Abstract: Rotor Flux based Model Reference Adaptive System
(RF-MRAS) is the most popularly used conventional speed
estimation scheme for sensor-less IM drives. In this scheme, the
voltage model equations are used for the reference model. This
encounters major drawbacks at low frequencies/speed which leads to
the poor performance of RF-MRAS. Replacing the reference model
using Neural Network (NN) based flux estimator provides an
alternate solution and addresses such drawbacks. This paper
identifies an NN based flux estimator using Single Neuron Cascaded
(SNC) Architecture. The proposed SNC-NN model replaces the
conventional voltage model in RF-MRAS to form a novel MRAS
scheme named as SNC-NN-MRAS. Through simulation the proposed
SNC-NN-MRAS is shown to be promising in terms of all major
issues and robustness to parameter variation. The suitability of the
proposed SNC-NN-MRAS based speed estimator and its advantages
over RF-MRAS for sensor-less induction motor drives is
comprehensively presented through extensive simulations.
Abstract: This paper describes identification of the two poles
unstable SOPDT process, especially with large time delay. A new
modified relay feedback identification method for two poles unstable
SOPDT process is proposed. Furthermore, for the two poles unstable
SOPDT process, an additional Derivative controller is incorporated
parallel with relay to relax the constraint on the ratio of delay to the
unstable time constant, so that the exact model parameters of
unstable processes can be identified. To cope with measurement
noise in practice, a low pass filter is suggested to get denoised output
signal toimprove the exactness of model parameter of unstable
process. PID Lead-lag tuning formulas are derived for two poles
unstable (SOPDT) processes based on IMC principle. Simulation
example illustrates the effectiveness and the simplicity of the
proposed identification and control method.
Abstract: A new sythetic gene coding for a Human
Elastin-Like Polypeptide was constructed and expressed. The
recombinant product was tested as coating agent to realize a
surface suitable for cell growth. Coatings showed peculiar
features and different human cell lines were seeded and
cultured. All cell lines tested showed to adhere and proliferate
on this substrate that has been shown also to exert a specific
effect on cells, depending on cell type.
Abstract: The aim of this paper is to present a new
three-dimensional proportional-pursuit coupled (PP) guidance law to
track highly maneuverable aircraft. Utilizing a 3-D polar coordinate frame, the PP guidance law is formed by collecting proportional
navigation guidance in Z-R plane and pursuit guidance in X-Y plane.
Feedback linearization control method to solve the guidance
accelerations is used to implement PP guidance. In order to
compensate the actuator time delay, the time delay compensated
version of PP guidance law (CPP) was derived and proved the
effectiveness of modifying the problem of high acceleration in the final
phase of pursuit guidance and improving the weak robustness of
proportional navigation. The simulation results for intercepting Max G
turn situation show that the proposed proportional-pursuit coupled
guidance law guidance law with actuator delay compensation (CPP)
possesses satisfactory robustness and performance.
Abstract: Unmanned Aerial Vehicles (UAVs) have gained tremendous importance, in both Military and Civil, during first decade of this century. In a UAV, onboard computer (autopilot) autonomously controls the flight and navigation of the aircraft. Based on the aircraft role and flight envelope, basic to complex and sophisticated controllers are used to stabilize the aircraft flight parameters. These controllers constitute the autopilot system for UAVs. The autopilot systems, most commonly, provide lateral and longitudinal control through Proportional-Integral-Derivative (PID) controllers or Phase-lead or Lag Compensators. Various techniques are commonly used to ‘tune’ gains of these controllers. Some techniques used are, in-flight step-by-step tuning, software-in-loop or hardware-in-loop tuning methods. Subsequently, numerous in-flight tests are required to actually ‘fine-tune’ these gains. However, an optimization-based tuning of these PID controllers or compensators, as presented in this paper, can greatly minimize the requirement of in-flight ‘tuning’ and substantially reduce the risks and cost involved in flight-testing.
Abstract: Attack graph is an integral part of modeling the
overview of network security. System administrators use attack graphs to determine how vulnerable their systems are and to determine
what security measures to deploy to defend their systems. Previous methods on AGG(attack graphs generation) are aiming at
the whole network, which makes the process of AGG complex and
non-scalable. In this paper, we propose a new approach which is
simple and scalable to AGG by decomposing the whole network into atomic domains. Each atomic domain represents a host with a specific privilege. Then the process for AGG is achieved by communications
among all the atomic domains. Our approach simplifies the process
of design for the whole network, and can gives the attack graphs including each attack path for each host, and when the network changes we just carry on the operations of corresponding atomic
domains which makes the process of AGG scalable.
