Abstract: In the real application of active control systems to
mitigate the response of structures subjected to sever external
excitations such as earthquake and wind induced vibrations, since the
capacity of actuators is limited then the actuators saturate. Hence, in
designing controllers for linear and nonlinear structures under sever
earthquakes, the actuator saturation should be considered as a
constraint. In this paper optimal design of active controllers for
nonlinear structures by considering the actuator saturation has been
studied. To this end a method has been proposed based on defining
an optimization problem which considers the minimizing of the
maximum displacement of the structure as objective when a limited
capacity for actuator has been used as a constraint in optimization
problem. To evaluate the effectiveness of the proposed method, a
single degree of freedom (SDF) structure with a bilinear hysteretic
behavior has been simulated under a white noise ground acceleration
of different amplitudes. Active tendon control mechanism, comprised
of pre-stressed tendons and an actuator, and extended nonlinear
Newmark method based instantaneous optimal control algorithm
have been used as active control mechanism and algorithm. To
enhance the efficiency of the controllers, the weights corresponding
to displacement, velocity, acceleration and control force in the
performance index have been found by using the Distributed Genetic
Algorithm (DGA). According to the results it has been concluded
that the proposed method has been effective in considering the
actuator saturation in designing optimal controllers for nonlinear
frames. Also it has been shown that the actuator capacity and the
average value of required control force are two important factors in
designing nonlinear controllers for considering the actuator
saturation.
Abstract: The successful use of CDMA technology is based on
the construction of large families of encoding sequences with good
correlation properties. This paper discusses PN sequence generation
based on Residue Arithmetic with an effort to improve the performance
of existing interference-limited CDMA technology for mobile
cellular systems. All spreading codes with residual number system
proposed earlier did not consider external interferences, multipath
propagation, Doppler effect etc. In literature the use of residual
arithmetic in DS-CDMA was restricted to encoding of already spread
sequence; where spreading of sequence is done by some existing
techniques. The novelty of this paper is the use of residual number
system in generation of the PN sequences which is used to spread
the message signal. The significance of cross-correlation factor in
alleviating multi-access interference is also discussed. The RNS based
PN sequence has superior performance than most of the existing
codes that are widely used in DS-CDMA applications. Simulation
results suggest that the performance of the proposed system is
superior to many existing systems.
Abstract: Significant changes in oil and gas drilling have
emphasized the need to verify the integrity and reliability of drill
stem components. Defects are inevitable in cast components,
regardless of application; but if these defects go undetected, any
severe defect could cause down-hole failure.
One such defect is shrinkage porosity. Castings with lower level
shrinkage porosity (CB levels 1 and 2) have scattered pores and do
not occupy large volumes; so pressure testing and helium leak testing
(HLT) are sufficient for qualifying the castings. However, castings
with shrinkage porosity of CB level 3 and higher, behave erratically
under pressure testing and HLT making these techniques insufficient
for evaluating the castings- integrity.
This paper presents a case study to highlight how the radiography
technique is much more effective than pressure testing and HLT.
Abstract: Due to the non- intuitive nature of Quantum
algorithms, it becomes difficult for a classically trained person to
efficiently construct new ones. So rather than designing new
algorithms manually, lately, Genetic algorithms (GA) are being
implemented for this purpose. GA is a technique to automatically
solve a problem using principles of Darwinian evolution. This has
been implemented to explore the possibility of evolving an n-qubit
circuit when the circuit matrix has been provided using a set of
single, two and three qubit gates. Using a variable length population
and universal stochastic selection procedure, a number of possible
solution circuits, with different number of gates can be obtained for
the same input matrix during different runs of GA. The given
algorithm has also been successfully implemented to obtain two and
three qubit Boolean circuits using Quantum gates. The results
demonstrate the effectiveness of the GA procedure even when the
search spaces are large.
Abstract: In this paper the application of neuro-fuzzy system for equalization of channel distortion is considered. The structure and operation algorithm of neuro-fuzzy equalizer are described. The use of neuro-fuzzy equalizer in digital signal transmission allows to decrease training time of parameters and decrease the complexity of the network. The simulation of neuro-fuzzy equalizer is performed. The obtained result satisfies the efficiency of application of neurofuzzy technology in channel equalization.
