Search results for: embedded
400 Modeling and FOS Feedback Based Control of SISO Intelligent Structures with Embedded Shear Sensors and Actuators
Authors: T. C. Manjunath, B. Bandyopadhyay
Abstract:
Active vibration control is an important problem in structures. The objective of active vibration control is to reduce the vibrations of a system by automatic modification of the system-s structural response. In this paper, the modeling and design of a fast output sampling feedback controller for a smart flexible beam system embedded with shear sensors and actuators for SISO system using Timoshenko beam theory is proposed. FEM theory, Timoshenko beam theory and the state space techniques are used to model the aluminum cantilever beam. For the SISO case, the beam is divided into 5 finite elements and the control actuator is placed at finite element position 1, whereas the sensor is varied from position 2 to 5, i.e., from the nearby fixed end to the free end. Controllers are designed using FOS method and the performance of the designed FOS controller is evaluated for vibration control for 4 SISO models of the same plant. The effect of placing the sensor at different locations on the beam is observed and the performance of the controller is evaluated for vibration control. Some of the limitations of the Euler-Bernoulli theory such as the neglection of shear and axial displacement are being considered here, thus giving rise to an accurate beam model. Embedded shear sensors and actuators have been considered in this paper instead of the surface mounted sensors and actuators for vibration suppression because of lot of advantages. In controlling the vibration modes, the first three dominant modes of vibration of the system are considered.Keywords: Smart structure, Timoshenko beam theory, Fast output sampling feedback control, Finite Element Method, State space model, SISO, Vibration control, LMI
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1786399 Acceptance of Health Information Application in Smart National Identity Card (SNIC) Using a New I-P Framework
Authors: Ismail Bile Hassan, Masrah Azrifah Azmi Murad
Abstract:
This study discovers a novel framework of individual level technology adoption known as I-P (Individual- Privacy) towards health information application in Smart National Identity Card. Many countries introduced smart national identity card (SNIC) with various applications such as health information application embedded inside it. However, the degree to which citizens accept and use some of the embedded applications in smart national identity remains unknown to many governments and application providers as well. Moreover, the factors of trust, perceived risk, Privacy concern and perceived credibility need to be incorporated into more comprehensive models such as extended Unified Theory of Acceptance and Use of Technology known as UTAUT2. UTAUT2 is a mainly widespread and leading theory up to now. This research identifies factors affecting the citizens’ behavioural intention to use health information application embedded in SNIC and extends better understanding on the relevant factors that the government and the application providers would need to consider in predicting citizens’ new technology acceptance in the future. We propose a conceptual framework by combining the UTAUT2 and Privacy Calculus Model constructs and also adding perceived credibility as a new variable. The proposed framework may provide assistance to any government planning, decision, and policy makers involving e-government projects. Empirical study may be conducted in the future to provide proof and empirically validate this I-P framework.
Keywords: Unified Theory of Acceptance and Use of Technology (UTAUT) model, UTAUT2 model, Smart National Identity Card (SNIC), Health information application, Privacy Calculus Model (PCM).
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3009398 Evaluation of Bearing Capacity of Vertically Loaded Strip Piled-Raft Embedded in Soft Clay
Authors: Seyed Abolhasan Naeini, Mohammad Hosseinzade
Abstract:
Settlement and bearing capacity of a piled raft are the two important issues for the foundations of structures built on coastal areas from the geotechnical engineering point of view. Strip piled raft as a load carrying system can reduce the possible extensive consolidation settlements and improve bearing capacity of structures in soft ground. The aim of this research was to evaluate the efficiency of strip piled raft embedded in soft clay. The efficiency of bearing capacity of strip piled raft foundation has been evaluated numerically in two cases; in the first case, the cap is placed directly on the ground surface and in the second, the cap is placed above the ground. Regarding to the fact that the geotechnical parameters of the soft clay are considered at low level, low bearing capacity is expected. The length, diameter and axe-to-axe distance of piles were the parameters which varied in this study to find out how they affected the bearing capacity. Results indicate that increasing the length and the diameter of the piles increase the bearing capacity.