Abstract: In studies on psychological health and children-s personality development and in researches on emotional distresses, children-s behavioral disorders associated with mother deprivation, are known as the major cause of mental disorders. Therefore, for identification of children-s attachment styles in nursery-s children are of significant importance. For this purpose, to compare the attachment styles between children of nursery with those provided care by their families, the Separation Anxiety Test (SAT) of Slough and et al was administered on 72 children (36 in nursery and 36 family-cared). The results indicated, almost half of children in both groups have insecure attachment styles. Tendency ratio of both groups of children towards Secure and Ambivalent Insecure styles are almost the same. However the avoidant style of attachment in children of nursery is more than those provided care by their families. The children under family care compared to the children of nursery, in the situations of separation from their mothers in the first day of school and sleeping in their room, have shown more self reliance.
Abstract: In this study integral form and new recursive formulas
for Favard constants and some connected with them numeric and
Fourier series are obtained. The method is based on preliminary
integration of Fourier series which allows for establishing finite
recursive representations for the summation. It is shown that the
derived recursive representations are numerically more effective than
known representations of the considered objects.
Abstract: Urban problems are problems of organized complexity. Thus, many models and scientific methods to resolve urban problems are failed. This study is concerned with proposing of a fuzzy system driven approach for classification and solving urban problems. The proposed study investigated mainly the selection of the inputs and outputs of urban systems for classification of urban problems. In this research, five categories of urban problems, respect to fuzzy system approach had been recognized: control, polytely, optimizing, open and decision making problems. Grounded Theory techniques were then applied to analyze the data and develop new solving method for each category. The findings indicate that the fuzzy system methods are powerful processes and analytic tools for helping planners to resolve urban complex problems. These tools can be successful where as others have failed because both incorporate or address uncertainty and risk; complexity and systems interacting with other systems.
Abstract: The technique of k-anonymization has been proposed to obfuscate private data through associating it with at least k identities. This paper investigates the basic tabular structures that
underline the notion of k-anonymization using cell suppression.
These structures are studied under idealized conditions to identify the
essential features of the k-anonymization notion. We optimize data kanonymization
through requiring a minimum number of anonymized
values that are balanced over all columns and rows. We study the
relationship between the sizes of the anonymized tables, the value k, and the number of attributes. This study has a theoretical value through contributing to develop a mathematical foundation of the kanonymization
concept. Its practical significance is still to be
investigated.
Abstract: The excessive use of agricultural pesticides and the
resulting contamination of food and beds of rivers have been a
recurring problem nowadays. Some of these substances can cause
changes in endocrine balance and impair reproductive function of
human and animal population. In the present study, we evaluated the
possible effects of the fungicide cuprous copper oxide Sandoz® on
pregnant Wistar rats. They received a daily oral administration of 103
or 3.103 mg/kg of the fungicide from the 6th to the 15th day of
gestation. On day 21 of gestation, the maternal and fetal toxicity
parameters and indices were determined. The administration of
cuprous oxide (Copper Sandoz) in Wistar rats, the period of
organogenesis, revealed no evidence of maternal toxicity or embryo
at the studied doses.
Abstract: This paper proposed classification models that would
be used as a proxy for hard disk drive (HDD) functional test equitant
which required approximately more than two weeks to perform the
HDD status classification in either “Pass" or “Fail". These models
were constructed by using committee network which consisted of a
number of single neural networks. This paper also included the
method to solve the problem of sparseness data in failed part, which
was called “enforce learning method". Our results reveal that the
constructed classification models with the proposed method could
perform well in the sparse data conditions and thus the models,
which used a few seconds for HDD classification, could be used to
substitute the HDD functional tests.
Abstract: Job stress is one of the most important concepts for
the today-s corporate as well as institutional world. The current study
is conducted to identify the causes of faculty stress at Higher
Education in Pakistan. For the purpose, Public & Private Business
Schools of Punjab is selected as representative of Pakistan. A sample
of 300 faculty members (214 males, 86 females) responded to the
survey. Regression analysis shows that the Workload, Student
Related issues and Role Conflicts are the major sources contributing
significantly towards producing stress. The study also revealed that
Private sector faculty members experienced more stress as compared
to faculty in Public sector Business Schools. Moreover, females,
younger ages, lower designation & low qualification faculty
members experience more stress as compared to males, older ages,
higher designation and high qualification. The study yield many
significant results for the policy makers of Business Institutions.
Abstract: In this paper, a single period inventory model with resalable returns has been analyzed in an imprecise and uncertain mixed environment. Demand has been introduced as a fuzzy random variable. In this model, a single order is placed before the start of the selling season. The customer, for a full refund, may return purchased products within a certain time interval. Returned products are resalable, provided they arrive back before the end of the selling season and are found to be undamaged. Products remaining at the end of the season are salvaged. All demands not met directly are lost. The probabilities that a sold product is returned and that a returned product is resalable, both imprecise in a real situation, have been assumed to be fuzzy in nature.
