Search results for: Levenberg-Marquardt method
3315 Fabrication and Characterization of Sawdust Composite Biodegradable Film
Authors: M.Z. Norashikin, M.Z. Ibrahim
Abstract:
This report shows the performance of composite biodegradable film from chitosan, starch and sawdust fiber. The main objectives of this research are to fabricate and characterize composite biodegradable film in terms of morphology and physical properties. The film was prepared by casting method. Sawdust fiber was used as reinforcing agent and starch as polymer matrix in the casting solution. The morphology of the film was characterized using atomic force microscope (AFM). The result showed that the film has smooth structure. Chemical composition of the film was investigated using Fourier transform infrared (FTIR) where the result revealed present of starch in the film. The thermal properties were characterized using thermal gravimetric analyzer (TGA) and differential scanning calorimetric (DSC) where the results showed that the film has small difference in melting and degradation temperature.Keywords: Sawdust, composite, film, biodegradable.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 26053314 Antibacterial Activity of Lactic Acid Bacteria Isolated from Table Olives against Skin Pathogens
Authors: M. Shafighi, Z. Emami, M. Shahsanaei, E. Khaliliyan
Abstract:
The aim of this study was to assess the effect of LAB isolated from Iranian native olives on the opportunistic skin pathogens, Pseudomonas aeruginosa and Staphylococcus aureus. Lactic Acid Bacteria were isolated from the brine of each sample in the prior of time. The samples were spread on MRS agar for isolation of lactobacillus and for lactococcus. 28 strains of labs were isolated. The labs were centrifuged, the supernatant was strewed and pellet was used to inoculation in wells or at blank disks. 20μl of each pellet was inoculated to blank disks and 40μl of each pellet was inoculated to each well. The result of disk and well diffusion agar against these pathogens were confirmed each other. The size of inhibition zone was different according to the type of bacteria, the method and the concentrations of labs.Keywords: Olive, Probiotic, Lactic Acid Bacteria (LAB), P.aeroginosa and S.aureus
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 20963313 Synthesis of SnO Novel Cabbage Nanostructure and Its Electrochemical Property as an Anode Material for Lithium Ion Battery
Authors: Yongkui Cui, Fengping Wang, Hailai Zhao, Muhammad Zubair Iqbal, Ziya Wang, Yan Li, Pengpeng L. V.
Abstract:
The novel 3D SnO cabbages self-assembled by nanosheets were successfully synthesized via template-free hydrothermal growth method under facile conditions. The XRD results manifest that the as-prepared SnO is tetragonal phase. The TEM and HRTEM results show that the cabbage nanosheets are polycrystalline structure consisted of considerable single-crystalline nanoparticles. Two typical Raman modes A1g=210 and Eg=112 cm-1 of SnO are observed by Raman spectroscopy. Moreover, galvanostatic cycling tests has been performed using the SnO cabbages as anode material of lithium ion battery and the electrochemical results suggest that the synthesized SnO cabbage structures are a promising anode material for lithium ion batteries.Keywords: Hydrothermal process, lithium ion battery, Raman spectroscopy, stannous oxide.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 21063312 Coupling Concept of two Parallel Research Codes for Two and Three Dimensional Fluid Structure Interaction Analysis
Authors: Luciano Garelli, Marco Schauer, Jorge D’Elia, Mario A. Storti, Sabine C. Langer
Abstract:
This paper discuss a coupling strategy of two different software packages to provide fluid structure interaction (FSI) analysis. The basic idea is to combine the advantages of the two codes to create a powerful FSI solver for two and three dimensional analysis. The fluid part is computed by a program called PETSc-FEM a software developed at Centro de Investigaci´on de M´etodos Computacionales –CIMEC. The structural part of the coupled process is computed by the research code elementary Parallel Solver – (ELPASO) of the Technische Universit¨at Braunschweig, Institut f¨ur Konstruktionstechnik (IK).