Keywords: Soft clay, Strip piled raft, Bearing capacity, Settlement.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3106397 Application of Smart Temperature Information Material for The Evaluation of Heat Storage Capacity and Insulation Capacity of Exterior Walls
Authors: Chih-Yuan Chang, Jin-Chiuan Chang, San-Shan Hung, Cheng-Jui Hsu
Abstract:
The heat storage capacity of concrete in building shells is a major reason for excessively large electricity consumption induced by indoor air conditioning. In this research, the previously developed Smart Temperature Information Material (STIM) is embedded in two groups of exterior wall specimens (the control group contains reinforced concrete exterior walls and the experimental group consists of tiled exterior walls). Long term temperature measurements within the concrete are taken by the embedded STIM. Temperature differences between the control group and the experimental group in walls facing the four cardinal directions (east, west, south, and north) are evaluated. This study aims to provide a basic reference for the design of exterior walls and the selection of heat insulation materials.
Keywords: building envelope, sensor, energy, thermal insulation, reinforced concrete
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1594396 Application of LSB Based Steganographic Technique for 8-bit Color Images
Authors: Mamta Juneja, Parvinder S. Sandhu, Ekta Walia
Abstract:
Steganography is the process of hiding one file inside another such that others can neither identify the meaning of the embedded object, nor even recognize its existence. Current trends favor using digital image files as the cover file to hide another digital file that contains the secret message or information. One of the most common methods of implementation is Least Significant Bit Insertion, in which the least significant bit of every byte is altered to form the bit-string representing the embedded file. Altering the LSB will only cause minor changes in color, and thus is usually not noticeable to the human eye. While this technique works well for 24-bit color image files, steganography has not been as successful when using an 8-bit color image file, due to limitations in color variations and the use of a colormap. This paper presents the results of research investigating the combination of image compression and steganography. The technique developed starts with a 24-bit color bitmap file, then compresses the file by organizing and optimizing an 8-bit colormap. After the process of compression, a text message is hidden in the final, compressed image. Results indicate that the final technique has potential of being useful in the steganographic world.
Keywords: Compression, Colormap, Encryption, Steganographyand LSB Insertion.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3000395 Performance Improvements of DSP Applications on a Generic Reconfigurable Platform
Authors: Michalis D. Galanis, Gregory Dimitroulakos, Costas E. Goutis
Abstract:
Speedups from mapping four real-life DSP applications on an embedded system-on-chip that couples coarsegrained reconfigurable logic with an instruction-set processor are presented. The reconfigurable logic is realized by a 2-Dimensional Array of Processing Elements. A design flow for improving application-s performance is proposed. Critical software parts, called kernels, are accelerated on the Coarse-Grained Reconfigurable Array. The kernels are detected by profiling the source code. For mapping the detected kernels on the reconfigurable logic a prioritybased mapping algorithm has been developed. Two 4x4 array architectures, which differ in their interconnection structure among the Processing Elements, are considered. The experiments for eight different instances of a generic system show that important overall application speedups have been reported for the four applications. The performance improvements range from 1.86 to 3.67, with an average value of 2.53, compared with an all-software execution. These speedups are quite close to the maximum theoretical speedups imposed by Amdahl-s law.Keywords: Reconfigurable computing, Coarse-grained reconfigurable array, Embedded systems, DSP, Performance
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1488394 Investigating the Impact of Wind Speed on Active and Reactive Power Penetration to the Distribution Network
Authors: Sidhartha Panda, N.P.Padhy
Abstract:
Wind power is among the most actively developing distributed generation (DG) technology. Majority of the wind power based DG technologies employ wind turbine induction generators (WTIG) instead of synchronous generators, for the technical advantages like: reduced size, increased robustness, lower cost, and increased electromechanical damping. However, dynamic changes of wind speed make the amount of active/reactive power injected/drawn to a WTIG embedded distribution network highly variable. This paper analyzes the effect of wind speed changes on the active and reactive power penetration to the wind energy embedded distribution network. Four types of wind speed changes namely; constant, linear change, gust change and random change of wind speed are considered in the analysis. The study is carried out by three-phase, non-linear, dynamic simulation of distribution system component models. Results obtained from the investigation are presented and discussed.