Abstract: The classic problem of recovering arbitrary values of
a band-limited signal from its samples has an added complication
in software radio applications; namely, the resampling calculations
inevitably fold aliases of the analog signal back into the original
bandwidth. The phenomenon is quantified by the spur-free dynamic
range. We demonstrate how a novel application of the Remez (Parks-
McClellan) algorithm permits optimal signal recovery and SFDR, far
surpassing state-of-the-art resamplers.
Abstract: Carbon nanotubes (CNTs) are attractive because of
their excellent chemical durability mechanical strength and electrical
properties. Therefore there is interest in CNTs for not only electrical
and mechanical application, but also biological and medical
application.
In this study, the dispersion power of surfactant-treated multiwalled
carbon nanotubes (MWCNTs) and their effect on the antibacterial
activity were examined. Surfactant was used sodium
dodecyl-benzenesulfonate (SDBS). UV-vis absorbance and
transmission electron microscopy(TEM) were used to characterize the
dispersion of MWCNTs in the aqueous phase, showing that the
surfactant molecules had been adsorbed onto the MWCNTs surface.
The surfactant-treated MWCNTs exhibited antimicrobial activities
to streptococcus mutans. The optical density growth curves and viable
cell number determined by the plating method suggested that the
antimicrobial activity of surfactant-treated MWCNTs was both
concentration and treatment time-dependent.
Abstract: This paper presents the design and implementation of a fully integrated transimpedance amplifier (TIA) as the analog frontend receiver for Capacitive Micromachined Ultrasound Transducers (CMUTs) for ultrasound biomicroscope imaging application. The amplifier is designed to amplify the received signals from 17.5MHz to 52.5MHz with a center frequency of 35MHz. The TIA was fabricated in GF 0.18μm 1P6M 30V high voltage process. The measurement results show that the designed amplifier can reach a transimpedance gain of 61.08dBΩ and operating frequency from 17.5MHz to 100MHz with 1VP-P output voltage under 6V power supply.
Abstract: The experiment was performed to evaluate the effect
of GA3, 2,4-D on fruit growth and fruit quality of wax apple. The
experiment consisted of Red A, Monulla, Atu, Red B cultivars. GA3
and 2,4-D were applied at the small bud and petal fall stage.
Physiological, biochemical characters of fruit were recoded. The
result showed application of GA3, 2,4-D greatly response in
increasing fruit set for all treatment as compared to control. Fruit
weight, fruit size were increased at 10 ppm 2,4-D in ‘Red A’, ‘Red
B’, however it was also enhancing at 10 ppm GA3 in ‘Monulla’,
‘Atu’. For ‘Monulla’, ‘Atu’ fruit crack reduced by 10 ppm 2,4-D
application, but ‘Red B’, ‘Red A’ gave least fruit crack at 10 and 30
ppm GA3, respectively. ‘Monulla’, ‘Atu’ and ‘Red B’ resulted in
response well to 10 ppm GA3 on improving TSS, whereas
application of 30 ppm GA3 greatly enhancing TSS in ‘Red A’. For
‘Atu’ titratable acidity markedly reduced by 10 ppm GA3
application, but spraying with 30 ppm GA3 greatly response in
reducing titratable acidity in ‘Red A’, ‘Red B’ and ‘Monulla’. It was
concluded that GA3, 2,4-D can be an effective tool to enhancing fruit
set, fruit growth as well as improving fruit quality of wax apple.
Abstract: There are many researches to detect collision between real object and virtual object in 3D space. In general, these techniques are need to huge computing power. So, many research and study are constructed by using cloud computing, network computing, and distribute computing. As a reason of these, this paper proposed a novel fast 3D collision detection algorithm between real and virtual object using 2D intersection area. Proposed algorithm uses 4 multiple cameras and coarse-and-fine method to improve accuracy and speed performance of collision detection. In the coarse step, this system examines the intersection area between real and virtual object silhouettes from all camera views. The result of this step is the index of virtual sensors which has a possibility of collision in 3D space. To decide collision accurately, at the fine step, this system examines the collision detection in 3D space by using the visual hull algorithm. Performance of the algorithm is verified by comparing with existing algorithm. We believe proposed algorithm help many other research, study and application fields such as HCI, augmented reality, intelligent space, and so on.
