Abstract: We present a simulation and realization of a battery
charge regulator (BCR) in microsatellite earth observation. The tests
were performed on battery pack 12volt, capacity 24Ah and the solar array open circuit voltage of 100 volt and optimum power of about
250 watt. The battery charge is made by solar module. The principle is to adapt the output voltage of the solar module to the battery by
using the technique of pulse width modulation (PWM). Among the different techniques of charge battery, we opted for the technique of
the controller ON/OFF is a standard technique and simple, it-s easy to
be board executed validation will be made by simulation "Proteus Isis
Professional software ". The circuit and the program of this prototype
are based on the PIC16F877 microcontroller, a serial interface connecting a PC is also realized, to view and save data and graphics
in real time, for visualization of data and graphs we develop an interface tool “visual basic.net (VB)--.
Abstract: In this article we explore the application of a formal
proof system to verification problems in cryptography. Cryptographic
properties concerning correctness or security of some cryptographic
algorithms are of great interest. Beside some basic lemmata, we
explore an implementation of a complex function that is used in
cryptography. More precisely, we describe formal properties of this
implementation that we computer prove. We describe formalized
probability distributions (σ-algebras, probability spaces and conditional
probabilities). These are given in the formal language of the
formal proof system Isabelle/HOL. Moreover, we computer prove
Bayes- Formula. Besides, we describe an application of the presented
formalized probability distributions to cryptography. Furthermore,
this article shows that computer proofs of complex cryptographic
functions are possible by presenting an implementation of the Miller-
Rabin primality test that admits formal verification. Our achievements
are a step towards computer verification of cryptographic primitives.
They describe a basis for computer verification in cryptography.
Computer verification can be applied to further problems in cryptographic
research, if the corresponding basic mathematical knowledge
is available in a database.
Abstract: Prior to 1975, women in Laos suffered from having
reduced levels of power over decision-making in their families and in
their communities. This has had a negative impact on their ability to
develop their own identities. Their roles were identified as being
responsible for household activities and making preparations for their
marriage. Many women lost opportunities to get educated and access
the outdoor work that might have empowered them to improve their
situations. So far, no accurate figures of either emigrants or return
migrants have been compiled but it appears that most of them were
women, and it was women who most and more frequently remitted
money home. However, very few recent studies have addressed the
relationship between remittances and the roles of women in Laos.
This study, therefore, aims at redressing to some extent the
deficiencies in knowledge. Qualitative techniques were used to gather
data, including individual in-depth interviews and direct observation
in combination with the content analysis method. Forty women in
Vientiane Municipality and Savannakhet province were individually
interviewed. It was found that the monetary remittance was typically
used for family security and well-being; on fungible activities; on
economic and business activities; and on community development,
especially concerning hospitality and providing daily household
necessities. Remittances played important roles in improving many
respondents- livelihoods and positively changed their identities in
families and communities. Women became empowered as they were
able to start commercial businesses, rather than taking care of (just)
housework, children and elders. Interviews indicated that 92.5% of
the respondents their quality of lives improved, 90% felt happier in
their families and 82.5% felt conflicts in their families were reduced.
Abstract: Heat pipes are used to control the thermal problem for
electronic cooling. It is especially difficult to dissipate heat to a heat
sink in an environment in space compared to earth. For solving this
problem, in this study, the Poiseuille (Po) number, which is the main
measure of the performance of a heat pipe, is studied by CFD; then, the
heat pipe performance is verified with experimental results. A heat
pipe is then fabricated for a spatial environment, and an in-house code
is developed. Further, a heat pipe subsystem, which consists of a heat
pipe, MLI (Multi Layer Insulator), SSM (Second Surface Mirror), and
radiator, is tested and correlated with the TMM (Thermal
Mathematical Model) through a commercial code. The correlation
results satisfy the 3K requirement, and the generated thermal model is
verified for application to a spatial environment.
Abstract: This paper study the segmented split capacitor
Digital-to-Analog Converter (DAC) implemented in a differentialtype
12-bit Successive Approximation Analog-to-Digital Converter
(SA-ADC). The series capacitance split array method employed as it
reduced the total area of the capacitors required for high resolution
DACs. A 12-bit regular binary array structure requires 2049 unit
capacitors (Cs) while the split array needs 127 unit Cs. These results
in the reduction of the total capacitance and power consumption of
the series split array architectures as to regular binary-weighted
structures. The paper will show the 12-bit DAC series split capacitor
with 4-bit thermometer coded DAC architectures as well as the
simulation and measured results.
