Search results for: exact solution
1448 An Iterative Algorithm for Inverse Kinematics of 5-DOF Manipulator with Offset Wrist
Authors: Juyi Park, Jung-Min Kim, Hee-Hwan Park, Jin-Wook Kim, Gye-Hyung Kang, Soo-Ho Kim
Abstract:
This paper presents an iterative algorithm to find a inverse kinematic solution of 5-DOF robot. The algorithm is to minimize the iteration number. Since the 5-DOF robot cannot give full orientation of tool. Only z-direction of tool is satisfied while rotation of tool is determined by kinematic constraint. This work therefore described how to specify the tool direction and let the tool rotation free. The simulation results show that this algorithm effectively worked. Using the proposed iteration algorithm, error due to inverse kinematics converged to zero rapidly in 5 iterations. This algorithm was applied in real welding robot and verified through various practical works.Keywords: 5-DOF manipulator, Inverse kinematics, Iterative algorithm, Wrist offset.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 41381447 Realtime Lip Contour Tracking For Audio-Visual Speech Recognition Applications
Authors: Mehran Yazdi, Mehdi Seyfi, Amirhossein Rafati, Meghdad Asadi
Abstract:
Detection and tracking of the lip contour is an important issue in speechreading. While there are solutions for lip tracking once a good contour initialization in the first frame is available, the problem of finding such a good initialization is not yet solved automatically, but done manually. We have developed a new tracking solution for lip contour detection using only few landmarks (15 to 25) and applying the well known Active Shape Models (ASM). The proposed method is a new LMS-like adaptive scheme based on an Auto regressive (AR) model that has been fit on the landmark variations in successive video frames. Moreover, we propose an extra motion compensation model to address more general cases in lip tracking. Computer simulations demonstrate a fair match between the true and the estimated spatial pixels. Significant improvements related to the well known LMS approach has been obtained via a defined Frobenius norm index.Keywords: Lip contour, Tracking, LMS-Like
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 17951446 Evaluation and Selection of Construction Contractors by Polish Public Clients
Authors: R. Kozik, A. Leśniak A., E. Plebankiewicz
Abstract:
Contracting authorities in the public sector are obligated to apply the principles provided for in the Polish law for the evaluation and selection of contractors. In order to analyse the methods of contractors selecting applied in practice by public clients, the notices of contract award results for construction works were analysed. The analysis shows that the procedure selected more and more often is open competitive bidding, where the assessment of the competence of contractors is not very precise, as well as noncompetitive bidding, i.e. single source procurement. The share of procurement procedures, where the only criterion is price, is increasing. The solution to the problems existing here might be the introduction of one of the forms of pre-selection of contractors. The article also briefly discusses verification systems for companies applying for public contracts used in EU countries.
Keywords: Certification, contractors selection, open tendering, public investors.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 19331445 The Problem of Using the Calculation of the Critical Path to Solver Instances of the Job Shop Scheduling Problem
Authors: Marco Antonio Cruz-Chávez, Juan Frausto-Solís, Fernando Ramos-Quintana
Abstract:
A procedure commonly used in Job Shop Scheduling Problem (JSSP) to evaluate the neighborhoods functions that use the non-deterministic algorithms is the calculation of the critical path in a digraph. This paper presents an experimental study of the cost of computation that exists when the calculation of the critical path in the solution for instances in which a JSSP of large size is involved. The results indicate that if the critical path is use in order to generate neighborhoods in the meta-heuristics that are used in JSSP, an elevated cost of computation exists in spite of the fact that the calculation of the critical path in any digraph is of polynomial complexity.
Keywords: Job Shop, CPM, critical path, neighborhood, meta-heuristic.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 23011444 Fuzzy Fingerprint Vault using Multiple Polynomials
Authors: Daesung Moon, Woo-Yong Choi, Kiyoung Moon
Abstract:
Fuzzy fingerprint vault is a recently developed cryptographic construct based on the polynomial reconstruction problem to secure critical data with the fingerprint data. However, the previous researches are not applicable to the fingerprint having a few minutiae since they use a fixed degree of the polynomial without considering the number of fingerprint minutiae. To solve this problem, we use an adaptive degree of the polynomial considering the number of minutiae extracted from each user. Also, we apply multiple polynomials to avoid the possible degradation of the security of a simple solution(i.e., using a low-degree polynomial). Based on the experimental results, our method can make the possible attack difficult 2192 times more than using a low-degree polynomial as well as verify the users having a few minutiae.
Keywords: Fuzzy vault, fingerprint recognition multiple polynomials.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 15461443 Sequential Partitioning Brainbow Image Segmentation Using Bayesian
Authors: Yayun Hsu, Henry Horng-Shing Lu
Abstract:
This paper proposes a data-driven, biology-inspired neural segmentation method of 3D drosophila Brainbow images. We use Bayesian Sequential Partitioning algorithm for probabilistic modeling, which can be used to detect somas and to eliminate crosstalk effects. This work attempts to develop an automatic methodology for neuron image segmentation, which nowadays still lacks a complete solution due to the complexity of the image. The proposed method does not need any predetermined, risk-prone thresholds, since biological information is inherently included inside the image processing procedure. Therefore, it is less sensitive to variations in neuron morphology; meanwhile, its flexibility would be beneficial for tracing the intertwining structure of neurons.