Abstract: Context awareness is a capability whereby mobile
computing devices can sense their physical environment and adapt
their behavior accordingly. The term context-awareness, in
ubiquitous computing, was introduced by Schilit in 1994 and has
become one of the most exciting concepts in early 21st-century
computing, fueled by recent developments in pervasive computing
(i.e. mobile and ubiquitous computing). These include computing
devices worn by users, embedded devices, smart appliances, sensors
surrounding users and a variety of wireless networking technologies.
Context-aware applications use context information to adapt
interfaces, tailor the set of application-relevant data, increase the
precision of information retrieval, discover services, make the user
interaction implicit, or build smart environments. For example: A
context aware mobile phone will know that the user is currently in a
meeting room, and reject any unimportant calls. One of the major
challenges in providing users with context-aware services lies in
continuously monitoring their contexts based on numerous sensors
connected to the context aware system through wireless
communication. A number of context aware frameworks based on
sensors have been proposed, but many of them have neglected the
fact that monitoring with sensors imposes heavy workloads on
ubiquitous devices with limited computing power and battery. In this
paper, we present CALEEF, a lightweight and energy efficient
context aware framework for resource limited ubiquitous devices.
Abstract: The knowledge of the nature of loading is very
important in order to hold account on the total behavior such as
vibration, shock, fatigue, etc. Fatigue present 90% of failure when
loadings fatigues are very complex. In this paper a study of double
through crack at hole for plate subjected to fatigue loading is
presented. Various modes loading are studied where the applied load
is the same one. The fatigue life is given where the effect of stress
ratio is highlighted. This work is conducted on aluminum alloy 2024
T351 used for much aerospace and aeronautics applications. The
fatigue crack growth behavior with constant amplitude is studied
using the AFGROW code when Forman model is applied. The
fatigue crack growth rate and fatigue life for different loading modes
are compared with variation of others geometrical parameter such as
thickness and dimensions of notch hole.
Abstract: As chip manufacturing technology is suddenly on the
threshold of major evaluation, which shrinks chip in size and
performance, LFSR (Linear Feedback Shift Register) is implemented
in layout level which develops the low power consumption chip,
using recent CMOS, sub-micrometer layout tools. Thus LFSR
counter can be a new trend setter in cryptography and is also
beneficial as compared to GRAY & BINARY counter and variety of
other applications.
This paper compares 3 architectures in terms of the hardware
implementation, CMOS layout and power consumption, using
Microwind CMOS layout tool. Thus it provides solution to a low
power architecture implementation of LFSR in CMOS VLSI.
Abstract: With the extensive inclusion of document, especially
text, in the business systems, data mining does not cover the full
scope of Business Intelligence. Data mining cannot deliver its impact
on extracting useful details from the large collection of unstructured
and semi-structured written materials based on natural languages.
The most pressing issue is to draw the potential business intelligence
from text. In order to gain competitive advantages for the business, it
is necessary to develop the new powerful tool, text mining, to expand
the scope of business intelligence.
In this paper, we will work out the strong points of text mining in
extracting business intelligence from huge amount of textual
information sources within business systems. We will apply text
mining to each stage of Business Intelligence systems to prove that
text mining is the powerful tool to expand the scope of BI. After
reviewing basic definitions and some related technologies, we will
discuss the relationship and the benefits of these to text mining. Some
examples and applications of text mining will also be given. The
motivation behind is to develop new approach to effective and
efficient textual information analysis. Thus we can expand the scope
of Business Intelligence using the powerful tool, text mining.