Keywords: Computational Fluid Dynamics (CFD), Fluid Structure Interaction (FSI), Finite Element Method (FEM).
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 19433311 Experimentation on Piercing with Abrasive Waterjet
Authors: Johan Fredin, Anders Jönsson
Abstract:
Abrasive waterjet cutting (AWJ) is a highly efficient method for cutting almost any type of material. When holes shall be cut the waterjet first needs to pierce the material.This paper presents a vast experimental analysis of piercing parameters effect on piercing time. Results from experimentation on feed rates, work piece thicknesses, abrasive flow rates, standoff distances and water pressure are also presented as well as studies on three methods for dynamic piercing. It is shown that a large amount of time and resources can be saved by choosing the piercing parameters in a correct way. The large number of experiments puts demands on the experimental setup. An automated experimental setup including piercing detection is presented to enable large series of experiments to be carried out efficiently.Keywords: Waterjet cutting, Piercing, Experimentation
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 24473310 Resistor-less Current-mode Universal Biquad Filter Using CCTAs and Grounded Capacitors
Authors: T. Thosdeekoraphat, S. Summart, C. Saetiaw, S. Santalunai, C. Thongsopa
Abstract:
This article presents a current-mode universal biquadratic filter. The proposed circuit can apparently provide standard functions of the biquad filter: low-pass, high-pass, bandpass, band-reject and all-pass functions. The circuit uses 4 current controlled transconductance amplifiers (CCTAs) and 2 grounded capacitors. In addition, the pole frequency and quality factor can be adjusted by electronic method by adjusting the bias currents of the CCTA. The proposed circuit uses only grounded capacitors without additional external resistors, the proposed circuit is considerably appropriate to further developing into an integrated circuit. The results of PSPICE simulation program are corresponding to the theoretical analysis.
Keywords: Resistor-less, Current-mode, Biquad filter, CCTA.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 20623309 Stability Bound of Ruin Probability in a Reduced Two-Dimensional Risk Model
Authors: Zina Benouaret, Djamil Aissani
Abstract:
In this work, we introduce the qualitative and quantitative concept of the strong stability method in the risk process modeling two lines of business of the same insurance company or an insurance and re-insurance companies that divide between them both claims and premiums with a certain proportion. The approach proposed is based on the identification of the ruin probability associate to the model considered, with a stationary distribution of a Markov random process called a reversed process. Our objective, after clarifying the condition and the perturbation domain of parameters, is to obtain the stability inequality of the ruin probability which is applied to estimate the approximation error of a model with disturbance parameters by the considered model. In the stability bound obtained, all constants are explicitly written.Keywords: Markov chain, risk models, ruin probabilities, strong stability analysis.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 8883308 Lodging Business Management in Nakhon Pathom with Sufficient Economy Approach
Authors: Krisada Sungkhamanee
Abstract:
The objectives of this research are to search the management pattern of Nakhon Pathom lodging entrepreneurs for sufficient economy ways, to know the threat that affects this sector and design fit arrangement model to sustain their business with Nakhon Pathom style. What will happen if they do not use this approach? Will they have a financial crisis? The data and information are collected by informal discussions with 12 managers and 400 questionnaires. A mixed method of both qualitative research and quantitative research are used. Bent Flyvbjerg’s phronesis is utilized for this analysis. Our research will prove that sufficient economy can help small business firms to solve their problems. We think that the results of our research will be a financial model to solve many problems of the entrepreneurs and this way will can be a model for other provinces of Thailand.
Keywords: Nakhon Pathom Province, Lodging Business, Sufficient Economy.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 40193307 Locating Critical Failure Surface in Rock Slope Stability with Hybrid Model Based on Artificial Immune System and Cellular Learning Automata (CLA-AIS)
Authors: Ramin Javadzadeh, Emad Javadzadeh
Abstract:
Locating the critical slip surface with the minimum factor of safety for a rock slope is a difficult problem. In recent years, some modern global optimization methods have been developed with success in treating various types of problems, but very few of such methods have been applied to rock mechanical problems. In this paper, use of hybrid model based on artificial immune system and cellular learning automata is proposed. The results show that the algorithm is an effective and efficient optimization method with a high level of confidence rate.