Abstract: When dealing with safety in structures, the connections between structural components play an important role. Robustness of a structure as a whole depends both on the load- bearing capacity of the structural component and on the structures capacity to resist total failure, even though a local failure occurs in a component or a connection between components. To avoid progressive collapse it is necessary to be able to carry out a design for connections. A connection may be executed with anchors to withstand local failure of the connection in structures built with prefabricated components. For the design of these anchors, a model is developed for connections in structures performed in prefabricated autoclaved aerated concrete components. The design model takes into account the effect of anchors placed close to the edge, which may result in splitting failure. Further the model is developed to consider the effect of reinforcement diameter and anchor depth. The model is analytical and theoretically derived assuming a static equilibrium stress distribution along the anchor. The theory is compared to laboratory test, including the relevant parameters and the model is refined and theoretically argued analyzing the observed test results. The method presented can be used to improve safety in structures or even optimize the design of the connections
Abstract: Nowadays, keyless entry systems are widely adopted
for vehicle immobilizer systems due to both advantages of security and
convenience. Keyless entry systems could overcome brute-force key
guessing attack, statistics attack and masquerade attack, however,
they can't prevent from thieves stealing behavior. In this paper, we
proposed a new architecture try to improve the existent flaws. The
integration of the keyless entry system and the fingerprint
identification technology is more suitable to implement on the
portable transponder to achieve higher security needs. We also adopt
and modify AES security protocol for life expectancy and security of
the portable transponder. In addition, the identification of a driver's
fingerprint makes the service of automatic reinstatement of a driver's
preferences become possible. Our design can satisfy not only the three
kinds of previous illegal attacks, but also the stealing situation.
Furthermore, many practical factors, such as costs, life expectancy and
performance, have been well considered in the design of portable
transponder.
Abstract: In this study, the performance of a high-frequency arc
welding machine including a two-switch inverter is analyzed. The
control of the system is achieved using two different control
techniques i- fuzzy logic control (FLC) ii- state space averaging
based sliding control. Fuzzy logic control does not need accurate
mathematical model of a plant and can be used in nonlinear
applications. The second method needs the mathematical model of
the system. In this method the state space equations of the system are
derived for two different “on" and “off" states of the switches. The
derived state equations are combined with the sliding control rule
considering the duty-cycle of the converter. The performance of the
system is analyzed by simulating the system using SIMULINK tool
box of MATLAB. The simulation results show that fuzzy logic
controller is more robust and less sensitive to parameter variations.
Abstract: The present paper is a case study about exploitation of
Kheir Abad river (Khoozestan, Iran) water resources and the
problems caused by river sediments around the pumping stations.
The weak points and strong points of Boneh Basht pumping station
have been studied by experienced experts, work teams, and
consulting engineers and technical and executive solutions have been
suggested. Therefore, the suggestions of this article are based on the
performed studies and are proposed in order to evaluate the logical
solutions.
Rather complicated processes resulting from the interaction of
water flows and sediments observed at Boneh Basht pumping station
occur at other pumping stations in almost the same way. Therefore,
Boneh Basht pumping station can be selected as a sample (pilot) and
up-to-date theories and experiences can be applied to this station and
the results can be offered to other stations.
Abstract: Electronic banking must be secure and easy to use and
many banks heavily advertise an apparent of 100% secure system
which is contestable in many points. In this work, an alternative
approach to the design of e-banking system, through a new solution
for user authentication and security with digital certificate called
LumaCert is introduced. The certificate applies new algorithm for
asymmetric encryption by utilizing two mathematical operators
called Pentors and UltraPentors. The public and private key in this
algorithm represent a quadruple of parameters which are directly
dependent from the above mentioned operators. The strength of the
algorithm resides in the inability to find the respective Pentor and
UltraPentor operator from the mentioned parameters.
Abstract: This paper considers the design of a motion planner
that will simultaneously accomplish control and motion planning of a
n-link nonholonomic mobile manipulator, wherein, a n-link
holonomic manipulator is coupled with a nonholonomic mobile
platform, within an obstacle-ridden environment. This planner,
derived from the Lyapunov-based control scheme, generates
collision-free trajectories from an initial configuration to a final
configuration in a constrained environment cluttered with stationary
solid objects of different shapes and sizes. We demonstrate the
efficiency of the control scheme and the resulting acceleration
controllers of the mobile manipulator with results through computer
simulations of an interesting scenario.