Abstract: A combination of image fusion and quad tree decomposition method is used for detecting the sunspot trajectories in each month and computation of the latitudes of these trajectories in each solar hemisphere. Daily solar images taken with SOHO satellite are fused for each month and the result of fused image is decomposed with Quad Tree decomposition method in order to classifying the sunspot trajectories and then to achieve the precise information about latitudes of sunspot trajectories. Also with fusion we deduce some physical remarkable conclusions about sun magnetic fields behavior. Using quad tree decomposition we give information about the region on sun surface and the space angle that tremendous flares and hot plasma gases permeate interplanetary space and attack to satellites and human technical systems. Here sunspot images in June, July and August 2001 are used for studying and give a method to compute the latitude of sunspot trajectories in each month with sunspot images.
Abstract: Bendability is constrained by maximum top roller
load imparting capacity of the machine. Maximum load is
encountered during the edge pre-bending stage of roller bending.
Capacity of 3-roller plate bending machine is specified by
maximum thickness and minimum shell diameter combinations that
can be pre-bend for given plate material of maximum width.
Commercially available plate width or width of the plate that can be
accommodated on machine decides the maximum rolling width.
Original equipment manufacturers (OEM) provide the machine
capacity chart based on reference material considering perfectly
plastic material model. Reported work shows the bendability analysis
of heavy duty 3-roller plate bending machine. The input variables for
the industry are plate thickness, shell diameter and material property
parameters, as it is fixed by the design. Analytical models of
equivalent thickness, equivalent width and maximum width based on
power law material model were derived to study the bendability.
Equation of maximum width provides bendability for designed
configuration i.e. material property, shell diameter and thickness
combinations within the machine limitations. Equivalent thicknesses
based on perfectly plastic and power law material model were
compared for four different materials grades of C-Mn steel in order
to predict the bend-ability. Effect of top roller offset on the
bendability at maximum top roller load imparting capacity is
reported.
Abstract: This paper presents the averaging model of a buck
converter derived from the generalized state-space averaging method.
The sliding mode control is used to regulate the output voltage of the
converter and taken into account in the model. The proposed model
requires the fast computational time compared with those of the full
topology model. The intensive time-domain simulations via the exact
topology model are used as the comparable model. The results show
that a good agreement between the proposed model and the switching
model is achieved in both transient and steady-state responses. The
reported model is suitable for the optimal controller design by using
the artificial intelligence techniques.
Abstract: The aim of this study was to screen for
microorganism that able to utilize 3-N-trimethylamino-1-propanol
(homocholine) as a sole source of carbon and nitrogen. The aerobic
degradation of homocholine has been found by a gram-positive
Rhodococcus sp. bacterium isolated from soil. The isolate was
identified as Rhodococcus sp. strain A4 based on the phenotypic
features, physiologic and biochemical characteristics, and
phylogenetic analysis. The cells of the isolated strain grown on both
basal-TMAP and nutrient agar medium displayed elementary
branching mycelia fragmented into irregular rod and coccoid
elements. Comparative 16S rDNA sequencing studies indicated that
the strain A4 falls into the Rhodococcus erythropolis subclade and
forms a monophyletic group with the type-strains of R. opacus, and
R. wratislaviensis. Metabolites analysis by capillary electrophoresis,
fast atom bombardment-mass spectrometry, and gas
chromatography- mass spectrometry, showed trimethylamine (TMA)
as the major metabolite beside β-alanine betaine and
trimethylaminopropionaldehyde. Therefore, the possible degradation
pathway of trimethylamino propanol in the isolated strain is through
consequence oxidation of alcohol group (-OH) to aldehyde (-CHO)
and acid (-COOH), and thereafter the cleavage of β-alanine betaine
C-N bonds yielded trimethylamine and alkyl chain.
