Abstract: The challenge in the swing-up problem of double
inverted pendulum on a cart (DIPC) is to design a controller that
bring all DIPC's states, especially the joint angles of the two links,
into the region of attraction of the desired equilibrium. This paper
proposes a new method to swing-up DIPC based on a series of restto-
rest maneuvers of the first link about its vertically upright
configuration while holding the cart fixed at the origin. The rest-torest
maneuvers are designed such that each one results in a net gain
in energy of the second link. This results in swing-up of DIPC-s
configuration to the region of attraction of the desired equilibrium. A
three-step algorithm is provided for swing-up control followed by the
stabilization step. Simulation results with a comparison to an
experimental work done in the literature are presented to demonstrate
the efficacy of the approach.
Abstract: In today scenario, to meet enhanced demand imposed
by domestic, commercial and industrial consumers, various
operational & control activities of Radial Distribution Network
(RDN) requires a focused attention. Irrespective of sub-domains
research aspects of RDN like network reconfiguration, reactive
power compensation and economic load scheduling etc, network
performance parameters are usually estimated by an iterative process
and is commonly known as load (power) flow algorithm. In this
paper, a simple mechanism is presented to implement the load flow
analysis (LFA) algorithm. The reported algorithm utilizes graph
theory principles and is tested on a 69- bus RDN.
Abstract: This paper presents an efficient approach to feeder
reconfiguration for power loss reduction and voltage profile
imprvement in unbalanced radial distribution systems (URDS). In
this paper Genetic Algorithm (GA) is used to obtain solution for
reconfiguration of radial distribution systems to minimize the losses.
A forward and backward algorithm is used to calculate load flows in
unbalanced distribution systems. By simulating the survival of the
fittest among the strings, the optimum string is searched by
randomized information exchange between strings by performing
crossover and mutation. Results have shown that proposed algorithm
has advantages over previous algorithms The proposed method is
effectively tested on 19 node and 25 node unbalanced radial
distribution systems.
Abstract: This work presents a new approach of securing a
wireless network. The configuration is focused on securing &
Protecting wireless network traffic for a small network such as a
home or dorm room. The security Mechanism provided both
authentication, allowing only known authorized users access to the
wireless network, and encryption, preventing anyone from reading
the wireless traffic. The mentioned solution utilizes the open source
free S/WAN software which implements the Internet Protocol
Security –IPSEC. In addition to wireless components, wireless NIC
in PC and wireless access point needs a machine running Linux to act
as security gateway. While the current configuration assumes that the
wireless PC clients are running Linux, Windows XP/VISTA/7 based
machines equipped with VPN software which will allow to interface
with this configuration.
Abstract: In IETF RFC 2002, Mobile-IP was developed to
enable Laptobs to maintain Internet connectivity while moving
between subnets. However, the packet loss that comes from
switching subnets arises because network connectivity is lost while
the mobile host registers with the foreign agent and this encounters
large end-to-end packet delays. The criterion to initiate a simple and
fast full-duplex connection between the home agent and foreign
agent, to reduce the roaming duration, is a very important issue to be
considered by a work in this paper. State-transition Petri-Nets of the
modeling scenario-based CIA: communication inter-agents procedure
as an extension to the basic Mobile-IP registration process was
designed and manipulated to describe the system in discrete events.
The heuristic of configuration file during practical Setup session for
registration parameters, on Cisco platform Router-1760 using IOS
12.3 (15)T and TFTP server S/W is created. Finally, stand-alone
performance simulations from Simulink Matlab, within each subnet
and also between subnets, are illustrated for reporting better end-toend
packet delays. Results verified the effectiveness of our Mathcad
analytical manipulation and experimental implementation. It showed
lower values of end-to-end packet delay for Mobile-IP using CIA
procedure-based early registration. Furthermore, it reported packets
flow between subnets to improve losses between subnets.
