Abstract: In the closed quantum system, if the control system is
strongly regular and all other eigenstates are directly coupled to the
target state, the control system can be asymptotically stabilized at the
target eigenstate by the Lyapunov control based on the state error.
However, if the control system is not strongly regular or as long as
there is one eigenstate not directly coupled to the target state, the
situations will become complicated. In this paper, we propose an
implicit Lyapunov control method based on the state error to solve the
convergence problems for these two degenerate cases. And at the same
time, we expand the target state from the eigenstate to the arbitrary
pure state. Especially, the proposed method is also applicable in the
control system with multi-control Hamiltonians. On this basis, the
convergence of the control systems is analyzed using the LaSalle
invariance principle. Furthermore, the relation between the implicit
Lyapunov functions of the state distance and the state error is
investigated. Finally, numerical simulations are carried out to verify
the effectiveness of the proposed implicit Lyapunov control method.
The comparisons of the control effect using the implicit Lyapunov
control method based on the state distance with that of the state error
are given.
Abstract: This article is based on the technique which is called
Discrete Parameter Tracking (DPT). First introduced by A. A. Azab
[8] which is applicable for less order reference model. The order of
the reference model is (n-l) and n is the number of the adjustable
parameters in the physical plant.
The technique utilizes a modified gradient method [9] where the
knowledge of the exact order of the nonadaptive system is not
required, so, as to eliminate the identification problem. The
applicability of the mentioned technique (DPT) was examined
through the solution of several problems.
This article introduces the solution of a third order system with
three adjustable parameters, controlled according to second order
reference model. The adjustable parameters have great initial error
which represent condition.
Computer simulations for the solution and analysis are provided
to demonstrate the simplicity and feasibility of the technique.
Abstract: The analytical solution of functionally graded
piezoelectric hollow cylinder which is under radial electric potential
and non-axisymmetric thermo-mechanical loads, are presented in this
paper. Using complex Fourier series and estimation of power law for
variations of material characterizations through the thickness, the
electro thermo mechanical behavior of the FGPM cylinder is
obtained. The stress and displacement distributions and the effect of
electric potential field on the cylinder behavior are also presented and
some applicable results are offered at the end of the paper.
Abstract: In this paper, some practical solid transportation models are formulated considering per trip capacity of each type of conveyances with crisp and rough unit transportation costs. This is applicable for the system in which full vehicles, e.g. trucks, rail coaches are to be booked for transportation of products so that transportation cost is determined on the full of the conveyances. The models with unit transportation costs as rough variables are transformed into deterministic forms using rough chance constrained programming with the help of trust measure. Numerical examples are provided to illustrate the proposed models in crisp environment as well as with unit transportation costs as rough variables.
Abstract: The evaluation of residual reliability of large sized
parallel computer interconnection systems is not practicable with
the existing methods. Under such conditions, one must go for
approximation techniques which provide the upper bound and lower
bound on this reliability. In this context, a new approximation method
for providing bounds on residual reliability is proposed here. The
proposed method is well supported by two algorithms for simulation
purpose. The bounds on residual reliability of three different categories
of interconnection topologies are efficiently found by using
the proposed method
Abstract: A 2-Degrees of freedom powered prosthetic wrist
actuator has been proposed that can provide the Abduction/Adduction
& Flexion/Extension movements of the human wrist. The basic
structure of the actuator is a Ball and Socket joint and the force is
transmitted from the DC geared servo motors to the joint through the
Bowden cables. The proposed design is capable of providing the
required DOF in both axes i.e. 85° & 90° in flexion extension axis.
The size and weight of the actuator lies within the ranges of an
average human being-s wrist.
Abstract: This paper is introduced a modification to Diffie-
Hellman protocol to be applicable on the decimal numbers, which
they are the numbers between zero and one. For this purpose we
extend the theory of the congruence. The new congruence is over
the set of the real numbers and it is called the “real congruence"
or the “real modulus". We will refer to the existing congruence by
the “integer congruence" or the “integer modulus". This extension
will define new terms and redefine the existing terms. As the
properties and the theorems of the integer modulus are extended as
well. Modified Diffie-Hellman key exchange protocol is produced a
sharing, secure and decimal secret key for the the cryptosystems that
depend on decimal numbers.