Keywords: Wind turbine induction generator, distribution network, active and reactive power, wind speed.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2446393 Slovenian Text-to-Speech Synthesis for Speech User Interfaces
Authors: Jerneja Žganec Gros, Aleš Mihelič, Nikola Pavešić, Mario Žganec, Stanislav Gruden
Abstract:
The paper presents the design concept of a unitselection text-to-speech synthesis system for the Slovenian language. Due to its modular and upgradable architecture, the system can be used in a variety of speech user interface applications, ranging from server carrier-grade voice portal applications, desktop user interfaces to specialized embedded devices. Since memory and processing power requirements are important factors for a possible implementation in embedded devices, lexica and speech corpora need to be reduced. We describe a simple and efficient implementation of a greedy subset selection algorithm that extracts a compact subset of high coverage text sentences. The experiment on a reference text corpus showed that the subset selection algorithm produced a compact sentence subset with a small redundancy. The adequacy of the spoken output was evaluated by several subjective tests as they are recommended by the International Telecommunication Union ITU.Keywords: text-to-speech synthesis, prosody modeling, speech user interface.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1454392 An Implementation of a Configurable UART-to-Ethernet Converter
Authors: Jungho Moon, Myunggon Yoon
Abstract:
This paper presents an implementation of a configurable UART-to-Ethernet converter using an ARM-based 32-bit microcontroller as well as a dedicated configuration program running on a PC for configuring the operating parameters of the converter. The program was written in Python. Various parameters pertaining to the operation of the converter can be modified by the configuration program through the Ethernet interface of the converter. The converter supports 3 representative asynchronous serial communication protocols, RS-232, RS-422, and RS-485 and supports 3 network modes, TCP/IP server, TCP/IP client, and UDP client. The TCP/IP and UDP protocols were implemented on the microcontroller using an open source TCP/IP protocol stack called lwIP (A lightweight TCP/IP) and FreeRTOS, a free real-time operating system for embedded systems. Due to the use of a real-time operating system, the firmware of the converter was implemented as a multi-thread application and as a result becomes more modular and easier to develop. The converter can provide a seamless bridge between a serial port and an Ethernet port, thereby allowing existing legacy apparatuses with no Ethernet connectivity to communicate using the Ethernet protocol.
Keywords: Converter, embedded systems, Ethernet, lwIP, UART.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1393391 Behavior of Current in a Semiconductor Nanostructure under Influence of Embedded Quantum Dots
Authors: H. Paredes Gutiérrez, S. T. Pérez-Merchancano
Abstract:
Motivated by recent experimental and theoretical developments, we investigate the influence of embedded quantum dot (EQD) of different geometries (lens, ring and pyramidal) in a double barrier heterostructure (DBH). We work with a general theory of quantum transport that accounts the tight-binding model for the spin dependent resonant tunneling in a semiconductor nanostructure, and Rashba spin orbital to study the spin orbit coupling. In this context, we use the second quantization theory for Rashba effect and the standard Green functions method. We calculate the current density as a function of the voltage without and in the presence of quantum dots. In the second case, we considered the size and shape of the quantum dot, and in the two cases, we worked considering the spin polarization affected by external electric fields. We found that the EQD generates significant changes in current when we consider different morphologies of EQD, as those described above. The first thing shown is that the current decreases significantly, such as the geometry of EQD is changed, prevailing the geometrical confinement. Likewise, we see that the current density decreases when the voltage is increased, showing that the quantum system studied here is more efficient when the morphology of the quantum dot changes.
Keywords: Quantum semiconductors, nanostructures, quantum dots, spin polarization.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 955390 Data Embedding Based on Better Use of Bits in Image Pixels
Authors: Rehab H. Alwan, Fadhil J. Kadhim, Ahmad T. Al-Taani
Abstract:
In this study, a novel approach of image embedding is introduced. The proposed method consists of three main steps. First, the edge of the image is detected using Sobel mask filters. Second, the least significant bit LSB of each pixel is used. Finally, a gray level connectivity is applied using a fuzzy approach and the ASCII code is used for information hiding. The prior bit of the LSB represents the edged image after gray level connectivity, and the remaining six bits represent the original image with very little difference in contrast. The proposed method embeds three images in one image and includes, as a special case of data embedding, information hiding, identifying and authenticating text embedded within the digital images. Image embedding method is considered to be one of the good compression methods, in terms of reserving memory space. Moreover, information hiding within digital image can be used for security information transfer. The creation and extraction of three embedded images, and hiding text information is discussed and illustrated, in the following sections.
Keywords: Image embedding, Edge detection, gray level connectivity, information hiding, digital image compression.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2144389 Mechanical Model of Gypsum Board Anchors Subjected Cyclic Shear Loading
Authors: Yoshinori Kitsutaka, Fumiya Ikedo
Abstract:
In this study, the mechanical model of various anchors embedded in gypsum board subjected cyclic shear loading were investigated. Shear tests for anchors embedded in 200 mm square size gypsum board were conducted to measure the load - load displacement curves. The strength of the gypsum board was changed for three conditions and 12 kinds of anchors were selected which were ordinary used for gypsum board anchoring. The loading conditions were a monotonous loading and a cyclic loading controlled by a servo-controlled hydraulic loading system to achieve accurate measurement. The fracture energy for each of the anchors was estimated by the analysis of consumed energy calculated by the load - load displacement curve. The effect of the strength of gypsum board and the types of anchors on the shear properties of gypsum board anchors was cleared. A numerical model to predict the load-unload curve of shear deformation of gypsum board anchors caused by such as the earthquake load was proposed and the validity on the model was proved.
