Genetic Algorithm Based Approach for Actuator Saturation Effect on Nonlinear Controllers

In the real application of active control systems to mitigate the response of structures subjected to sever external excitations such as earthquake and wind induced vibrations, since the capacity of actuators is limited then the actuators saturate. Hence, in designing controllers for linear and nonlinear structures under sever earthquakes, the actuator saturation should be considered as a constraint. In this paper optimal design of active controllers for nonlinear structures by considering the actuator saturation has been studied. To this end a method has been proposed based on defining an optimization problem which considers the minimizing of the maximum displacement of the structure as objective when a limited capacity for actuator has been used as a constraint in optimization problem. To evaluate the effectiveness of the proposed method, a single degree of freedom (SDF) structure with a bilinear hysteretic behavior has been simulated under a white noise ground acceleration of different amplitudes. Active tendon control mechanism, comprised of pre-stressed tendons and an actuator, and extended nonlinear Newmark method based instantaneous optimal control algorithm have been used as active control mechanism and algorithm. To enhance the efficiency of the controllers, the weights corresponding to displacement, velocity, acceleration and control force in the performance index have been found by using the Distributed Genetic Algorithm (DGA). According to the results it has been concluded that the proposed method has been effective in considering the actuator saturation in designing optimal controllers for nonlinear frames. Also it has been shown that the actuator capacity and the average value of required control force are two important factors in designing nonlinear controllers for considering the actuator saturation.

A PN Sequence Generator based on Residue Arithmetic for Multi-User DS-CDMA Applications

The successful use of CDMA technology is based on the construction of large families of encoding sequences with good correlation properties. This paper discusses PN sequence generation based on Residue Arithmetic with an effort to improve the performance of existing interference-limited CDMA technology for mobile cellular systems. All spreading codes with residual number system proposed earlier did not consider external interferences, multipath propagation, Doppler effect etc. In literature the use of residual arithmetic in DS-CDMA was restricted to encoding of already spread sequence; where spreading of sequence is done by some existing techniques. The novelty of this paper is the use of residual number system in generation of the PN sequences which is used to spread the message signal. The significance of cross-correlation factor in alleviating multi-access interference is also discussed. The RNS based PN sequence has superior performance than most of the existing codes that are widely used in DS-CDMA applications. Simulation results suggest that the performance of the proposed system is superior to many existing systems.

The Significance of the Radiography Technique in the Non-Destructive Evaluation of the Integrity and Reliability of Cast Interconnects

Significant changes in oil and gas drilling have emphasized the need to verify the integrity and reliability of drill stem components. Defects are inevitable in cast components, regardless of application; but if these defects go undetected, any severe defect could cause down-hole failure. One such defect is shrinkage porosity. Castings with lower level shrinkage porosity (CB levels 1 and 2) have scattered pores and do not occupy large volumes; so pressure testing and helium leak testing (HLT) are sufficient for qualifying the castings. However, castings with shrinkage porosity of CB level 3 and higher, behave erratically under pressure testing and HLT making these techniques insufficient for evaluating the castings- integrity. This paper presents a case study to highlight how the radiography technique is much more effective than pressure testing and HLT.

Application of Genetic Algorithms for Evolution of Quantum Equivalents of Boolean Circuits

Due to the non- intuitive nature of Quantum algorithms, it becomes difficult for a classically trained person to efficiently construct new ones. So rather than designing new algorithms manually, lately, Genetic algorithms (GA) are being implemented for this purpose. GA is a technique to automatically solve a problem using principles of Darwinian evolution. This has been implemented to explore the possibility of evolving an n-qubit circuit when the circuit matrix has been provided using a set of single, two and three qubit gates. Using a variable length population and universal stochastic selection procedure, a number of possible solution circuits, with different number of gates can be obtained for the same input matrix during different runs of GA. The given algorithm has also been successfully implemented to obtain two and three qubit Boolean circuits using Quantum gates. The results demonstrate the effectiveness of the GA procedure even when the search spaces are large.

Neuro-Fuzzy System for Equalization Channel Distortion

In this paper the application of neuro-fuzzy system for equalization of channel distortion is considered. The structure and operation algorithm of neuro-fuzzy equalizer are described. The use of neuro-fuzzy equalizer in digital signal transmission allows to decrease training time of parameters and decrease the complexity of the network. The simulation of neuro-fuzzy equalizer is performed. The obtained result satisfies the efficiency of application of neurofuzzy technology in channel equalization.