Keywords: CLA-AIS, failure surface, optimization methods, rock slope.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 20113306 Visual Object Tracking and Interception in Industrial Settings
Authors: Ahmet Denker, Tuğrul Adıgüzel
Abstract:
This paper presents a solution for a robotic manipulation problem. We formulate the problem as combining target identification, tracking and interception. The task in our solution is sensing a target on a conveyor belt and then intercepting robot-s end-effector at a convenient rendezvous point. We used an object recognition method which identifies the target and finds its position from visualized scene picture, then the robot system generates a solution for rendezvous problem using the target-s initial position and belt velocity . The interception of the target and the end-effector is executed at a convenient rendezvous point along the target-s calculated trajectory. Experimental results are obtained using a real platform with an industrial robot and a vision system over it.Keywords: Object recognition, rendezvous planning, robotics.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 17263305 Owner/Managers’ External Financing Used and Preference towards Islamic Banking
Authors: Khalid Hassan Abdesamed, Kalsom Abd Wahab
Abstract:
Economic development and growth are significantly linked to the consistent and sustainable sector of small and medium enterprises (SMEs). Banks are the frontrunners in financing and advising SMEs. The main objective of the study is to assess the tendency of SMEs to use the Islamic bank. Model was developed using quantitative method with a hypothetical-deductive testing approach. Model (N = 364) used primary data on the tendency of SMEs to use Islamic banks gathered from questionnaire. It is found by Mann-Whitney test that the tendency to use Islamic bank varies between those firms which consider formal financing with the ones relying on informal financing with the latter tends more to use Islamic bank. This study can serve academic researchers, policy makers, and developing countries as a model of SMEs’ desirability to Islamic banking.Keywords: Formal financing, informal financing, Islamic bank, SMEs.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 16663304 Experimental Performance and Numerical Simulation of Double Glass Wall
Authors: Thana Ananacha
Abstract:
This paper reports the numerical and experimental performances of Double Glass Wall are investigated. Two configurations were considered namely, the Double Clear Glass Wall (DCGW) and the Double Translucent Glass Wall (DTGW). The coupled governing equations as well as boundary conditions are solved using the finite element method (FEM) via COMSOLTM Multiphysics. Temperature profiles and flow field of the DCGW and DTGW are reported and discussed. Different constant heat fluxes were considered as 400 and 800 W.m-2 the corresponding initial condition temperatures were 30.5 and 38.5ºC respectively. The results show that the simulation results are in agreement with the experimental data. Conclusively, the model considered in this study could reasonable be used simulate the thermal and ventilation performance of the DCGW and DTGW configurations.
Keywords: Thermal simulation, Double Glass Wall, Velocity field.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 20943303 A Hybrid Method for Determination of Effective Poles Using Clustering Dominant Pole Algorithm
Authors: Anuj Abraham, N. Pappa, Daniel Honc, Rahul Sharma
Abstract:
In this paper, an analysis of some model order reduction techniques is presented. A new hybrid algorithm for model order reduction of linear time invariant systems is compared with the conventional techniques namely Balanced Truncation, Hankel Norm reduction and Dominant Pole Algorithm (DPA). The proposed hybrid algorithm is known as Clustering Dominant Pole Algorithm (CDPA), is able to compute the full set of dominant poles and its cluster center efficiently. The dominant poles of a transfer function are specific eigenvalues of the state space matrix of the corresponding dynamical system. The effectiveness of this novel technique is shown through the simulation results.