Keywords: Gypsum board, anchor, shear test, cyclic loading, load-unload curve.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1052388 Efficient Large Numbers Karatsuba-Ofman Multiplier Designs for Embedded Systems
Authors: M.Machhout, M.Zeghid, W.El hadj youssef, B.Bouallegue, A.Baganne, R.Tourki
Abstract:
Long number multiplications (n ≥ 128-bit) are a primitive in most cryptosystems. They can be performed better by using Karatsuba-Ofman technique. This algorithm is easy to parallelize on workstation network and on distributed memory, and it-s known as the practical method of choice. Multiplying long numbers using Karatsuba-Ofman algorithm is fast but is highly recursive. In this paper, we propose different designs of implementing Karatsuba-Ofman multiplier. A mixture of sequential and combinational system design techniques involving pipelining is applied to our proposed designs. Multiplying large numbers can be adapted flexibly to time, area and power criteria. Computationally and occupation constrained in embedded systems such as: smart cards, mobile phones..., multiplication of finite field elements can be achieved more efficiently. The proposed designs are compared to other existing techniques. Mathematical models (Area (n), Delay (n)) of our proposed designs are also elaborated and evaluated on different FPGAs devices.Keywords: finite field, Karatsuba-Ofman, long numbers, multiplication, mathematical model, recursivity.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2529387 Performance of Axially Loaded Single Pile Embedded in Cohesive Soil with Cavities
Authors: Ali A. Al-Jazaairry, Tahsin T. Sabbagh
Abstract:
The stability of a single model pile located adjacent to a continuous cavity was studied. This paper is an attempt to understand the behaviour of axially loaded single pile embedded in clayey soil with the presences of cavities. The performance of piles located in such soils was studied analytically. A verification analysis was carried out on available studies to assess the ability of analytical model to correctly interpret the system behaviour. The study was adopted by finite element program (PLAXIS). The study included many cases; in each case, there is a critical value in which the presence of cavities has shown minimum effect on the pile performance. Figures including the load carrying capacity of pile with the affecting factors are presented. These figures provide beneficial information for pile design constructed close to underground cavities. It was concluded that the load carrying capacity of the pile is reduced by the presence of the cavity within the soil mass. This reduction varies according to the size and location of cavity.
Keywords: Axial load, cavity, clay, pile, ultimate capacity.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1016386 Strengthening RC Columns Using Carbon Fiber Reinforced Epoxy Composites Modified with Carbon Nanotubes
Authors: Mohammad R. Irshidat, Mohammed H. Al-Saleh, Mahmoud Al-Shoubaki
Abstract:
This paper investigates the viability of using carbon fiber reinforced epoxy composites modified with carbon nanotubes to strengthening reinforced concrete (RC) columns. Six RC columns was designed and constructed according to ASCE standards. The columns were wrapped using carbon fiber sheets impregnated with either neat epoxy or CNTs modified epoxy. These columns were then tested under concentric axial loading. Test results show that; compared to the unwrapped specimens; wrapping concrete columns with carbon fiber sheet embedded in CNTs modified epoxy resulted in an increase in its axial load resistance, maximum displacement, and toughness values by 24%, 109% and 232%, respectively. These results reveal that adding CNTs into epoxy resin enhanced the confinement effect, specifically, increased the axial load resistance, maximum displacement, and toughness values by 11%, 6%, and 19%, respectively compared with columns strengthening with carbon fiber sheet embedded in neat epoxy.