Abstract: Tourism and coastal lines are the business sectors
since centuries especially in the European Nations and Albania is one
such spots. However, in recent decades tourism is experienced as
vulnerability of the surrounding ecological conditions of air, soil,
water, land and the communities that are dependant and sharing the
ecosystem among flora and fauna. Experts opine that apart from the
maintenance of near-originality of ecological biodiversity the tourism
rather known as ecotourism an indigenous socio-cultural
maintenance of indigenous/traditional knowledge of the local people
must be well cared in order to sustain on sustainable grounds. As a
general tendency, growth of tourism has been affected by the deterioration in the economic conditions on one aspect and unsustainable ecological areas affected since human interventions
earlier to this has negative impact on futuristic tourist spots. However, tourism in Albania as of now is 11% of GDP and coastal regions accounting to 2-4%. An amicable Mediterranean
climate with 300 sunny days similar parameters of Greece and Spain
throws up sustainable ecotourism in future decades provided public services namely, transportation, road safety, lodging, food
availability, recreational regiments, banking accessibility are as per
the World Tourism Organizations- protocols. Thus as of Albanian
situation, classification of ecotourism activities to safe-guard the localities with its maintenance of ecological land, water and climate
has become a paramount importance with a wanting and satisfactory options through harnessing human energy for profit and fitness of
ecological flora and fauna. A check on anthropogenic wastes and
their safer utilizations inclusive of agricultural and industrial
operations in line with Lalzi Bay Coastal Line are of utmost importance for the reason that the Adriatic Sea Coast is the one long
stretch of Albanian Lifeline. The present work is based on the methodology of the sustainable management of the same issue.
Abstract: Serious games have proven to be a useful instrument
to engage learners and increase motivation. Nevertheless, a broadly
accepted, practical instructional design approach to serious games
does not exist. In this paper, we introduce the use of an instructional
design model that has not been applied to serious games yet, and has
some advantages compared to other design approaches. We present
the case of mechanics mechatronics education to illustrate the close
match with timing and role of knowledge and information that the
instructional design model prescribes and how this has been
translated to a rigidly structured game design. The structured
approach answers the learning needs of applicable knowledge within
the target group. It combines advantages of simulations with
strengths of entertainment games to foster learner-s motivation in the
best possible way. A prototype of the game will be evaluated along a
well-respected evaluation method within an advanced test setting
including test and control group.
Abstract: This paper investigates the effectiveness of the use of
seismic isolation devices on the overall 3D seismic response of
curved highway viaducts with an emphasis on expansion joints.
Furthermore, an evaluation of the effectiveness of the use of cable
restrainers is presented. For this purpose, the bridge seismic
performance has been evaluated on four different radii of curvature,
considering two cases: restrained and unrestrained curved viaducts.
Depending on the radius of curvature, three-dimensional non-linear
dynamic analysis shows the vulnerability of curved viaducts to
pounding and deck unseating damage. In this study, the efficiency of
using LRB supports combined with cable restrainers on curved
viaducts is demonstrated, not only by reducing in all cases the
possible damage, but also by providing a similar behavior in the
viaducts despite of curvature radius.
Abstract: In this paper, we present a framework to determine Haar solutions of Bratu-type equations that are widely applicable in fuel ignition of the combustion theory and heat transfer. The method is proposed by applying Haar series for the highest derivatives and integrate the series. Several examples are given to confirm the efficiency and the accuracy of the proposed algorithm. The results show that the proposed way is quite reasonable when compared to exact solution.
Abstract: When the profile information of an existing road is
missing or not up-to-date and the parameters of the vertical
alignment are needed for engineering analysis, the engineer has to recreate
the geometric design features of the road alignment using
collected profile data. The profile data may be collected using
traditional surveying methods, global positioning systems, or digital
imagery. This paper develops a method that estimates the parameters
of the geometric features that best characterize the existing vertical
alignments in terms of tangents and the expressions of the curve, that
may be symmetrical, asymmetrical, reverse, and complex vertical
curves. The method is implemented using an Excel-based
optimization method that minimizes the differences between the
observed profile and the profiles estimated from the equations of the
vertical curve. The method uses a 'wireframe' representation of the
profile that makes the proposed method applicable to all types of
vertical curves. A secondary contribution of this paper is to introduce
the properties of the equal-arc asymmetrical curve that has been
recently developed in the highway geometric design field.
Abstract: Finger spelling is an art of communicating by signs
made with fingers, and has been introduced into sign language to serve
as a bridge between the sign language and the verbal language.
Previous approaches to finger spelling recognition are classified into
two categories: glove-based and vision-based approaches. The
glove-based approach is simpler and more accurate recognizing work
of hand posture than vision-based, yet the interfaces require the user to
wear a cumbersome and carry a load of cables that connected the
device to a computer. In contrast, the vision-based approaches provide
an attractive alternative to the cumbersome interface, and promise
more natural and unobtrusive human-computer interaction. The
vision-based approaches generally consist of two steps: hand
extraction and recognition, and two steps are processed independently.
This paper proposes real-time vision-based Korean finger spelling
recognition system by integrating hand extraction into recognition.
First, we tentatively detect a hand region using CAMShift algorithm.
Then fill factor and aspect ratio estimated by width and height
estimated by CAMShift are used to choose candidate from database,
which can reduce the number of matching in recognition step. To
recognize the finger spelling, we use DTW(dynamic time warping)
based on modified chain codes, to be robust to scale and orientation
variations. In this procedure, since accurate hand regions, without
holes and noises, should be extracted to improve the precision, we use
graph cuts algorithm that globally minimize the energy function
elegantly expressed by Markov random fields (MRFs). In the
experiments, the computational times are less than 130ms, and the
times are not related to the number of templates of finger spellings in
database, as candidate templates are selected in extraction step.