Keywords: Balanced truncation, Clustering, Dominant pole, Hankel norm, Model reduction.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 26873302 Digital Forensics for Electronic Commerce on the Web
Authors: Ryuya Uda
Abstract:
On existing online shopping on the web, SSL and password are usually used to achieve the secure trades. SSL shields communication from the third party who is not related with the trade, and indicates that the trader's web site is authenticated by one of the certification authority. Password certifies a customer as the same person who has visited the trader's web site before, and protects the customer's privacy such as what the customer has bought on the site. However, there is no forensics for the trades in those cased above. With existing methods, no one can prove what is ordered by customers, how many products are ordered and even whether customers have ordered or not. The reason is that the third party has to guess what were traded with logs that are held by traders and by customers. The logs can easily be created, deleted and forged since they are electronically stored. To enhance security with digital forensics for electronic commerce on the web, I indicate a secure method with cellular phones.Keywords: Cellular Phone, Digital Forensics, ElectronicCommerce, Information Security
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 18393301 IFS on the Multi-Fuzzy Fractal Space
Authors: Nadia M. G. AL-Sa'idi, Muhammad Rushdan Md. Sd., Adil M. Ahmed
Abstract:
The IFS is a scheme for describing and manipulating complex fractal attractors using simple mathematical models. More precisely, the most popular “fractal –based" algorithms for both representation and compression of computer images have involved some implementation of the method of Iterated Function Systems (IFS) on complete metric spaces. In this paper a new generalized space called Multi-Fuzzy Fractal Space was constructed. On these spases a distance function is defined, and its completeness is proved. The completeness property of this space ensures the existence of a fixed-point theorem for the family of continuous mappings. This theorem is the fundamental result on which the IFS methods are based and the fractals are built. The defined mappings are proved to satisfy some generalizations of the contraction condition.
Keywords: Fuzzy metric space, Fuzzy fractal space, Multi fuzzy fractal space.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 19733300 Trabecular Texture Analysis Using Fractal Metrics for Bone Fragility Assessment
Authors: Khaled Harrar, Rachid Jennane
Abstract:
The purpose of this study is the discrimination of 28 postmenopausal with osteoporotic femoral fractures from an agematched control group of 28 women using texture analysis based on fractals. Two pre-processing approaches are applied on radiographic images; these techniques are compared to highlight the choice of the pre-processing method. Furthermore, the values of the fractal dimension are compared to those of the fractal signature in terms of the classification of the two populations. In a second analysis, the BMD measure at proximal femur was compared to the fractal analysis, the latter, which is a non-invasive technique, allowed a better discrimination; the results confirm that the fractal analysis of texture on calcaneus radiographs is able to discriminate osteoporotic patients with femoral fracture from controls. This discrimination was efficient compared to that obtained by BMD alone. It was also present in comparing subgroups with overlapping values of BMD.Keywords: Osteoporosis, fractal dimension, fractal signature, bone mineral density.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 23283299 New Graph Similarity Measurements based on Isomorphic and Nonisomorphic Data Fusion and their Use in the Prediction of the Pharmacological Behavior of Drugs
Authors: Irene Luque Ruiz, Manuel Urbano Cuadrado, Miguel Ángel Gómez-Nieto
Abstract:
New graph similarity methods have been proposed in this work with the aim to refining the chemical information extracted from molecules matching. For this purpose, data fusion of the isomorphic and nonisomorphic subgraphs into a new similarity measure, the Approximate Similarity, was carried out by several approaches. The application of the proposed method to the development of quantitative structure-activity relationships (QSAR) has provided reliable tools for predicting several pharmacological parameters: binding of steroids to the globulin-corticosteroid receptor, the activity of benzodiazepine receptor compounds, and the blood brain barrier permeability. Acceptable results were obtained for the models presented here.