Keywords: CNT, epoxy, Carbon fiber, RC columns.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3923385 Promising Immobilization of Cadmium and Lead inside Ca-rich Glass-ceramics
Authors: A. Karnis, L. Gautron
Abstract:
Considering toxicity of heavy metals and their accumulation in domestic wastes, immobilization of lead and cadmium is envisaged inside glass-ceramics. We particularly focused this work on calcium-rich phases embedded in a glassy matrix. Glass-ceramics were synthesized from glasses doped with 12 wt% and 16 wt% of PbO or CdO. They were observed and analyzed by Electron MicroProbe Analysis (EMPA) and Analytical Scanning Electron Microscopy (ASEM). Structural characterization of the samples was performed by powder XRay Diffraction. Diopside crystals of CaMgSi2O6 composition are shown to incorporate significant amounts of cadmium (up to 9 wt% of CdO). Two new crystalline phases are observed with very high Cd or Pb contents: about 40 wt% CdO for the cadmiumrich phase and near 60 wt% PbO for the lead-rich phase. We present complete chemical and structural characterization of these phases. They represent a promising way for the immobilization of toxic elements like Cd or Pb since glass ceramics are known to propose a “double barrier" protection (metal-rich crystals embedded in a glass matrix) against metal release in the environment.Keywords: Cadmium, Calcium-rich phases, Diopside, Domesticwastes, Fly ashes, Glass-ceramics, Lead, Municipal Solid WasteIncineration.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1654384 Data Hiding by Vector Quantization in Color Image
Authors: Yung-Gi Wu
Abstract:
With the growing of computer and network, digital data can be spread to anywhere in the world quickly. In addition, digital data can also be copied or tampered easily so that the security issue becomes an important topic in the protection of digital data. Digital watermark is a method to protect the ownership of digital data. Embedding the watermark will influence the quality certainly. In this paper, Vector Quantization (VQ) is used to embed the watermark into the image to fulfill the goal of data hiding. This kind of watermarking is invisible which means that the users will not conscious the existing of embedded watermark even though the embedded image has tiny difference compared to the original image. Meanwhile, VQ needs a lot of computation burden so that we adopt a fast VQ encoding scheme by partial distortion searching (PDS) and mean approximation scheme to speed up the data hiding process. The watermarks we hide to the image could be gray, bi-level and color images. Texts are also can be regarded as watermark to embed. In order to test the robustness of the system, we adopt Photoshop to fulfill sharpen, cropping and altering to check if the extracted watermark is still recognizable. Experimental results demonstrate that the proposed system can resist the above three kinds of tampering in general cases.Keywords: Data hiding, vector quantization, watermark.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1774383 Wetting-Drying Cycles Effect on Piles Embedded in a Very High Expansive Soil
Authors: Bushra Suhale Al-Busoda, Laith Kadim Al-Anbarry
Abstract:
The behavior of model piles embedded in a very high expansive soil was investigated, a specially manufactured saturation-drying tank was used to apply three cycles of wetting and drying to the expansive soil surrounding the model straight shaft and under reamed piles, the relative movement of the piles with respect to the soil surface was recorded with time, also the exerted uplift pressure of the piles due to soil swelling was recorded. The behavior of unloaded straight shaft and under reamed piles was investigated. Two design charts were presented for straight shaft and under reamed piles one for the required pile depth for zero upward movement due to soil swelling, while the other for the required pile depth to exert zero uplift pressure when the soil swells. Under reamed piles showed a decrease in upward movement of 20% to 30%, and an uplift pressure decrease of 10% to 30%.
Keywords: Expansive Soil, Piles, under reamed, wetting drying cycles.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2559382 A Normalization-based Robust Image Watermarking Scheme Using SVD and DCT
Authors: Say Wei Foo, Qi Dong
Abstract:
Digital watermarking is one of the techniques for copyright protection. In this paper, a normalization-based robust image watermarking scheme which encompasses singular value decomposition (SVD) and discrete cosine transform (DCT) techniques is proposed. For the proposed scheme, the host image is first normalized to a standard form and divided into non-overlapping image blocks. SVD is applied to each block. By concatenating the first singular values (SV) of adjacent blocks of the normalized image, a SV block is obtained. DCT is then carried out on the SV blocks to produce SVD-DCT blocks. A watermark bit is embedded in the highfrequency band of a SVD-DCT block by imposing a particular relationship between two pseudo-randomly selected DCT coefficients. An adaptive frequency mask is used to adjust local watermark embedding strength. Watermark extraction involves mainly the inverse process. The watermark extracting method is blind and efficient. Experimental results show that the quality degradation of watermarked image caused by the embedded watermark is visually transparent. Results also show that the proposed scheme is robust against various image processing operations and geometric attacks.Keywords: Image watermarking, Image normalization, Singularvalue decomposition, Discrete cosine transform, Robustness.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2095381 Luminescent Si Nanocrystals Synthesized by Si Ion Implantation and Reactive Pulsed Laser Deposition: The Effects of RTA, Excimer-UV and E-Beam Irradiation