Abstract: Multi-Radio Multi-Channel Wireless Mesh Networks (MRMC-WMNs) operate at the backbone to access and route high volumes of traffic simultaneously. Such roles demand high network capacity, and long “online" time at the expense of accelerated transmission energy depletion and poor connectivity. This is the problem of transmission power control. Numerous power control methods for wireless networks are in literature. However, contributions towards MRMC configurations still face many challenges worth considering. In this paper, an energy-efficient power selection protocol called PMMUP is suggested at the Link-Layer. This protocol first divides the MRMC-WMN into a set of unified channel graphs (UCGs). A UCG consists of multiple radios interconnected to each other via a common wireless channel. In each UCG, a stochastic linear quadratic cost function is formulated. Each user minimizes this cost function consisting of trade-off between the size of unification states and the control action. Unification state variables come from independent UCGs and higher layers of the protocol stack. The PMMUP coordinates power optimizations at the network interface cards (NICs) of wireless mesh routers. The proposed PMMUP based algorithm converges fast analytically with a linear rate. Performance evaluations through simulations confirm the efficacy of the proposed dynamic power control.
Abstract: The design of Class A and Class AB 2-stage X band
Power Amplifier is described in this report. This power amplifier is
part of a transceiver used in radar for monitoring iron characteristics
in a blast furnace. The circuit was designed using foundry WIN
Semiconductors. The specification requires 15dB gain in the linear
region, VSWR nearly 1 at input as well as at the output, an output
power of 10 dBm and good stable performance in the band 10.9-12.2
GHz. The design was implemented by using inter-stage
configuration, the Class A amplifier was chosen for driver stage i.e.
the first amplifier focusing on the gain and the output amplifier
conducted at Class AB with more emphasis on output power.
Abstract: Virtualization and high performance computing have been discussed from a performance perspective in recent publications. We present and discuss a flexible and efficient approach to the management of virtual clusters. A virtual machine management tool is extended to function as a fabric for cluster deployment and management. We show how features such as saving the state of a running cluster can be used to avoid disruption. We also compare our approach to the traditional methods of cluster deployment and present benchmarks which illustrate the efficiency of our approach.
Abstract: This paper aims at numerically analysing the effect
of an active flow control (AFC) by a vortex generator jet (VGJ)
submerged in a boundary layer via Chimera Grids and Detached-
Eddy Simulation (DES). The performance of DES results are
judged against Reynolds-Averaged Navier-Stokes (RANS) and
compared with the experiments that showed an unsteady vortex
motion downstream of VGJ. Experimental results showed that
the mechanism of embedding logitudinal vortex structure in the
main stream flow is quite effective in increasing the near wall
momentum of separated aircraft wing. In order to simulate such
a flow configuration together with the VGJ, an efficient numerical
approach is required. This requirement is fulfilled by performing
the DES simulation over the flat plate using the DLR TAU Code.
The DES predictions identify the vortex region via smooth hybrid
length scale and predict the unsteady vortex motion observed in
the experiments. The DES results also showed that the sufficient
grid refinement in the vortex region resolves the turbulent scales
downstream of the VGJ, the spatial vortex core postion and nondimensional
momentum coefficient RVx .
Abstract: This paper describes a computer model of Quantum Field Theory (QFT), referred to in this paper as QTModel. After specifying the initial configuration for a QFT process (e.g. scattering) the model generates the possible applicable processes in terms of Feynman diagrams, the equations for the scattering matrix, and evaluates probability amplitudes for the scattering matrix and cross sections. The computations of probability amplitudes are performed numerically. The equations generated by QTModel are provided for demonstration purposes only. They are not directly used as the base for the computations of probability amplitudes. The computer model supports two modes for the computation of the probability amplitudes: (1) computation according to standard QFT, and (2) computation according to a proposed functional interpretation of quantum theory.
