Abstract: This paper reports on a receding horizon filtering for
mobile robot systems with cross-correlated sensor noises and
uncertainties. Also, the effect of uncertain parameters in the state of
the tracking error model performance is considered. A distributed
fusion receding horizon filter is proposed. The distributed fusion
filtering algorithm represents the optimal linear combination of the
local filters under the minimum mean square error criterion. The
derivation of the error cross-covariances between the local receding
horizon filters is the key of this paper. Simulation results of the
tracking mobile robot-s motion demonstrate high accuracy and
computational efficiency of the distributed fusion receding horizon
filter.
Abstract: This paper presents a systematic approach for the
design of power system stabilizer using genetic algorithm and
investigates the robustness of the GA based PSS. The proposed
approach employs GA search for optimal setting of PSS parameters.
The performance of the proposed GPSS under small and large
disturbances, loading conditions and system parameters is tested.
The eigenvalue analysis and nonlinear simulation results show the
effectiveness of the GPSS to damp out the system oscillations. It is
found tat the dynamic performance with the GPSS shows improved
results, over conventionally tuned PSS over a wide range of
operating conditions.
Abstract: Adaptive control involves modifying the control law
used by the controller to cope with the fact that the parameters of the
system being controlled change drastically due to change in
environmental conditions or in system itself. This technique is based
on the fundamental characteristic of adaptation of living organism.
The adaptive control process is one that continuously and
automatically measures the dynamic behavior of plant, compares it
with the desired output and uses the difference to vary adjustable
system parameters or to generate an actuating signal in such a way so
that optimal performance can be maintained regardless of system
changes. This paper deals with application of model reference
adaptive control scheme in first order system. The rule which is used
for this application is MIT rule. This paper also shows the effect of
adaptation gain on the system performance. Simulation is done in
MATLAB and results are discussed in detail.
Abstract: In this paper a new embedded Singly Diagonally
Implicit Runge-Kutta Nystrom fourth order in fifth order method for
solving special second order initial value problems is derived. A
standard set of test problems are tested upon and comparisons on the
numerical results are made when the same set of test problems are
reduced to first order systems and solved using the existing
embedded diagonally implicit Runge-Kutta method. The results
suggests the superiority of the new method.
Abstract: A manufacturing feature can be defined simply as a
geometric shape and its manufacturing information to create the shape.
In a feature-based process planning system, feature library that
consists of pre-defined manufacturing features and the manufacturing
information to create the shape of the features, plays an important role
in the extraction of manufacturing features with their proper
manufacturing information. However, to manage the manufacturing
information flexibly, it is important to build a feature library that can
be easily modified. In this paper, the implementation of Semantic Wiki
for the development of the feature library is proposed.
Abstract: The Integrated Management of Child illnesses (IMCI) and the surveillance Health Information Systems (HIS) are related strategies that are designed to manage child illnesses and community practices of diseases. However, both strategies do not function well together because of classification incompatibilities and, as such, are difficult to use by health care personnel in rural areas where a majority of people lack the basic knowledge of interpreting disease classification from these methods. This paper discusses a single approach on how a stand-alone expert system can be used as a prompt diagnostic tool for all cases of illnesses presented. The system combines the action-oriented IMCI and the disease-oriented HIS approaches to diagnose malaria and typhoid fever in the rural areas of the Niger-delta region.
Abstract: It is important to give input information without other device in AR system. One solution is using hand for augmented reality application. Many researchers have proposed different solutions for hand interface in augmented reality. Analyze Histogram and connecting factor is can be example for that. Various Direction searching is one of robust way to recognition hand but it takes too much calculating time. And background should be distinguished with skin color. This paper proposes a hand tracking method to control the 3D object in augmented reality using depth device and skin color. Also in this work discussed relationship between several markers, which is based on relationship between camera and marker. One marker used for displaying virtual object and three markers for detecting hand gesture and manipulating the virtual object.
Abstract: This paper presents the results of enhancing images from a left and right stereo pair in order to increase the resolution of a 3D representation of a scene generated from that same pair. A new neural network structure known as a Self Delaying Dynamic Network (SDN) has been used to perform the enhancement. The advantage of SDNs over existing techniques such as bicubic interpolation is their ability to cope with motion and noise effects. SDNs are used to generate two high resolution images, one based on frames taken from the left view of the subject, and one based on the frames from the right. This new high resolution stereo pair is then processed by a disparity map generator. The disparity map generated is compared to two other disparity maps generated from the same scene. The first is a map generated from an original high resolution stereo pair and the second is a map generated using a stereo pair which has been enhanced using bicubic interpolation. The maps generated using the SDN enhanced pairs match more closely the target maps. The addition of extra noise into the input images is less problematic for the SDN system which is still able to out perform bicubic interpolation.