Authors: T. S. Iwayama, T. Hama
Abstract:
Si ion implantation was widely used to synthesize specimens of SiO2 containing supersaturated Si and subsequent high temperature annealing induces the formation of embedded luminescent Si nanocrystals. In this work, the potentialities of excimer UV-light (172 nm, 7.2 eV) irradiation and rapid thermal annealing (RTA) to enhance the photoluminescence and to achieve low temperature formation of Si nanocrystals have been investigated. The Si ions were introduced at acceleration energy of 180 keV to fluence of 7.5 x 1016 ions/cm2. The implanted samples were subsequently irradiated with an excimer-UV lamp. After the process, the samples were rapidly thermal annealed before furnace annealing (FA). Photoluminescence spectra were measured at various stages at the process. We found that the luminescence intensity is strongly enhanced with excimer-UV irradiation and RTA. Moreover, effective visible photoluminescence is found to be observed even after FA at 900 oC, only for specimens treated with excimer-UV lamp and RTA. We also prepared specimens of Si nanocrystals embedded in a SiO2 by reactive pulsed laser deposition (PLD) in an oxygen atmosphere. We will make clear the similarities and differences with the way of preparation.Keywords: Ion implantation, photoluminescence, pulsed laser deposition, rapid thermal anneal, Si nanocrystals.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1718380 A Multipurpose Audio Watermarking Algorithm Based on Vector Quantization in DCT Domain
Authors: Jixin Liu, Zheming Lu
Abstract:
In this paper, a novel multipurpose audio watermarking algorithm is proposed based on Vector Quantization (VQ) in Discrete Cosine Transform (DCT) domain using the codeword labeling and index-bit constrained method. By using this algorithm, it can fulfill the requirements of both the copyright protection and content integrity authentication at the same time for the multimedia artworks. The robust watermark is embedded in the middle frequency coefficients of the DCT transform during the labeled codeword vector quantization procedure. The fragile watermark is embedded into the indices of the high frequency coefficients of the DCT transform by using the constrained index vector quantization method for the purpose of integrity authentication of the original audio signals. Both the robust and the fragile watermarks can be extracted without the original audio signals, and the simulation results show that our algorithm is effective with regard to the transparency, robustness and the authentication requirementsKeywords: Copyright Protection, Discrete Cosine Transform, Integrity Authentication, Multipurpose Audio Watermarking, Vector Quantization.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1991379 Research of the Load Bearing Capacity of Inserts Embedded in CFRP under Different Loading Conditions
Authors: F. Pottmeyer, M. Weispfenning, K. A. Weidenmann
Abstract:
Continuous carbon fiber reinforced plastics (CFRP) exhibit a high application potential for lightweight structures due to their outstanding specific mechanical properties. Embedded metal elements, so-called inserts, can be used to join structural CFRP parts. Drilling of the components to be joined can be avoided using inserts. In consequence, no bearing stress is anticipated. This is a distinctive benefit of embedded inserts, since continuous CFRP have low shear and bearing strength. This paper aims at the investigation of the load bearing capacity after preinduced damages from impact tests and thermal-cycling. In addition, characterization of mechanical properties during dynamic high speed pull-out testing under different loading velocities was conducted. It has been shown that the load bearing capacity increases up to 100% for very high velocities (15 m/s) in comparison with quasi-static loading conditions (1.5 mm/min). Residual strength measurements identified the influence of thermal loading and preinduced mechanical damage. For both, the residual strength was evaluated afterwards by quasi-static pull-out tests. Taking into account the DIN EN 6038 a high decrease of force occurs at impact energy of 16 J with significant damage of the laminate. Lower impact energies of 6 J, 9 J, and 12 J do not decrease the measured residual strength, although the laminate is visibly damaged - distinguished by cracks on the rear side. To evaluate the influence of thermal loading, the specimens were placed in a climate chamber and were exposed to various numbers of temperature cycles. One cycle took 1.5 hours from -40 °C to +80 °C. It could be shown that already 10 temperature cycles decrease the load bearing capacity up to 20%. Further reduction of the residual strength with increasing number of thermal cycles was not observed. Thus, it implies that the maximum damage of the composite is already induced after 10 temperature cycles.