Keywords: Graph similarity, Nonisomorphic dissimilarity, Approximate similarity, Drug activity prediction.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 16533298 2D Fracture Analysis of the First Compression Piston Ring
Authors: I. Razmi, N. Choupani
Abstract:
The incidence of mechanical fracture of an automobile piston rings prompted development of fracture analysis method on this case. The three rings (two compression rings and one oil ring) were smashed into several parts during the power-test (after manufacturing the engine) causing piston and liner to be damaged. The radial and oblique cracking happened on the failed piston rings. The aim of the fracture mechanics simulations presented in this paper was the calculation of particular effective fracture mechanics parameters, such as J-integrals and stress intensity factors. Crack propagation angles were calculated as well. Two-dimensional fracture analysis of the first compression ring has been developed in this paper using ABAQUS CAE6.5-1 software. Moreover, SEM fractography was developed on fracture surfaces and is discussed in this paper. Results of numerical calculations constitute the basis for further research on real object.Keywords: Compression piston ring, Crack, Fracture mechanics, SEM fractography.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 23793297 Using Morphological and Microsatellite (SSR) Markers to Assess the Genetic Diversity in Alfalfa (Medicago sativa L.)
Authors: T. Cholastova, D. Knotova
Abstract:
Utilization of diverse germplasm is needed to enhance the genetic diversity of cultivars. The objective of this study was to evaluate the genetic relationships of 98 alfalfa germplasm accessions using morphological traits and SSR markers. From the 98 tested populations, 81 were locals originating in Europe, 17 were introduced from USA, Australia, New Zealand and Canada. Three primers generated 67 polymorphic bands. The average polymorphic information content (PIC) was very high (> 0.90) over all three used primer combinations. Cluster analysis using Unweighted Pair Group Method with Arithmetic Means (UPGMA) and Jaccard´s coefficient grouped the accessions into 2 major clusters with 4 sub-clusters with no correlation between genetic and morphological diversity. The SSR analysis clearly indicated that even with three polymorphic primers, reliable estimation of genetic diversity could be obtained.Keywords: genetic diversity, Medicago sativa L., morphological traits, SSR markers
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 31013296 Relating Interface Properties with Crack Propagation in Composite Laminates
Authors: Tao Qu, Chandra Prakash, Vikas Tomar
Abstract:
The interfaces between organic and inorganic phases in natural materials have been shown to be a key factor contributing to their high performance. This work analyzes crack propagation in a 2-ply laminate subjected to uniaxial tensile mode-I crack propagation loading that has laminate properties derived based on biological material constituents (marine exoskeleton- chitin and calcite). Interfaces in such laminates are explicitly modeled based on earlier molecular simulations performed by authors. Extended finite element method and cohesive zone modeling based simulations coupled with theoretical analysis are used to analyze crack propagation. Analyses explicitly quantify the effect that interface mechanical property variation has on the delamination as well as the transverse crack propagation in examined 2-ply laminates.
Keywords: Chitin, composites, interfaces, fracture.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 14063295 Correlation of Viscosity in Nanofluids using Genetic Algorithm-neural Network (GA-NN)
Authors: Hajir Karimi, Fakheri Yousefi, Mahmood Reza Rahimi
Abstract:
An accurate and proficient artificial neural network (ANN) based genetic algorithm (GA) is developed for predicting of nanofluids viscosity. A genetic algorithm (GA) is used to optimize the neural network parameters for minimizing the error between the predictive viscosity and the experimental one. The experimental viscosity in two nanofluids Al2O3-H2O and CuO-H2O from 278.15 to 343.15 K and volume fraction up to 15% were used from literature. The result of this study reveals that GA-NN model is outperform to the conventional neural nets in predicting the viscosity of nanofluids with mean absolute relative error of 1.22% and 1.77% for Al2O3-H2O and CuO-H2O, respectively. Furthermore, the results of this work have also been compared with others models. The findings of this work demonstrate that the GA-NN model is an effective method for prediction viscosity of nanofluids and have better accuracy and simplicity compared with the others models.Keywords: genetic algorithm, nanofluids, neural network, viscosity
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 20853294 Non-Linear Control Based on State Estimation for the Convoy of Autonomous Vehicles
