Abstract: This paper presents an adaptive nonlinear position
controller with velocity constraint, capable of combining the
input-output linearization technique and Lyapunov stability theory.
Based on the Lyapunov stability theory, the adaptation law of the
proposed controller is derived along with the verification of the overall
system-s stability. Computer simulation results demonstrate that the
proposed controller is robust and it can ensure transient stability of
BLDCM, under the occurrence of a large sudden fault.
Abstract: An application framework provides a reusable design
and implementation for a family of software systems. Application
developers extend the framework to build their particular
applications using hooks. Hooks are the places identified to show
how to use and customize the framework. Hooks define Framework
Interface Classes (FICs) and their possible specifications, which
helps in building reusable test cases for the implementations of these
classes. In applications developed using gray-box frameworks, FICs
inherit framework classes or use them without inheritance. In this
paper, a test-case generation technique is extended to build test cases
for FICs built for gray-box frameworks. A tool is developed to
automate the introduced technique.
Abstract: In this paper, a new model order reduction
phenomenon is introduced at the design stage of linear phase digital
IIR filter. The complexity of a system can be reduced by adopting the
model order reduction method in their design. In this paper a mixed
method of model order reduction is proposed for linear IIR filter. The
proposed method employs the advantages of factor division technique
to derive the reduced order denominator polynomial and the reduced
order numerator is obtained based on the resultant denominator
polynomial. The order reduction technique is used to reduce the delay
units at the design stage of IIR filter. The validity of the proposed
method is illustrated with design example in frequency domain and
stability is also examined with help of nyquist plot.
Abstract: As the Internet technology has developed rapidly, the
number of identities (IDs) managed by each individual person has
increased and various ID management technologies have been
developed to assist users. However, most of these technologies are
vulnerable to the existing hacking methods such as phishing attacks
and key-logging. If the administrator-s password is exposed, an
attacker can access the entire contents of the stolen user-s data files in
other devices. To solve these problems, we propose here a new ID
management scheme based on a Single Password Protocol. The paper
presents the details of the new scheme as well as a formal analysis of
the method using BAN Logic.
Abstract: Financial forecasting using machine learning techniques has received great efforts in the last decide . In this ongoing work, we show how machine learning of graphical models will be able to infer a visualized causal interactions between different banks in the Saudi equities market. One important discovery from such learned causal graphs is how companies influence each other and to what extend. In this work, a set of graphical models named Gaussian graphical models with developed ensemble penalized feature selection methods that combine ; filtering method, wrapper method and a regularizer will be shown. A comparison between these different developed ensemble combinations will also be shown. The best ensemble method will be used to infer the causal relationships between banks in Saudi equities market.
Abstract: This work deals with problems of tool axis inclination angles in ball-end milling. Tool axis inclination angle contributes to improvement of functional surface properties (surface integrity - surface roughness, residual stress, micro hardness, etc.), decreasing cutting forces and improving production. By milling with ball-end milling tool, using standard way of cutting, when work piece and cutting tool contain right angle, we have zero cutting speed on edge. At this point cutting tool only pushes material into the work piece. Here we can observe the following undesirable effects - chip contraction, increasing of cutting temperature, increasing vibrations or creation of built-up edge. These effects have negative results – low quality of surface and decreasing of tool life (in the worse case even it is pinching out). These effects can be eliminated with the tilt of cutting tool or tilt of work piece.
Abstract: This paper introduces the effective speckle reduction of
synthetic aperture radar (SAR) images using inner product spaces in
undecimated wavelet domain. There are two major areas in projection
onto span algorithm where improvement can be made. First is the use
of undecimated wavelet transformation instead of discrete wavelet
transformation. And second area is the use of smoothing filter namely
directional smoothing filter which is an additional step. Proposed
method does not need any noise estimation and thresholding
technique. More over proposed method gives good results on both
single polarimetric and fully polarimetric SAR images.
Abstract: An experimental study of Reinforced Concrete, RC, columns strengthened using a steel jacketing technique was conducted. The jacketing technique consisted of four steel vertical angles installed at the corners of the column joined by horizontal steel straps confining the column externally. The effectiveness of the technique was evaluated by testing the RC column specimens under eccentric monotonic loading until failure occurred. Strain gauges were installed to monitor the strains in the internal reinforcement as well as the external jacketing system. The effectiveness of the jacketing technique was demonstrated, and the parameters affecting the technique were studied.