Keywords: Composite, joining, inserts, dynamic loading, thermal loading, residual strength, impact.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1826378 Ambient Notifications and the Interruption Effect
Authors: Trapond Hiransalee
Abstract:
The technology of mobile devices has changed our daily lives. Since smartphone have become a multi-functional device, many people spend unnecessary time on them, and could be interrupted by inappropriate notifications such as unimportant messages from social media. Notifications from smartphone could draw people’s attention and distract them from their priorities and current tasks. This research investigated that if the users were notified by their surroundings instead of smartphone, would it create less distraction and keep their focus on the present task. The experiment was a simulation of a lamp and door notification. Notifications related to work will be embedded in the lamp such as an email from a colleague. A notification that is useful when going outside such as weather information, traffic information, and schedule reminder will be embedded in the door. The experiment was conducted by sending notifications to the participant while he or she was working on a primary task and the working performance was measured. The results show that the lamp notification had fewer interruption effects than the smartphone. For the door notification, it was simulated in order to gain opinions and insights on ambient notifications from participants. Many participants agreed that the ambient notifications are useful and being informed by them could lessen the usage of their smartphone. The results and insights from this research could be used to guide the design process of ambient notifications.Keywords: HCI, Interaction, Interaction design, Usability testing.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1566377 A Secure Semi-Fragile Watermarking Scheme for Authentication and Recovery of Images Based On Wavelet Transform
Authors: Rafiullah Chamlawi, Asifullah Khan, Adnan Idris, Zahid Munir
Abstract:
Authentication of multimedia contents has gained much attention in recent times. In this paper, we propose a secure semi-fragile watermarking, with a choice of two watermarks to be embedded. This technique operates in integer wavelet domain and makes use of semi fragile watermarks for achieving better robustness. A self-recovering algorithm is employed, that hides the image digest into some Wavelet subbands to detect possible malevolent object manipulation undergone by the image (object replacing and/or deletion). The Semi-fragility makes the scheme tolerant for JPEG lossy compression as low as quality of 70%, and locate the tempered area accurately. In addition, the system ensures more security because the embedded watermarks are protected with private keys. The computational complexity is reduced using parameterized integer wavelet transform. Experimental results show that the proposed scheme guarantees the safety of watermark, image recovery and location of the tempered area accurately.
Keywords: Integer Wavelet Transform (IWT), Discrete Cosine Transform (DCT), JPEG Compression, Authentication and Self- Recovery.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2084376 Light Emission Enhancement of Silicon Nanocrystals by Gold Layer
Authors: R. Karmouch
Abstract:
A thin gold metal layer was deposited on the top of silicon oxide films containing embedded Si nanocrystals (Si-nc). The sample was annealed in a gas containing nitrogen, and subsequently characterized by photoluminescence. We obtained 3-fold enhancement of photon emission from the Si-nc embedded in silicon dioxide covered with a Gold layer as compared with an uncovered sample. We attribute this enhancement to the increase of the spontaneous emission rate caused by the coupling of the Si-nc emitters with the surface plasmons (SP). The evolution of PL emission with laser irradiated time was also collected from covered samples, and compared to that from uncovered samples. In an uncovered sample, the PL intensity decreases with time, approximately with two decay constants. Although the decrease of the initial PL intensity associated with the increase of sample temperature under CW pumping is still observed in samples covered with a gold layer, this film significantly contributes to reduce the permanent deterioration of the PL intensity. The resistance to degradation of light-emitting silicon nanocrystals can be increased by SP coupling to suppress the permanent deterioration. Controlling the permanent photodeterioration can allow to perform a reliable optical gain measurement.
Keywords: Photodeterioration, Silicon Nanocrystals, Ion Implantation, Photoluminescence, Surface Plasmons.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1867375 Micro-Controller Based Oxy-Fuel Profile Cutting System
Authors: A. P. Kulkarni, P. Randive, A. R. Mache
Abstract:
In today-s era of plasma and laser cutting, machines using oxy-acetylene flame are also meritorious due to their simplicity and cost effectiveness. The objective to devise a Computer controlled Oxy-Fuel profile cutting machine arose from the increasing demand for metal cutting with respect to edge quality, circularity and lesser formation of redeposit material. The System has an 8 bit micro controller based embedded system, which assures stipulated time response. A new window based Application software was devised which takes a standard CAD file .DXF as input and converts it into numerical data required for the controller. It uses VB6 as a front end whereas MS-ACCESS and AutoCAD as back end. The system is designed around AT89C51RD2, powerful 8 bit, ISP micro controller from Atmel and is optimized to achieve cost effectiveness and also maintains the required accuracy and reliability for complex shapes. The backbone of the system is a cleverly designed mechanical assembly along with the embedded system resulting in an accuracy of about 10 microns while maintaining perfect linearity in the cut. This results in substantial increase in productivity. The observed results also indicate reduced inter laminar spacing of pearlite with an increase in the hardness of the edge region.