Abstract: In this paper, the feasibility study of using a hybrid
system of ground heat exchangers (GHE) and direct evaporative
cooling system in arid weather condition has been performed. The
model is applied for Yazd and Kerman, two cities with arid weather
condition in Iran. The system composed of three sections: Ground-
Coupled-Circuit (GCC), Direct Evaporative Cooler (DEC) and
Cooling Coil Unite (CCU). The GCC provides the necessary precooling
for DEC. The GCC includes four vertical GHE which are
designed in series configuration. Simulation results show that
hybridization of GCC and DEC could provide comfort condition
whereas DEC alone did not. Based on the results the cooling
effectiveness of a hybrid system is more than unity. Thus, this novel
hybrid system could decrease the air temperature below the ambient
wet-bulb temperature. This environmentally clean and energy
efficient system can be considered as an alternative to the mechanical
vapor compression systems.
Abstract: Scale Time Offset Robust Modulation (STORM) [1]–
[3] is a high bandwidth waveform design that adds time-scale
to embedded reference modulations using only time-delay [4]. In
an environment where each user has a specific delay and scale,
identification of the user with the highest signal power and that
user-s phase is facilitated by the STORM processor. Both of these
parameters are required in an efficient multiuser detection algorithm.
In this paper, the STORM modulation approach is evaluated with
a direct sequence spread quadrature phase shift keying (DS-QPSK)
system. A misconception of the STORM time scale modulation is that
a fine temporal resolution is required at the receiver. STORM will
be applied to a QPSK code division multiaccess (CDMA) system
by modifying the spreading codes. Specifically, the in-phase code
will use a typical spreading code, and the quadrature code will
use a time-delayed and time-scaled version of the in-phase code.
Subsequently, the same temporal resolution in the receiver is required
before and after the application of STORM. In this paper, the bit error
performance of STORM in a synchronous CDMA system is evaluated
and compared to theory, and the bit error performance of STORM
incorporated in a single user WCDMA downlink is presented to
demonstrate the applicability of STORM in a modern communication
system.
Abstract: The proof of concept experiments were conducted to
determine the feasibility of using small amounts of Dissolved
Sulphur (DS) from the gaseous phase to precipitate platinum ions in
chloride media. Two sets of precipitation experiments were
performed in which the source of sulphur atoms was either a
thiosulphate solution (Na2S2O3) or a sulphur dioxide gas (SO2). In
liquid-liquid (L-L) system, complete precipitation of Pt was achieved
at small dosages of Na2S2O3 (0.01 – 1.0 M) in a time interval of 3-5
minutes. On the basis of this result, gas absorption tests were carried
out mainly to achieve sulphur solubility equivalent to 0.018 M. The
idea that huge amounts of precious metals could be recovered
selectively from their dilute solutions by utilizing the waste SO2
streams at low pressure seemed attractive from the economic and
environmental point of views. Therefore, mass transfer characteristics
of SO2 gas associated with reactive absorption across the gas-liquid
(G-L) interface were evaluated under different conditions of pressure
(0.5 – 2 bar), solution temperature ranges from 20 – 50 oC and acid
strength (1 – 4 M, HCl). This paper concludes with information about
selective precipitation of Pt in the presence of cations (Fe2+, Co2+,
and Cr3+) in a CSTR and recommendation to scale up laboratory data
to industrial pilot scale operations.
Abstract: In this paper the neural network-based controller is
designed for motion control of a mobile robot. This paper treats the
problems of trajectory following and posture stabilization of the
mobile robot with nonholonomic constraints. For this purpose the
recurrent neural network with one hidden layer is used. It learns
relationship between linear velocities and error positions of the
mobile robot. This neural network is trained on-line using the
backpropagation optimization algorithm with an adaptive learning
rate. The optimization algorithm is performed at each sample time to
compute the optimal control inputs. The performance of the proposed
system is investigated using a kinematic model of the mobile robot.
Abstract: We propose a decoy-pulse protocol for frequency-coded implementation of B92 quantum key distribution protocol. A direct extension of decoy-pulse method to frequency-coding scheme results in security loss as an eavesdropper can distinguish between signal and decoy pulses by measuring the carrier photon number without affecting other statistics. We overcome this problem by optimizing the ratio of carrier photon number of decoy-to-signal pulse to be as close to unity as possible. In our method the switching between signal and decoy pulses is achieved by changing the amplitude of RF signal as opposed to modulating the intensity of optical signal thus reducing system cost. We find an improvement by a factor of 100 approximately in the key generation rate using decoy-state protocol. We also study the effect of source fluctuation on key rate. Our simulation results show a key generation rate of 1.5×10-4/pulse for link lengths up to 70km. Finally, we discuss the optimum value of average photon number of signal pulse for a given key rate while also optimizing the carrier ratio.
Abstract: The Chinese Postman Problem (CPP) is one of the
classical problems in graph theory and is applicable in a wide range
of fields. With the rapid development of hybrid systems and model
based testing, Chinese Postman Problem with Time Dependent Travel
Times (CPPTDT) becomes more realistic than the classical problems.
In the literature, we have proposed the first integer programming
formulation for the CPPTDT problem, namely, circuit formulation,
based on which some polyhedral results are investigated and a cutting
plane algorithm is also designed. However, there exists a main drawback:
the circuit formulation is only available for solving the special
instances with all circuits passing through the origin. Therefore, this
paper proposes a new integer programming formulation for solving
all the general instances of CPPTDT. Moreover, the size of the circuit
formulation is too large, which is reduced dramatically here. Thus, it
is possible to design more efficient algorithm for solving the CPPTDT
in the future research.