Authors: M-M. Mohamed Ahmed, Nacer K. M’Sirdi, Aziz Naamane
Abstract:
In this paper, a longitudinal and lateral control approach based on a nonlinear observer is proposed for a convoy of autonomous vehicles to follow a desired trajectory. To authors best knowledge, this topic has not yet been sufficiently addressed in the literature for the control of multi vehicles. The modeling of the convoy of the vehicles is revisited using a robotic method for simulation purposes and control design. With these models, a sliding mode observer is proposed to estimate the states of each vehicle in the convoy from the available sensors, then a sliding mode control based on this observer is used to control the longitudinal and lateral movement. The validation and performance evaluation are done using the well-known driving simulator Scanner-Studio. The results are presented for different maneuvers of 5 vehicles.Keywords: Autonomous vehicles, convoy, nonlinear control, nonlinear observer, sliding mode.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 7263293 The Economic Lot Scheduling Problem in Flow Lines with Sequence-Dependent Setups
Authors: M. Heydari, S. A. Torabi
Abstract:
The problem of lot sizing, sequencing and scheduling multiple products in flow line production systems has been studied by several authors. Almost all of the researches in this area assumed that setup times and costs are sequence –independent even though sequence dependent setups are common in practice. In this paper we present a new mixed integer non linear program (MINLP) and a heuristic method to solve the problem in sequence dependent case. Furthermore, a genetic algorithm has been developed which applies this constructive heuristic to generate initial population. These two proposed solution methods are compared on randomly generated problems. Computational results show a clear superiority of our proposed GA for majority of the test problems.Keywords: Economic lot scheduling problem, finite horizon, genetic algorithm, mixed zero-one nonlinear programming, sequence-dependent.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 15383292 Mathematical Modelling of Single Phase Unity Power Factor Boost Converter
Authors: Sanjay L. Kurkute, Pradeep M. Patil, Kakasaheb C. Mohite
Abstract:
An optimal control strategy based on simple model, a single phase unity power factor boost converter is presented with an evaluation of first order differential equations. This paper presents an evaluation of single phase boost converter having power factor correction. The simple discrete model of boost converter is formed and optimal control is obtained, digital PI is adopted to adjust control error. The method of instantaneous current control is proposed in this paper for its good tracking performance of dynamic response. The simulation and experimental results verified our design.Keywords: Single phase, boost converter, Power factor correction (PFC), Pulse Width Modulation (PWM).
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 34543291 An Efficient Heuristic for the Minimum Connected Dominating Set Problem on Ad Hoc Wireless Networks
Authors: S. Balaji, N. Revathi
Abstract:
Connected dominating set (CDS) problem in unit disk graph has signi£cant impact on an ef£cient design of routing protocols in wireless sensor networks, where the searching space for a route is reduced to nodes in the set. A set is dominating if all the nodes in the system are either in the set or neighbors of nodes in the set. In this paper, a simple and ef£cient heuristic method is proposed for £nding a minimum connected dominating set (MCDS) in ad hoc wireless networks based on the new parameter support of vertices. With this parameter the proposed heuristic approach effectively £nds the MCDS of a graph. Extensive computational experiments show that the proposed approach outperforms the recently proposed heuristics found in the literature for the MCDKeywords: ad hoc wireless networks, dominating sets, unit disk graphs, heuristic.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 22053290 Bi-Lateral Comparison between NIS-Egypt and NMISA-South Africa for the Calibration of an Optical Time Domain Reflectometer
Authors: Osama Terra, Mariesa Nel, Hatem Hussein
Abstract:
Calibration of Optical Time Domain Reflectometer (OTDR) has a crucial role for the accurate determination of fault locations and the accurate calculation of loss budget of long-haul optical fibre links during installation and repair. A comparison has been made between the Egyptian National Institute for Standards (NIS-Egypt) and the National Metrology institute of South Africa (NMISA-South Africa) for the calibration of an OTDR. The distance and the attenuation scales of a transfer OTDR have been calibrated by both institutes using their standards according to the standard IEC 61746-1 (2009). The results of this comparison have been compiled in this report.