Abstract: Vertex configuration for a vertex in an orthogonal
pseudo-polyhedron is an identity of a vertex that is determined by the
number of edges, dihedral angles, and non-manifold properties
meeting at the vertex. There are up to sixteen vertex configurations
for any orthogonal pseudo-polyhedron (OPP). Understanding the
relationship between these vertex configurations will give us insight
into the structure of an OPP and help us design better algorithms for
many 3-dimensional geometric problems. In this paper, 16 vertex
configurations for OPP are described first. This is followed by a
number of formulas giving insight into the relationship between
different vertex configurations in an OPP. These formulas
will be useful as an extension of orthogonal polyhedra usefulness on
pattern analysis in 3D-digital images.
Abstract: A solar powered air heating system using one ended evacuated tubes is experimentally investigated. A solar air heater containing forty evacuated tubes is used for heating purpose. The collector surface area is about 4.44 m2. The length and outer diameters of the outer glass tube and absorber tube are 1500, 47 and 37 mm, respectively. In this experimental setup, we have a header (heat exchanger) of square shape (190 mm x 190 mm). The length of header is 1500 mm. The header consists of a hollow pipe in the center whose diameter is 60 mm through which the air is made to flow. The experimental setup contains approximately 108 liters of water. Water is working as heat collecting medium which collects the solar heat falling on the tubes. This heat is delivered to the air flowing through the header pipe. This heat flow is due to natural convection and conduction. The outlet air temperature depends upon several factors along with air flow rate and solar radiation intensity. The study has been done for both up-flow and down-flow of air in header in similar weather conditions, at different flow rates. In the present investigations the study has been made to find the effect of intensity of solar radiations and flow rate of air on the out let temperature of the air with time and which flow is more efficient. The obtained results show that the system is highly effective for the heating in this region. Moreover, it has been observed that system is highly efficient for the particular flow rate of air. It was also observed that downflow configuration is more effective than up-flow condition at all flow rates due to lesser losses in down-flow. The results show that temperature differences of upper head and lower head, both of water and surface of pipes on the respective ends is lower in down-flow.
Abstract: IPsec has now become a standard information security
technology throughout the Internet society. It provides a well-defined
architecture that takes into account confidentiality, authentication,
integrity, secure key exchange and protection mechanism against
replay attack also. For the connectionless security services on packet
basis, IETF IPsec Working Group has standardized two extension
headers (AH&ESP), key exchange and authentication protocols. It is
also working on lightweight key exchange protocol and MIB's for
security management. IPsec technology has been implemented on
various platforms in IPv4 and IPv6, gradually replacing old
application-specific security mechanisms. IPv4 and IPv6 are not
directly compatible, so programs and systems designed to one
standard can not communicate with those designed to the other. We
propose the design and implementation of controlled Internet security
system, which is IPsec-based Internet information security system in
IPv4/IPv6 network and also we show the data of performance
measurement. With the features like improved scalability and
routing, security, ease-of-configuration, and higher performance of
IPv6, the controlled Internet security system provides consistent
security policy and integrated security management on IPsec-based
Internet security system.
Abstract: Chatter vibration has been a troublesome problem
for a machine tool toward the high precision and high speed machining.
Essentially, the machining performance is determined by the dynamic
characteristics of the machine tool structure and dynamics of cutting
process, which can further be identified in terms of the stability lobe
diagram. Therefore, realization on the machine tool dynamic behavior
can help to enhance the cutting stability. To assess the dynamic
characteristics and machining stability of a vertical milling system
under the influence of a linear guide, this study developed a finite
element model integrated the modeling of linear components with the
implementation of contact stiffness at the rolling interface. Both the
finite element simulations and experimental measurements reveal that
the linear guide with different preload greatly affects the vibration
behavior and milling stability of the vertical column spindle head
system, which also clearly indicate that the predictions of the
machining stability agree well with the cutting tests. It is believed that
the proposed model can be successfully applied to evaluate the
dynamics performance of machine tool systems of various
configurations.