Abstract: Using Turkish data, in this study it is investigated that
whether a firm’s ownership structure has an impact on its stock
prices after the crisis. A linear regression model is conducted on the
data of non-financial firms that are trading in Istanbul Stock
Exchange 100 Index (ISE 100) index. The findings show that, all
explanatory variables such as inside ownership, largest ownership,
concentrated ownership, foreign shareholders, family controlled and
dispersed ownership are not very important to explain stock prices
after the crisis. Family controlled firms and concentrated ownership
is positively related to stock price, dispersed ownership, largest
ownership, foreign shareholders, and inside ownership structures
have negative interaction between stock prices, but because of the p
value is not under the value of 0.05 this relation is not significant. In
addition, the analysis shows that, the shares of firms that have inside,
largest and dispersed ownership structure are outperform comparing
with the other firms. Furthermore, ownership concentrated firms
outperform to family controlled firms.
Abstract: The main objective of this study is to test the
relationship between numbers of variables representing the firm
characteristics (market-related variables) and the extent of voluntary
disclosure levels (forward-looking disclosure) in the annual reports of
Egyptian firms listed on the Egyptian Stock Exchange. The results
show that audit firm size is significantly positively correlated (in all
the three years) with the level of forward-looking disclosure.
However, industry type variable (which divided to: industries,
cement, construction, petrochemicals and services), is found being
insignificantly association with the level of forward-looking
information disclosed in the annual reports for all the three years.
Abstract: In this work, we present for the first time in our perception an efficient digital watermarking scheme for mpeg audio layer 3 files that operates directly in the compressed data domain, while manipulating the time and subband/channel domain. In addition, it does not need the original signal to detect the watermark. Our scheme was implemented taking special care for the efficient usage of the two limited resources of computer systems: time and space. It offers to the industrial user the capability of watermark embedding and detection in time immediately comparable to the real music time of the original audio file that depends on the mpeg compression, while the end user/audience does not face any artifacts or delays hearing the watermarked audio file. Furthermore, it overcomes the disadvantage of algorithms operating in the PCMData domain to be vulnerable to compression/recompression attacks, as it places the watermark in the scale factors domain and not in the digitized sound audio data. The strength of our scheme, that allows it to be used with success in both authentication and copyright protection, relies on the fact that it gives to the users the enhanced capability their ownership of the audio file not to be accomplished simply by detecting the bit pattern that comprises the watermark itself, but by showing that the legal owner knows a hard to compute property of the watermark.
Abstract: This paper presents an efficient method of obtaining a straight-line motion in the tool configuration space using an articulated robot between two specified points. The simulation results & the implementation results show the effectiveness of the method.
Abstract: The statistical process control (SPC) is one of the most powerful tools developed to assist ineffective control of quality, involves collecting, organizing and interpreting data during production. This article aims to show how the use of CEP industries can control and continuously improve product quality through monitoring of production that can detect deviations of parameters representing the process by reducing the amount of off-specification products and thus the costs of production. This study aimed to conduct a technological forecasting in order to characterize the research being done related to the CEP. The survey was conducted in the databases Spacenet, WIPO and the National Institute of Industrial Property (INPI). Among the largest are the United States depositors and deposits via PCT, the classification section that was presented in greater abundance to F.
Abstract: Webcam systems now function as the new privileged
vantage points from which to view the city. This transformation of
CCTV technology from surveillance to promotional tool is significant
because its'scopic regime' presents, back to the public, a new virtual
'site' that sits alongside its real-time counterpart. Significantly,
thisraw 'image' data can, in fact,be co-optedand processed so as to
disrupt their original purpose. This paper will demonstrate this
disruptive capacity through an architectural project. It will reveal how
the adaption the webcam image offers a technical springboard by
which to initiate alternate urban form making decisions and subvert
the disciplinary reliance on the 'flat' orthographic plan. In so doing,
the paper will show how this 'digital material' exceeds the imagistic
function of the image; shiftingit from being a vehicle of signification
to a site of affect.