Keywords: Computer-Control, Profile, Oxy-Fuel.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2582374 Authentication and Data Hiding Using a Reversible ROI-based Watermarking Scheme for DICOM Images
Authors: Osamah M. Al-Qershi, Khoo Bee Ee
Abstract:
In recent years image watermarking has become an important research area in data security, confidentiality and image integrity. Many watermarking techniques were proposed for medical images. However, medical images, unlike most of images, require extreme care when embedding additional data within them because the additional information must not affect the image quality and readability. Also the medical records, electronic or not, are linked to the medical secrecy, for that reason, the records must be confidential. To fulfill those requirements, this paper presents a lossless watermarking scheme for DICOM images. The proposed a fragile scheme combines two reversible techniques based on difference expansion for patient's data hiding and protecting the region of interest (ROI) with tamper detection and recovery capability. Patient's data are embedded into ROI, while recovery data are embedded into region of non-interest (RONI). The experimental results show that the original image can be exactly extracted from the watermarked one in case of no tampering. In case of tampered ROI, tampered area can be localized and recovered with a high quality version of the original area.Keywords: DICOM, reversible, ROI-based, watermarking.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1717373 Rational Chebyshev Tau Method for Solving Natural Convection of Darcian Fluid About a Vertical Full Cone Embedded in Porous Media Whit a Prescribed Wall Temperature
Authors: Kourosh Parand, Zahra Delafkar, Fatemeh Baharifard
Abstract:
The problem of natural convection about a cone embedded in a porous medium at local Rayleigh numbers based on the boundary layer approximation and the Darcy-s law have been studied before. Similarity solutions for a full cone with the prescribed wall temperature or surface heat flux boundary conditions which is the power function of distance from the vertex of the inverted cone give us a third-order nonlinear differential equation. In this paper, an approximate method for solving higher-order ordinary differential equations is proposed. The approach is based on a rational Chebyshev Tau (RCT) method. The operational matrices of the derivative and product of rational Chebyshev (RC) functions are presented. These matrices together with the Tau method are utilized to reduce the solution of the higher-order ordinary differential equations to the solution of a system of algebraic equations. We also present the comparison of this work with others and show that the present method is applicable.
Keywords: Tau method, semi-infinite, nonlinear ODE, rational Chebyshev, porous media.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1932372 Robotic End-Effector Impedance Control without Expensive Torque/Force Sensor
Authors: Shiuh-Jer Huang, Yu-Chi Liu, Su-Hai Hsiang
Abstract:
A novel low-cost impedance control structure is proposed for monitoring the contact force between end-effector and environment without installing an expensive force/torque sensor. Theoretically, the end-effector contact force can be estimated from the superposition of each joint control torque. There have a nonlinear matrix mapping function between each joint motor control input and end-effector actuating force/torques vector. This new force control structure can be implemented based on this estimated mapping matrix. First, the robot end-effector is manipulated to specified positions, then the force controller is actuated based on the hall sensor current feedback of each joint motor. The model-free fuzzy sliding mode control (FSMC) strategy is employed to design the position and force controllers, respectively. All the hardware circuits and software control programs are designed on an Altera Nios II embedded development kit to constitute an embedded system structure for a retrofitted Mitsubishi 5 DOF robot. Experimental results show that PI and FSMC force control algorithms can achieve reasonable contact force monitoring objective based on this hardware control structure.
Keywords: Robot, impedance control, fuzzy sliding mode control, contact force estimator.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 4015371 Robust Digital Cinema Watermarking
Authors: Sadi Vural, Hiromi Tomii, Hironori Yamauchi
Abstract:
With the advent of digital cinema and digital broadcasting, copyright protection of video data has been one of the most important issues. We present a novel method of watermarking for video image data based on the hardware and digital wavelet transform techniques and name it as “traceable watermarking" because the watermarked data is constructed before the transmission process and traced after it has been received by an authorized user. In our method, we embed the watermark to the lowest part of each image frame in decoded video by using a hardware LSI. Digital Cinema is an important application for traceable watermarking since digital cinema system makes use of watermarking technology during content encoding, encryption, transmission, decoding and all the intermediate process to be done in digital cinema systems. The watermark is embedded into the randomly selected movie frames using hash functions. Embedded watermark information can be extracted from the decoded video data. For that, there is no need to access original movie data. Our experimental results show that proposed traceable watermarking method for digital cinema system is much better than the convenient watermarking techniques in terms of robustness, image quality, speed, simplicity and robust structure.Keywords: Decoder, Digital content, JPEG2000 Frame, System-On-Chip, traceable watermark, Hash Function, CRC-32.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1646