Abstract: Deployment of pneumatic muscles in various
industrial applications is still in its early days, considering the relative
newness of these components. The field of robotics holds particular
future potential for pneumatic muscles, especially in view of their
specific behaviour known as compliance. The paper presents and
discusses an innovative constructive solution for a gripper system
mountable on an industrial robot, based on actuation by a linear
pneumatic muscle and transmission of motion by gear and rack
mechanism. The structural, operational and constructive models of
the new gripper are presented, along with some of the experimental
results obtained subsequently to the testing of a prototype. Further
presented are two control variants of the gripper system, one by
means of a 3/2-way fast-switching solenoid valve, the other by means
of a proportional pressure regulator. Advantages and disadvantages
are discussed for both variants.
Abstract: Never has a revolution affected all aspects of
humanity as the communication revolution during the past two
decades. This revolution, with all its advances and utilities, swept the
world thus becoming an integral part of our lives, hence giving way
to emerging applications at the social, economic, political, and
educational levels. More specifically, such applications have changed
the delivery system through which learning is acquired by students.
Interaction with educators, accessibility to content, and creative
delivery options are but a few facets of the new learning experience
now being offered through the use of technology in the educational
field. With different success rates, third world countries have tried to
pace themselves with use of educational technology in advanced
parts of the world. One such country is the small rich-oil state of
Kuwait which has tried to adopt the e-educational model, however,
an evaluation of such trial is yet to be done. This study aimed to fill
the void of research conducted around that topic. The study explored
students' acceptance of incorporating communication technologies in
higher education in Kuwait. Students' responses to survey questions
presented an overview of the e-learning experience in this country,
and drew a framework through which implications and suggestions
for future research were discussed to better serve the advancement of
e-education in developing countries.
Abstract: Risk response planning is of importance for software project risk management (SPRM). In CMMI, risk management was in the third capability maturity level, which provides a framework for software project risk identification, assessment, risk planning, risk control. However, the CMMI-based SPRM currently lacks quantitative supporting tools, especially during the process of implementing software project risk planning. In this paper, an economic optimization model for selecting risk reduction actions in the phase of software project risk response planning is presented. Furthermore, an example taken from a Chinese software industry is illustrated to verify the application of this method. The research provides a risk decision method for project risk managers that can be used in the implementation of CMMI-based SPRM.
Abstract: In this paper we present high performance
dynamically allocated multi-queue (DAMQ) buffer schemes for fault
tolerance systems on chip applications that require an interconnection
network. Two virtual channels shared the same buffer space. Fault
tolerant mechanisms for interconnection networks are becoming a
critical design issue for large massively parallel computers. It is also
important to high performance SoCs as the system complexity keeps
increasing rapidly. On the message switching layer, we make
improvement to boost system performance when there are faults
involved in the components communication. The proposed scheme is
when a node or a physical channel is deemed as faulty, the previous
hop node will terminate the buffer occupancy of messages destined
to the failed link. The buffer usage decisions are made at switching
layer without interactions with higher abstract layer, thus buffer
space will be released to messages destined to other healthy nodes
quickly. Therefore, the buffer space will be efficiently used in case
fault occurs at some nodes.
Abstract: Owing the fact that optimization of business process
is a crucial requirement to navigate, survive and even thrive in
today-s volatile business environment, this paper presents a
framework for selecting a best-fit optimization package for solving
complex business problems. Complexity level of the problem and/or
using incorrect optimization software can lead to biased solutions of
the optimization problem. Accordingly, the proposed framework
identifies a number of relevant factors (e.g. decision variables,
objective functions, and modeling approach) to be considered during
the evaluation and selection process. Application domain, problem
specifications, and available accredited optimization approaches are
also to be regarded. A recommendation of one or two optimization
software is the output of the framework which is believed to provide
the best results of the underlying problem. In addition to a set of
guidelines and recommendations on how managers can conduct an
effective optimization exercise is discussed.
Abstract: In this article, we expose our research work in
Human-machine Interaction. The research consists in manipulating
the workspace by eyes. We present some of our results, in particular
the detection of eyes and the mouse actions recognition. Indeed, the
handicaped user becomes able to interact with the machine in a more
intuitive way in diverse applications and contexts. To test our
application we have chooses to work in real time on videos captured
by a camera placed in front of the user.