Abstract: Modeling transfer phenomena in several chemical
engineering operations leads to the resolution of partial differential
equations systems. According to the complexity of the operations
mechanisms, the equations present a nonlinear form and analytical
solution became difficult, we have then to use numerical methods
which are based on approximations in order to transform a
differential system to an algebraic one.Finite element method is one
of numerical methods which can be used to obtain an accurate
solution in many complex cases of chemical engineering.The packed
columns find a large application like contactor for liquid-liquid
systems such solvent extraction. In the literature, the modeling of this
type of equipment received less attention in comparison with the
plate columns.A mathematical bidimensionnal model with radial and
axial dispersion, simulating packed tower extraction behavior was
developed and a partial differential equation was solved using the
finite element method by adopting the Galerkine model. We
developed a Mathcad program, which can be used for a similar
equations and concentration profiles are obtained along the column.
The influence of radial dispersion was prooved and it can-t be
neglected, the results were compared with experimental concentration
at the top of the column in the extraction system:
acetone/toluene/water.
Abstract: Dust storms are one of the most costly and destructive
events in many desert regions. They can cause massive damages both
in natural environments and human lives. This paper is aimed at
presenting a preliminary study on dust storms, as a major natural
hazard in arid and semi-arid regions. As a case study, dust storm
events occurred in Zabol city located in Sistan Region of Iran was
analyzed to diagnose and predict dust storms. The identification and
prediction of dust storm events could have significant impacts on
damages reduction. Present models for this purpose are complicated
and not appropriate for many areas with poor-data environments. The
present study explores Gamma test for identifying inputs of ANNs
model, for dust storm prediction. Results indicate that more attempts
must be carried out concerning dust storms identification and
segregate between various dust storm types.
Abstract: The more recent satellite projects/programs makes
extensive usage of real – time embedded systems. 16 bit processors
which meet the Mil-Std-1750 standard architecture have been used in
on-board systems. Most of the Space Applications have been written
in ADA. From a futuristic point of view, 32 bit/ 64 bit processors are
needed in the area of spacecraft computing and therefore an effort is
desirable in the study and survey of 64 bit architectures for space
applications. This will also result in significant technology
development in terms of VLSI and software tools for ADA (as the
legacy code is in ADA).
There are several basic requirements for a special processor for
this purpose. They include Radiation Hardened (RadHard) devices,
very low power dissipation, compatibility with existing operational
systems, scalable architectures for higher computational needs,
reliability, higher memory and I/O bandwidth, predictability, realtime
operating system and manufacturability of such processors.
Further on, these may include selection of FPGA devices, selection
of EDA tool chains, design flow, partitioning of the design, pin
count, performance evaluation, timing analysis etc.
This project deals with a brief study of 32 and 64 bit processors
readily available in the market and designing/ fabricating a 64 bit
RISC processor named RISC MicroProcessor with added
functionalities of an extended double precision floating point unit
and a 32 bit signal processing unit acting as co-processors. In this
paper, we emphasize the ease and importance of using Open Core
(OpenSparc T1 Verilog RTL) and Open “Source" EDA tools such as
Icarus to develop FPGA based prototypes quickly. Commercial tools
such as Xilinx ISE for Synthesis are also used when appropriate.
Abstract: We address the balancing problem of transfer lines in
this paper to find the optimal line balancing that minimizes the nonproductive
time. We focus on the tool change time and face
orientation change time both of which influence the makespane. We
consider machine capacity limitations and technological constraints
associated with the manufacturing process of auto cylinder heads.
The problem is represented by a mixed integer programming model
that aims at distributing the design features to workstations and
sequencing the machining processes at a minimum non-productive
time. The proposed model is solved by an algorithm established using
linearization schemes and Benders- decomposition approach. The
experiments show the efficiency of the algorithm in reaching the
exact solution of small and medium problem instances at reasonable
time.
Abstract: Crosstalk is the major limiting issue in very high bit-rate digital subscriber line (VDSL) systems in terms of bit-rate or service coverage. At the central office side, joint signal processing accompanied by appropriate power allocation enables complex multiuser processors to provide near capacity rates. Unfortunately complexity grows with the square of the number of lines within a binder, so by taking into account that there are only a few dominant crosstalkers who contribute to main part of crosstalk power, the canceller structure can be simplified which resulted in a much lower run-time complexity. In this paper, a multiuser power control scheme, namely iterative waterfilling, is combined with previously proposed partial crosstalk cancellation approaches to demonstrate the best ever achieved performance which is verified by simulation results.