Abstract: Environment both endowed and built are essential for
tourism. However tourism and environment maintains a complex
relationship, where in most cases environment is at the receiving end.
Many tourism development activities have adverse environmental
effects, mainly emanating from construction of general infrastructure
and tourism facilities. These negative impacts of tourism can lead to
the destruction of precious natural resources on which it depends.
These effects vary between locations; and its effect on a hill
destination is highly critical. This study aims at developing a
Sustainable Tourism Planning Model for an environmentally
sensitive tourism destination in Kerala, India. Being part of the
Nilgiri mountain ranges, Munnar falls in the Western Ghats, one of
the biological hotspots in the world. Endowed with a unique high
altitude environment Munnar inherits highly significant ecological
wealth. Giving prime importance to the protection of this ecological
heritage, the study proposes a tourism planning model with resource
conservation and sustainability as the paramount focus. Conceiving a
novel approach towards sustainable tourism planning, the study
proposes to assess tourism attractions using Ecological Sensitivity
Index (ESI) and Tourism Attractiveness Index (TAI). Integration of
these two indices will form the Ecology – Tourism Matrix (ETM),
outlining the base for tourism planning in an environmentally
sensitive destination. The ETM Matrix leads to a classification of
tourism nodes according to its Conservation Significance and
Tourism Significance. The spatial integration of such nodes based on
the Hub & Spoke Principle constitutes sub – regions within the STZ.
Ensuing analyses lead to specific guidelines for the STZ as a whole,
specific tourism nodes, hubs and sub-regions. The study results in a
multi – dimensional output, viz., (1) Classification system for tourism
nodes in an environmentally sensitive region/ destination (2)
Conservation / Tourism Development Strategies and Guidelines for
the micro and macro regions and (3) A Sustainable Tourism Planning
Tool particularly for Ecologically Sensitive Destinations, which can
be adapted for other destinations as well.
Abstract: This paper presents a genetic algorithm based
approach for solving security constrained optimal power flow
problem (SCOPF) including FACTS devices. The optimal location of
FACTS devices are identified using an index called overload index
and the optimal values are obtained using an enhanced genetic
algorithm. The optimal allocation by the proposed method optimizes
the investment, taking into account its effects on security in terms of
the alleviation of line overloads. The proposed approach has been
tested on IEEE-30 bus system to show the effectiveness of the
proposed algorithm for solving the SCOPF problem.
Abstract: Modeling product configurations needs large amounts of knowledge about technical and marketing restrictions on the product. Previous attempts to automate product configurations concentrate on representations and management of the knowledge for specific domains in fixed and isolated computing environments. Since the knowledge about product configurations is subject to continuous change and hard to express, these attempts often failed to efficiently manage and exchange the knowledge in collaborative product development. In this paper, XML Topic Map (XTM) is introduced to represent and exchange the knowledge about product configurations in collaborative product development. A product configuration model based on XTM along with its merger and inference facilities enables configuration engineers in collaborative product development to manage and exchange their knowledge efficiently. A prototype implementation is also presented to demonstrate the proposed model can be applied to engineering information systems to exchange the product configuration knowledge.
Abstract: This paper is concerned with the application of the vision control algorithm for robot's point placement task in discontinuous trajectory caused by obstacle. The presented vision control algorithm consists of four models, which are the robot kinematic model, vision system model, parameters estimation model, and robot joint angle estimation model.When the robot moves toward a target along discontinuous trajectory, several types of obstacles appear in two obstacle regions. Then, this study is to investigate how these changes will affect the presented vision control algorithm.Thus, the practicality of the vision control algorithm is demonstrated experimentally by performing the robot's point placement task in discontinuous trajectory by obstacle.
Abstract: Tanzania is a developing country, which significantly lags behind the rest of the world in information communications technology (ICT), especially for the Internet. Internet connectivity to the rest of the world is via expensive satellite links, thus leaving the majority of the population unable to access the Internet due to the high cost. This paper introduces the concept of an optical WDM network for Internet infrastructure in Tanzania, so as to reduce Internet connection costs, and provide Internet access to the majority of people who live in both urban and rural areas. We also present a proposed optical WDM network, which mitigates the effects of system impairments, and provide simulation results to show that the data is successfully transmitted over a longer distance using a WDM network.
Abstract: This paper describes the design and results of FROID,
an outbound intrusion detection system built with agent technology
and supported by an attacker-centric ontology. The prototype
features a misuse-based detection mechanism that identifies remote
attack tools in execution. Misuse signatures composed of attributes
selected through entropy analysis of outgoing traffic streams and
process runtime data are derived from execution variants of attack
programs. The core of the architecture is a mesh of self-contained
detection cells organized non-hierarchically that group agents in a
functional fashion. The experiments show performance gains when
the ontology is enabled as well as an increase in accuracy achieved
when correlation cells combine detection evidence received from
independent detection cells.