossings

Although the level crossing concept has been the subject of intensive investigation over the last few years, certain problems of great interest remain unsolved. One of these concern is distribution of threshold levels. This paper presents a new threshold level allocation schemes for level crossing based on nonuniform sampling. Intuitively, it is more reasonable if the information rich regions of the signal are sampled finer and those with sparse information are sampled coarser. To achieve this objective, we propose non-linear quantization functions which dynamically assign the number of quantization levels depending on the importance of the given amplitude range. Two new approaches to determine the importance of the given amplitude segment are presented. The proposed methods are based on exponential and logarithmic functions. Various aspects of proposed techniques are discussed and experimentally validated. Its efficacy is investigated by comparison with uniform sampling.

A Virtual Simulation Environment for a Design and Verification of a GPGPU

When a small H/W IP is designed, we can develop an appropriate verification environment by observing the simulated signal waves, or using the serial test vectors for the fixed output. In the case of design and verification of a massive parallel processor with multiple IPs, it-s difficult to make a verification system with existing common verification environment, and to verify each partial IP. A TestDrive verification environment can build easy and reliable verification system that can produce highly intuitive results by applying Modelsim and SystemVerilog-s DPI. It shows many advantages, for example a high-level design of a GPGPU processor design can be migrate to FPGA board immediately.

A Parametric Study on Lateral Torsional Buckling of European IPN and IPE Cantilevers

IPN and IPE sections, which are commonly used European I shapes, are widely used in steel structures as cantilever beams to support overhangs. A considerable number of studies exist on calculating lateral torsional buckling load of I sections. However, most of them provide series solutions or complex closed-form equations. In this paper, a simple equation is presented to calculate lateral torsional buckling load of IPN and IPE section cantilever beams. First, differential equation of lateral torsional buckling is solved numerically for various loading cases. Then a parametric study is conducted on results to present an equation for lateral torsional buckling load of European IPN and IPE beams. Finally, results obtained by presented equation are compared to differential equation solutions and finite element model results. ABAQUS software is utilized to generate finite element models of beams. It is seen that the results obtained from presented equation coincide with differential equation solutions and ABAQUS software results. It can be suggested that presented formula can be safely used to calculate critical lateral torsional buckling load of European IPN and IPE section cantilevers.