Abstract: The availability of broadband internet and increased
access to computers has been instrumental in the rise of internet
literacy in Malaysia. This development has led to the adoption of
online shopping by many Malaysians. On another note, the
Government has supported the development and production of local
herbal products. This has resulted in an increase in the production and
diversity of products by SMEs. The purpose of this study is to
evaluate the influence of the Malaysian demographic factors and
selected attitudinal characteristics in relation to the online purchasing
of herbal products. In total, 1054 internet users were interviewed
online and Chi-square analysis was used to determine the relationship
between demographic variables and different aspects of online
shopping for herbal products. The overall results show that the
demographic variables such as age, gender, education level, income
and ethnicity were significant when considering the online shopping
antecedents of trust, quality of herbal products, perceived risks and
perceived benefits.
Abstract: Although the STL (stereo lithography) file format is
widely used as a de facto industry standard in the rapid prototyping
industry due to its simplicity and ability to tessellation of almost all
surfaces, but there are always some defects and shortcoming in their
usage, which many of them are difficult to correct manually. In
processing the complex models, size of the file and its defects grow
extremely, therefore, correcting STL files become difficult. In this
paper through optimizing the exiting algorithms, size of the files and
memory usage of computers to process them will be reduced. In spite
of type and extent of the errors in STL files, the tail-to-head
searching method and analysis of the nearest distance between tails
and heads techniques were used. As a result STL models sliced
rapidly, and fully closed contours produced effectively and errorless.
Abstract: In this paper, a method to detect multiple ellipses is presented. The technique is efficient and robust against incomplete ellipses due to partial occlusion, noise or missing edges and outliers. It is an iterative technique that finds and removes the best ellipse until no reasonable ellipse is found. At each run, the best ellipse is extracted from randomly selected edge patches, its fitness calculated and compared to a fitness threshold. RANSAC algorithm is applied as a sampling process together with the Direct Least Square fitting of ellipses (DLS) as the fitting algorithm. In our experiment, the method performs very well and is robust against noise and spurious edges on both synthetic and real-world image data.
Abstract: This paper describes a 3D modeling system in
Augmented Reality environment, named 3DARModeler. It can be
considered a simple version of 3D Studio Max with necessary
functions for a modeling system such as creating objects, applying
texture, adding animation, estimating real light sources and casting
shadows. The 3DARModeler introduces convenient, and effective
human-computer interaction to build 3D models by combining both
the traditional input method (mouse/keyboard) and the tangible input
method (markers). It has the ability to align a new virtual object with
the existing parts of a model. The 3DARModeler targets nontechnical
users. As such, they do not need much knowledge of
computer graphics and modeling techniques. All they have to do is
select basic objects, customize their attributes, and put them together
to build a 3D model in a simple and intuitive way as if they were
doing in the real world. Using the hierarchical modeling technique,
the users are able to group several basic objects to manage them as a
unified, complex object. The system can also connect with other 3D
systems by importing and exporting VRML/3Ds Max files. A
module of speech recognition is included in the system to provide
flexible user interfaces.
Abstract: Within the last years, several technologies have been developed to help building e-learning portals. Most of them follow approaches that deliver a vast amount of functionalities, suitable for class-like learning. The SuGI project, as part of the D-Grid (funded by the BMBF), targets on delivering a highly scalable and sustainable learning solution to provide materials (e.g. learning modules, training systems, webcasts, tutorials, etc.) containing knowledge about Grid computing to the D-Grid community. In this article, the process of the development of an e-learning portal focused on the requirements of this special user group is described. Furthermore, it deals with the conceptual and technical design of an e-learning portal, addressing the special needs of heterogeneous target groups. The main focus lies on the quality management of the software development process, Web templates for uploading new contents, the rich search and filter functionalities which will be described from a conceptual as well as a technical point of view. Specifically, it points out best practices as well as concepts to provide a sustainable solution to a relatively unknown and highly heterogeneous community.
Abstract: The indoor airflow with a mixed natural/forced convection
was numerically calculated using the laminar and turbulent
approach. The Boussinesq approximation was considered for a simplification
of the mathematical model and calculations. The results
obtained, such as mean velocity fields, were successfully compared
with experimental PIV flow visualizations. The effect of the distance
between the cooled wall and the heat exchanger on the temperature
and velocity distributions was calculated. In a room with a simple
shape, the computational code OpenFOAM demonstrated an ability to
numerically predict flow patterns. Furthermore, numerical techniques,
boundary type conditions and the computational grid quality were
examined. Calculations using the turbulence model k-omega had a
significant effect on the results influencing temperature and velocity
distributions.