High Dynamic Range Resampling for Software Radio

The classic problem of recovering arbitrary values of a band-limited signal from its samples has an added complication in software radio applications; namely, the resampling calculations inevitably fold aliases of the analog signal back into the original bandwidth. The phenomenon is quantified by the spur-free dynamic range. We demonstrate how a novel application of the Remez (Parks- McClellan) algorithm permits optimal signal recovery and SFDR, far surpassing state-of-the-art resamplers.

The Effect of Dispersed MWCNTs Using SDBS Surfactant on Bacterial Growth

Carbon nanotubes (CNTs) are attractive because of their excellent chemical durability mechanical strength and electrical properties. Therefore there is interest in CNTs for not only electrical and mechanical application, but also biological and medical application. In this study, the dispersion power of surfactant-treated multiwalled carbon nanotubes (MWCNTs) and their effect on the antibacterial activity were examined. Surfactant was used sodium dodecyl-benzenesulfonate (SDBS). UV-vis absorbance and transmission electron microscopy(TEM) were used to characterize the dispersion of MWCNTs in the aqueous phase, showing that the surfactant molecules had been adsorbed onto the MWCNTs surface. The surfactant-treated MWCNTs exhibited antimicrobial activities to streptococcus mutans. The optical density growth curves and viable cell number determined by the plating method suggested that the antimicrobial activity of surfactant-treated MWCNTs was both concentration and treatment time-dependent.

Transimpedance Amplifier for Integrated 3D Ultrasound Biomicroscope Applications

This paper presents the design and implementation of a fully integrated transimpedance amplifier (TIA) as the analog frontend receiver for Capacitive Micromachined Ultrasound Transducers (CMUTs) for ultrasound biomicroscope imaging application. The amplifier is designed to amplify the received signals from 17.5MHz to 52.5MHz with a center frequency of 35MHz. The TIA was fabricated in GF 0.18μm 1P6M 30V high voltage process. The measurement results show that the designed amplifier can reach a transimpedance gain of 61.08dBΩ and operating frequency from 17.5MHz to 100MHz with 1VP-P output voltage under 6V power supply.

Response of Wax Apple Cultivars by Applied GA3 and 2,4-D on Fruit Growth and Fruit Quality

The experiment was performed to evaluate the effect of GA3, 2,4-D on fruit growth and fruit quality of wax apple. The experiment consisted of Red A, Monulla, Atu, Red B cultivars. GA3 and 2,4-D were applied at the small bud and petal fall stage. Physiological, biochemical characters of fruit were recoded. The result showed application of GA3, 2,4-D greatly response in increasing fruit set for all treatment as compared to control. Fruit weight, fruit size were increased at 10 ppm 2,4-D in ‘Red A’, ‘Red B’, however it was also enhancing at 10 ppm GA3 in ‘Monulla’, ‘Atu’. For ‘Monulla’, ‘Atu’ fruit crack reduced by 10 ppm 2,4-D application, but ‘Red B’, ‘Red A’ gave least fruit crack at 10 and 30 ppm GA3, respectively. ‘Monulla’, ‘Atu’ and ‘Red B’ resulted in response well to 10 ppm GA3 on improving TSS, whereas application of 30 ppm GA3 greatly enhancing TSS in ‘Red A’. For ‘Atu’ titratable acidity markedly reduced by 10 ppm GA3 application, but spraying with 30 ppm GA3 greatly response in reducing titratable acidity in ‘Red A’, ‘Red B’ and ‘Monulla’. It was concluded that GA3, 2,4-D can be an effective tool to enhancing fruit set, fruit growth as well as improving fruit quality of wax apple.