Keywords: OTDR calibration, recirculating loop, concatenated method, standard fibre.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 9353289 Nonlinear Integral-Type Sliding Surface for Synchronization of Chaotic Systems with Unknown Parameters
Authors: Hongji Tang, Yanbo Gao, Yue Yu
Abstract:
This paper presents a new nonlinear integral-type sliding surface for synchronizing two different chaotic systems with parametric uncertainty. On the basis of Lyapunov theorem and average dwelling time method, we obtain the control gains of controllers which are derived to achieve chaos synchronization. In order to reduce the gains, the error system is modeled as a switching system. We obtain the sufficient condition drawn for the robust stability of the error dynamics by stability analysis. Then we apply it to guide the design of the controllers. Finally, numerical examples are used to show the robustness and effectiveness of the proposed control strategy.
Keywords: Chaos synchronization, Nonlinear sliding surface, Control gains, Sliding mode control.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 20243288 Gasoline and Diesel Production via Fischer- Tropsch Synthesis over Cobalt Based Catalyst
Authors: N. Choosri, N. Swadchaipong, T. Utistham, U. W. Hartley
Abstract:
Performance of a cobalt doped sol-gel derived silica (Co/SiO2) catalyst for Fischer–Tropsch synthesis (FTS) in slurryphase reactor was studied using paraffin wax as initial liquid media. The reactive mixed gas, hydrogen (H2) and carbon monoxide (CO) in a molar ratio of 2:1, was flowed at 50 ml/min. Braunauer-Emmett- Teller (BET) surface area and X-ray diffraction (XRD) techniques were employed to characterize both the specific surface area and crystallinity of the catalyst, respectively. The reduction behavior of Co/SiO2 catalyst was investigated using the Temperature Programmmed Reduction (TPR) method. Operating temperatures were varied from 493 to 533K to find the optimum conditions to maximize liquid fuels production, gasoline and diesel.
Keywords: Fischer Tropsch synthesis, slurry phase, Co/SiO2, operating temperature.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 41173287 Modeling and Control of a 4DoF Robotic Assistive Device for Hand Rehabilitation
Authors: Christopher Spiewak, M. R. Islam, Mohammad Arifur Rahaman, Mohammad H. Rahman, Roger Smith, Maarouf Saad
Abstract:
For those who have lost the ability to move their hand, going through repetitious motions with the assistance of a therapist is the main method of recovery. We have been developed a robotic assistive device to rehabilitate the hand motions in place of the traditional therapy. The developed assistive device (RAD-HR) is comprised of four degrees of freedom enabling basic movements, hand function, and assists in supporting the hand during rehabilitation. We used a nonlinear computed torque control technique to control the RAD-HR. The accuracy of the controller was evaluated in simulations (MATLAB/Simulink environment). To see the robustness of the controller external disturbance as modelling uncertainty (±10% of joint torques) were added in each joints.Keywords: Biorobotics, rehabilitation, nonlinear control, robotic assistive device, exoskeleton.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 17243286 Secure E-Pay System Using Steganography and Visual Cryptography
Authors: K. Suganya Devi, P. Srinivasan, M. P. Vaishnave, G. Arutperumjothi
Abstract:
Today’s internet world is highly prone to various online attacks, of which the most harmful attack is phishing. The attackers host the fake websites which are very similar and look alike. We propose an image based authentication using steganography and visual cryptography to prevent phishing. This paper presents a secure steganographic technique for true color (RGB) images and uses Discrete Cosine Transform to compress the images. The proposed method hides the secret data inside the cover image. The use of visual cryptography is to preserve the privacy of an image by decomposing the original image into two shares. Original image can be identified only when both qualified shares are simultaneously available. Individual share does not reveal the identity of the original image. Thus, the existence of the secret message is hard to be detected by the RS steganalysis.
Keywords: Image security, random LSB, steganography, visual cryptography.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1386