Abstract: Higher capacities of power plants together with
increased awareness on environmental considerations have led to
taller height of stacks. It is seen that strong wind can result in falling
of stacks. So, aerodynamic consideration of stacks is very important
in order to save the falling of stacks. One stack is not enough in
industries and power sectors and two or three stacks are required for
proper operation of the unit. It is very important to arrange the stacks
in proper way to resist their downfall. The present experimental
study concentrates on the mutual effect of three nearby stacks on
each other at three different arrangements, viz. linear, side-by-side
and triangular. The experiments find out the directions of resultant
forces acting on the stacks in different configurations so that proper
arrangement of supports can be made with respect to the wind
directionality obtained from local meteorological data. One can also
easily ascertain which stack is more vulnerable to wind in
comparison to the others for a particular configuration. Thus, this
study is important in studying the effect of wind force on three stacks
in different arrangements and is very helpful in placing the supports
in proper places in order to avoid failing of stack-like structures due
to wind.
Abstract: In this research paper, a slotted coaxial line fed cross
dipole excitation structure for short backfire antenna is proposed and
developed to achieve reconfigurable circular polarization. The cross
dipole, which is fed by the slotted coaxial line, consists of two
orthogonal dipoles. The dipoles are mounted on the outer conductor
of the coaxial line. A unique technique is developed to generate
reconfigurable circular polarization using cross dipole configuration.
The sub-reflector is supported by the feed line, thus requiring no
extra support. The antenna is developed on elliptical ground plane
with dielectric rim making antenna compact. It is demonstrated that
cross dipole excited short backfire antenna can achieve voltage
standing wave ratio (VSWR) bandwidth of 14.28% for 2:1 VSWR,
axial ratio of 0.2 dB with axial ratio (≤ 3dB) bandwidth of 2.14% and
a gain of more than 12 dBi. The experimental results for the designed
antenna structure are in close agreement with computer simulations.
Abstract: Palm methyl ester (PME) is one of the alternative
biomass fuels to liquid fossil fuels. To investigate the combustion
characteristics of PME as an alternative fuel for gas turbines, combustion experiments using two types of burners under atmospheric
pressure were performed. One of the burners has a configuration
making strong non-premixed flame, whereas the other has a
configuration promoting prevaporization of fuel droplets. The results
show that the NOx emissions can be reduced by employing the latter burner without accumulation of soot when PME is used as a fuel. A
burner configuration promoting prevaporzation of fuel droplets is
recommended for PME.
Abstract: In this paper we describes the authentication for DHCP
(Dynamic Host Configuration Protocol) message which provides the
efficient key management and reduces the danger replay attack without
an additional packet for a replay attack. And the authentication for
DHCP message supports mutual authentication and provides both
entity authentication and message authentication. We applied the
authentication for DHCP message to the home network environments
and tested through a home gateway.
Abstract: An exact algorithm for a n-link manipulator movement amidst arbitrary unknown static obstacles is presented.
The algorithm guarantees the reaching of a target configuration of the manipulator in a finite number of steps. The algorithm is
reduced to a finite number of calls of a subroutine for planning a trajectory in the presence of known forbidden states. The polynomial approximation algorithm which is used as the subroutine is presented. The results of the exact algorithm
implementation for the control of a seven link (7 degrees of
freedom, 7DOF) manipulator are given.
Abstract: The unique structural configuration found in human foot allows easy walking. Similar movement is hard to imitate even for an ape. It is obvious that human ambulation relates to the foot structure itself. Suppose the bones are represented as vertices and the joints as edges. This leads to the development of a special graph that represents human foot. On a footprint there are point-ofcontacts which have contact with the ground. It involves specific vertices. Theoretically, for an ideal ambulation, these points provide reactions onto the ground or the static equilibrium forces. They are arranged in sequence in form of a path. The ambulating footprint follows this path. Having the human foot graph and the path crossbred, it results in a representation that describes the profile of an ideal ambulation. This profile cites the locations where the point-of-contact experience normal reaction forces. It highlights the significant of these points.