Abstract: Company strategy expresses a basic idea of how to reach company objectives. A whole range of models of strategic management are used in practice. The concept of strategic management should fulfill some basic requirements to make it applicable for both the typical, but also more specific company environment. The financial strategy plays an important role in corporate strategy. The paper develops a methodology of strategic model implementing into the category of micro, small and medium-sized enterprises (SMEs). Furthermore, the methodology recommends procedures while solving an up-to-date worldwide task of the definition of the company strategy and its financial strategy.
Abstract: In this paper, we propose an improved 3D star skeleton
technique, which is a suitable skeletonization for human posture representation
and reflects the 3D information of human posture.
Moreover, the proposed technique is simple and then can be performed
in real-time. The existing skeleton construction techniques, such as
distance transformation, Voronoi diagram, and thinning, focus on the
precision of skeleton information. Therefore, those techniques are not
applicable to real-time posture recognition since they are computationally
expensive and highly susceptible to noise of boundary. Although
a 2D star skeleton was proposed to complement these problems,
it also has some limitations to describe the 3D information of the
posture. To represent human posture effectively, the constructed skeleton
should consider the 3D information of posture. The proposed 3D
star skeleton contains 3D data of human, and focuses on human action
and posture recognition. Our 3D star skeleton uses the 8 projection
maps which have 2D silhouette information and depth data of human
surface. And the extremal points can be extracted as the features of 3D
star skeleton, without searching whole boundary of object. Therefore,
on execution time, our 3D star skeleton is faster than the “greedy" 3D
star skeleton using the whole boundary points on the surface. Moreover,
our method can offer more accurate skeleton of posture than the
existing star skeleton since the 3D data for the object is concerned.
Additionally, we make a codebook, a collection of representative 3D
star skeletons about 7 postures, to recognize what posture of constructed
skeleton is.
Abstract: Equations with differentials relating to the inverse of an unknown function rather than to the unknown function itself are solved exactly for some special cases and numerically for the general case. Invertibility combined with differentiability over connected domains forces solutions always to be monotone. Numerical function inversion is key to all solution algorithms which either are of a forward type or a fixed point type considering whole approximate solution functions in each iteration. The given considerations are restricted to ordinary differential equations with inverted functions (ODEIs) of first order. Forward type computations, if applicable, admit consistency of order one and, under an additional accuracy condition, convergence of order one.
Abstract: For a generalized Hermite sinosiodal / hyperbolic Gaussian beam passing through an ABCD system with a finite aperture, the propagation properties are derived using the Collins integral. The results are obtained in the form of intensity graphs indicating that previously demonstrated rules of reciprocity are applicable, while the existence of the aperture accelerates this transformation.
Abstract: Fuzzy fingerprint vault is a recently developed cryptographic construct based on the polynomial reconstruction problem to secure critical data with the fingerprint data. However, the previous researches are not applicable to the fingerprint having a few minutiae since they use a fixed degree of the polynomial without considering the number of fingerprint minutiae. To solve this problem, we use an adaptive degree of the polynomial considering the number of minutiae extracted from each user. Also, we apply multiple polynomials to avoid the possible degradation of the security of a simple solution(i.e., using a low-degree polynomial). Based on the experimental results, our method can make the possible attack difficult 2192 times more than using a low-degree polynomial as well as verify the users having a few minutiae.
Abstract: This paper presents the experimental results on effect of applied voltage stress frequency to the occurrence of electrical treeing in 22 kV cross linked polyethylene (XLPE) insulated cable.Hallow disk of XLPE insulating material with thickness 5 mm taken from unused high voltage cable was used as the specimen in this study. Stainless steel needle was inserted gradually into the specimen to give a tip to earth plane electrode separation of 2.50.2 mm at elevated temperature 105-110°C. The specimen was then annealed for 5 minute to minimize any mechanical stress build up around the needle-plane region before it was cooled down to room temperature. Each specimen were subjected to the same applied voltage stress level at 8 kV AC rms, with various frequency, 50, 100, 500, 1000 and 2000 Hz. Initiation time, propagation speed and pattern of electrical treeing were examined in order to study the effect of applied voltage stress frequency. By the experimental results, initial time of visible treeing decreases with increasing in applied voltage frequency. Also, obviously, propagation speed of electrical treeing increases with increasing in applied voltage frequency.Furthermore, two types of electrical treeing, bush-like and branch-like treeing were observed.The experimental results confirmed the effect of voltage stress frequency as well.
Abstract: This paper describes the study of cryptographic hash functions, one of the most important classes of primitives used in recent techniques in cryptography. The main aim is the development of recent crypt analysis hash function. We present different approaches to defining security properties more formally and present basic attack on hash function. We recall Merkle-Damgard security properties of iterated hash function. The Main aim of this paper is the development of recent techniques applicable to crypt Analysis hash function, mainly from SHA family. Recent proposed attacks an MD5 & SHA motivate a new hash function design. It is designed not only to have higher security but also to be faster than SHA-256. The performance of the new hash function is at least 30% better than that of SHA-256 in software. And it is secure against any known cryptographic attacks on hash functions.