Abstract: Company mergers and acquisitions reached their peak
in the twenty-first century. Mergers and acquisitions have become one
of the competitive strategies for external growth. In general, it is
believed that mergers and acquisitions can create synergies. However,
they require complete information technology system and service
integration, especially in the banking industry. Much of the research
has focused on performance evaluation, shareholder equity allocation,
or even the increase of company market value after the merger and
acquisition, whereas few scholars have focused on information system
integration post merger and acquisition. This study indicates the role
of information systems after a merger and acquisition, explaining the
benefits of information system integration using a merger and
acquisition case in the banking industry as an example. In addition, we
discuss factors that affect the performance of information system
integration, and utilize system dynamics to interpret the relationship
among factors that affect information system integration performance
in the banking industry after a merger and acquisition.
Abstract: The number of users supported in a DS-CDMA
cellular system is typically less than spreading factor (N), and the
system is said to be underloaded. Overloading is a technique to
accommodate more number of users than the spreading factor N. In
O/O overloading scheme, the first set is assigned to the N
synchronous users and the second set is assigned to the additional
synchronous users. An iterative multistage soft decision interference
cancellation (SDIC) receiver is used to remove high level of
interference between the two sets. Performance is evaluated in terms
of the maximum number acceptable users so that the system
performance is degraded slightly compared to the single user
performance at a specified BER. In this paper, the capacity of CDMA
based O/O overloading scheme is evaluated with SDIC receiver. It is
observed that O/O scheme using orthogonal Gold codes provides
25% channel overloading (N=64) for synchronous DS-CDMA
system on an AWGN channel in the uplink at a BER of 1e-5.For a
Rayleigh faded channel, the critical capacity is 40% at a BER of 5e-5
assuming synchronous users. But in practical systems, perfect chip
timing is very difficult to maintain in the uplink.. We have shown that
the overloading performance reduces to 11% for a timing
synchronization error of 0.02Tc for a BER of 1e-5.
Abstract: An effective approach for unbalanced three-phase
distribution power flow solutions is proposed in this paper. The
special topological characteristics of distribution networks have been
fully utilized to make the direct solution possible. Two matrices–the
bus-injection to branch-current matrix and the branch-current to busvoltage
matrix– and a simple matrix multiplication are used to
obtain power flow solutions. Due to the distinctive solution
techniques of the proposed method, the time-consuming LU
decomposition and forward/backward substitution of the Jacobian
matrix or admittance matrix required in the traditional power flow
methods are no longer necessary. Therefore, the proposed method is
robust and time-efficient. Test results demonstrate the validity of the
proposed method. The proposed method shows great potential to be
used in distribution automation applications.
Abstract: Most fingerprint recognition techniques are based on minutiae matching and have been well studied. However, this technology still suffers from problems associated with the handling of poor quality impressions. One problem besetting fingerprint matching is distortion. Distortion changes both geometric position and orientation, and leads to difficulties in establishing a match among multiple impressions acquired from the same finger tip. Marking all the minutiae accurately as well as rejecting false minutiae is another issue still under research. Our work has combined many methods to build a minutia extractor and a minutia matcher. The combination of multiple methods comes from a wide investigation into research papers. Also some novel changes like segmentation using Morphological operations, improved thinning, false minutiae removal methods, minutia marking with special considering the triple branch counting, minutia unification by decomposing a branch into three terminations, and matching in the unified x-y coordinate system after a two-step transformation are used in the work.
Abstract: The paper attempts to contribute to the largely
neglected social and anthropological discussion of technology development on the one hand, and to redirecting the emphasis in
anthropology from primitive and exotic societies to problems of high
relevance in contemporary era and how technology is used in
everyday life. It draws upon multidimensional models of intelligence
and ideal type formation. It is argued that the predominance of
computational and cognitive cosmovisions have led to technology alienation. Injection of communicative competence in artificially
intelligent systems and identity technologies in the coming
information society are analyzed
Abstract: The possibility of intrinsic electromagnetic fields
within living cells and their resonant self-interaction and interaction
with ambient electromagnetic fields is suggested on the basis of a
theoretical and experimental study. It is reported that intrinsic
electromagnetic fields are produced in the form of radio-frequency
and infra-red photons within atoms (which may be coupled or
uncoupled) in cellular structures, such as the cell cytoskeleton and
plasma membrane. A model is presented for the interaction of these
photons among themselves or with atoms under a dipole-dipole
coupling, induced by single-photon or two-photon processes. This
resonance is manifested by conspicuous field amplification and it is
argued that it is possible for these resonant photons to undergo
tunnelling in the form of evanescent waves to a short range (of a few
nanometers to micrometres). This effect, suggested as a resonant
photon tunnelling mechanism in this report, may enable these fields
to act as intracellular signal communication devices and as bridges
between macromolecules or cellular structures in the cell
cytoskeleton, organelles or membrane. A brief overview of an
experimental technique and a review of some preliminary results are
presented, in the detection of these fields produced in living cell
membranes under physiological conditions.