Fast 3D Collision Detection Algorithm using 2D Intersection Area

There are many researches to detect collision between real object and virtual object in 3D space. In general, these techniques are need to huge computing power. So, many research and study are constructed by using cloud computing, network computing, and distribute computing. As a reason of these, this paper proposed a novel fast 3D collision detection algorithm between real and virtual object using 2D intersection area. Proposed algorithm uses 4 multiple cameras and coarse-and-fine method to improve accuracy and speed performance of collision detection. In the coarse step, this system examines the intersection area between real and virtual object silhouettes from all camera views. The result of this step is the index of virtual sensors which has a possibility of collision in 3D space. To decide collision accurately, at the fine step, this system examines the collision detection in 3D space by using the visual hull algorithm. Performance of the algorithm is verified by comparing with existing algorithm. We believe proposed algorithm help many other research, study and application fields such as HCI, augmented reality, intelligent space, and so on.

Context Aware Lightweight Energy Efficient Framework

Context awareness is a capability whereby mobile computing devices can sense their physical environment and adapt their behavior accordingly. The term context-awareness, in ubiquitous computing, was introduced by Schilit in 1994 and has become one of the most exciting concepts in early 21st-century computing, fueled by recent developments in pervasive computing (i.e. mobile and ubiquitous computing). These include computing devices worn by users, embedded devices, smart appliances, sensors surrounding users and a variety of wireless networking technologies. Context-aware applications use context information to adapt interfaces, tailor the set of application-relevant data, increase the precision of information retrieval, discover services, make the user interaction implicit, or build smart environments. For example: A context aware mobile phone will know that the user is currently in a meeting room, and reject any unimportant calls. One of the major challenges in providing users with context-aware services lies in continuously monitoring their contexts based on numerous sensors connected to the context aware system through wireless communication. A number of context aware frameworks based on sensors have been proposed, but many of them have neglected the fact that monitoring with sensors imposes heavy workloads on ubiquitous devices with limited computing power and battery. In this paper, we present CALEEF, a lightweight and energy efficient context aware framework for resource limited ubiquitous devices.

Effect of Mode Loading on FCRG Plate with Double Through Crack at Hole

The knowledge of the nature of loading is very important in order to hold account on the total behavior such as vibration, shock, fatigue, etc. Fatigue present 90% of failure when loadings fatigues are very complex. In this paper a study of double through crack at hole for plate subjected to fatigue loading is presented. Various modes loading are studied where the applied load is the same one. The fatigue life is given where the effect of stress ratio is highlighted. This work is conducted on aluminum alloy 2024 T351 used for much aerospace and aeronautics applications. The fatigue crack growth behavior with constant amplitude is studied using the AFGROW code when Forman model is applied. The fatigue crack growth rate and fatigue life for different loading modes are compared with variation of others geometrical parameter such as thickness and dimensions of notch hole.

LFSR Counter Implementation in CMOS VLSI

As chip manufacturing technology is suddenly on the threshold of major evaluation, which shrinks chip in size and performance, LFSR (Linear Feedback Shift Register) is implemented in layout level which develops the low power consumption chip, using recent CMOS, sub-micrometer layout tools. Thus LFSR counter can be a new trend setter in cryptography and is also beneficial as compared to GRAY & BINARY counter and variety of other applications. This paper compares 3 architectures in terms of the hardware implementation, CMOS layout and power consumption, using Microwind CMOS layout tool. Thus it provides solution to a low power architecture implementation of LFSR in CMOS VLSI.

Powerful Tool to Expand Business Intelligence: Text Mining

With the extensive inclusion of document, especially text, in the business systems, data mining does not cover the full scope of Business Intelligence. Data mining cannot deliver its impact on extracting useful details from the large collection of unstructured and semi-structured written materials based on natural languages. The most pressing issue is to draw the potential business intelligence from text. In order to gain competitive advantages for the business, it is necessary to develop the new powerful tool, text mining, to expand the scope of business intelligence. In this paper, we will work out the strong points of text mining in extracting business intelligence from huge amount of textual information sources within business systems. We will apply text mining to each stage of Business Intelligence systems to prove that text mining is the powerful tool to expand the scope of BI. After reviewing basic definitions and some related technologies, we will discuss the relationship and the benefits of these to text mining. Some examples and applications of text mining will also be given. The motivation behind is to develop new approach to effective and efficient textual information analysis. Thus we can expand the scope of Business Intelligence using the powerful tool, text mining.

Design and Evaluation of a Pneumatic Muscle Actuated Gripper

Deployment of pneumatic muscles in various industrial applications is still in its early days, considering the relative newness of these components. The field of robotics holds particular future potential for pneumatic muscles, especially in view of their specific behaviour known as compliance. The paper presents and discusses an innovative constructive solution for a gripper system mountable on an industrial robot, based on actuation by a linear pneumatic muscle and transmission of motion by gear and rack mechanism. The structural, operational and constructive models of the new gripper are presented, along with some of the experimental results obtained subsequently to the testing of a prototype. Further presented are two control variants of the gripper system, one by means of a 3/2-way fast-switching solenoid valve, the other by means of a proportional pressure regulator. Advantages and disadvantages are discussed for both variants.

Students' Acceptance of Incorporating Emerging Communication Technologies in Higher Education in Kuwait

Never has a revolution affected all aspects of humanity as the communication revolution during the past two decades. This revolution, with all its advances and utilities, swept the world thus becoming an integral part of our lives, hence giving way to emerging applications at the social, economic, political, and educational levels. More specifically, such applications have changed the delivery system through which learning is acquired by students. Interaction with educators, accessibility to content, and creative delivery options are but a few facets of the new learning experience now being offered through the use of technology in the educational field. With different success rates, third world countries have tried to pace themselves with use of educational technology in advanced parts of the world. One such country is the small rich-oil state of Kuwait which has tried to adopt the e-educational model, however, an evaluation of such trial is yet to be done. This study aimed to fill the void of research conducted around that topic. The study explored students' acceptance of incorporating communication technologies in higher education in Kuwait. Students' responses to survey questions presented an overview of the e-learning experience in this country, and drew a framework through which implications and suggestions for future research were discussed to better serve the advancement of e-education in developing countries.

An Optimization Model of CMMI-Based Software Project Risk Response Planning

Risk response planning is of importance for software project risk management (SPRM). In CMMI, risk management was in the third capability maturity level, which provides a framework for software project risk identification, assessment, risk planning, risk control. However, the CMMI-based SPRM currently lacks quantitative supporting tools, especially during the process of implementing software project risk planning. In this paper, an economic optimization model for selecting risk reduction actions in the phase of software project risk response planning is presented. Furthermore, an example taken from a Chinese software industry is illustrated to verify the application of this method. The research provides a risk decision method for project risk managers that can be used in the implementation of CMMI-based SPRM.

DAMQ-Based Approach for Efficiently Using the Buffer Spaces of a NoC Router

In this paper we present high performance dynamically allocated multi-queue (DAMQ) buffer schemes for fault tolerance systems on chip applications that require an interconnection network. Two virtual channels shared the same buffer space. Fault tolerant mechanisms for interconnection networks are becoming a critical design issue for large massively parallel computers. It is also important to high performance SoCs as the system complexity keeps increasing rapidly. On the message switching layer, we make improvement to boost system performance when there are faults involved in the components communication. The proposed scheme is when a node or a physical channel is deemed as faulty, the previous hop node will terminate the buffer occupancy of messages destined to the failed link. The buffer usage decisions are made at switching layer without interactions with higher abstract layer, thus buffer space will be released to messages destined to other healthy nodes quickly. Therefore, the buffer space will be efficiently used in case fault occurs at some nodes.

Evaluating and Selecting Optimization Software Packages: A Framework for Business Applications

Owing the fact that optimization of business process is a crucial requirement to navigate, survive and even thrive in today-s volatile business environment, this paper presents a framework for selecting a best-fit optimization package for solving complex business problems. Complexity level of the problem and/or using incorrect optimization software can lead to biased solutions of the optimization problem. Accordingly, the proposed framework identifies a number of relevant factors (e.g. decision variables, objective functions, and modeling approach) to be considered during the evaluation and selection process. Application domain, problem specifications, and available accredited optimization approaches are also to be regarded. A recommendation of one or two optimization software is the output of the framework which is believed to provide the best results of the underlying problem. In addition to a set of guidelines and recommendations on how managers can conduct an effective optimization exercise is discussed.

Mouse Pointer Tracking with Eyes

In this article, we expose our research work in Human-machine Interaction. The research consists in manipulating the workspace by eyes. We present some of our results, in particular the detection of eyes and the mouse actions recognition. Indeed, the handicaped user becomes able to interact with the machine in a more intuitive way in diverse applications and contexts. To test our application we have chooses to work in real time on videos captured by a camera placed in front of the user.