Keywords: Brainbow, 3D imaging, image segmentation, neuron morphology, biological data mining, non-parametric learning.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 22571442 Fermat’s Last Theorem a Simple Demonstration
Authors: Jose William Porras Ferreira
Abstract:
This paper presents two solutions to the Fermat’s Last Theorem (FLT). The first one using some algebraic basis related to the Pythagorean theorem, expression of equations, an analysis of their behavior, when compared with power and power and using " the “Well Ordering Principle” of natural numbers it is demonstrated that in Fermat equation . The second one solution is using the connection between and power through the Pascal’s triangle or Newton’s binomial coefficients, where de Fermat equation do not fulfill the first coefficient, then it is impossible that:
zn=xn+yn for n>2 and (x, y, z) E Z+ - {0}
Keywords: Fermat’s Last Theorem, Pythagorean Theorem, Newton Binomial Coefficients, Pascal’s Triangle, Well Ordering Principle.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 30001441 FPGA Implement of a Vision Based Lane Departure Warning System
Authors: Yu Ren Lin, Yi Feng Su
Abstract:
Using vision based solution in intelligent vehicle application often needs large memory to handle video stream and image process which increase complexity of hardware and software. In this paper, we present a FPGA implement of a vision based lane departure warning system. By taking frame of videos, the line gradient of line is estimated and the lane marks are found. By analysis the position of lane mark, departure of vehicle will be detected in time. This idea has been implemented in Xilinx Spartan6 FPGA. The lane departure warning system used 39% logic resources and no memory of the device. The average availability is 92.5%. The frame rate is more than 30 frames per second (fps).
Keywords: Lane departure warning system, image, FPGA.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 20741440 Optimal Planning of Ground Grid Based on Particle Swam Algorithm
Authors: Chun-Yao Lee, Yi-Xing Shen
Abstract:
This paper presents an application of particle swarm optimization (PSO) to the grounding grid planning which compares to the application of genetic algorithm (GA). Firstly, based on IEEE Std.80, the cost function of the grounding grid and the constraints of ground potential rise, step voltage and touch voltage are constructed for formulating the optimization problem of grounding grid planning. Secondly, GA and PSO algorithms for obtaining optimal solution of grounding grid are developed. Finally, a case of grounding grid planning is shown the superiority and availability of the PSO algorithm and proposal planning results of grounding grid in cost and computational time.Keywords: Genetic algorithm, particle swarm optimization, grounding grid.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 20771439 Implementing a Database from a Requirement Specification
Abstract:
Creating a database scheme is essentially a manual process. From a requirement specification the information contained within has to be analyzed and reduced into a set of tables, attributes and relationships. This is a time consuming process that has to go through several stages before an acceptable database schema is achieved. The purpose of this paper is to implement a Natural Language Processing (NLP) based tool to produce a relational database from a requirement specification. The Stanford CoreNLP version 3.3.1 and the Java programming were used to implement the proposed model. The outcome of this study indicates that a first draft of a relational database schema can be extracted from a requirement specification by using NLP tools and techniques with minimum user intervention. Therefore this method is a step forward in finding a solution that requires little or no user intervention.
Keywords: Information Extraction, Natural Language Processing, Relation Extraction.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 22241438 A Wireless Secure Remote Access Architecture Implementing Role Based Access Control: WiSeR
Authors: E. Tomur, R. Deregozu, T. Genc
Abstract:
In this study, we propose a network architecture for providing secure access to information resources of enterprise network from remote locations in a wireless fashion. Our proposed architecture offers a very promising solution for organizations which are in need of a secure, flexible and cost-effective remote access methodology. Security of the proposed architecture is based on Virtual Private Network technology and a special role based access control mechanism with location and time constraints. The flexibility mainly comes from the use of Internet as the communication medium and cost-effectiveness is due to the possibility of in-house implementation of the proposed architecture.Keywords: Remote access, wireless networks, security, virtualprivate networks, RBAC.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 16971437 STM Spectroscopy of Alloyed Nanocrystal Composite CdSxSe1-X
Authors: T. Abdallah, K. Easawi, A. Khalid, S. Negm, H. Talaat
Abstract:
Nanocrystals (NC) alloyed composite CdSxSe1-x(x=0 to 1) have been prepared using the chemical solution deposition technique. The energy band gap of these alloyed nanocrystals of approximately the same size, have been determined by scanning tunneling spectroscopy (STS) technique at room temperature. The values of the energy band gap obtained directly using STS are compared to those measured by optical spectroscopy. Increasing the molar fraction ratio x from 0 to 1 causes clearly observed increase in the band gap of the alloyed composite nanocrystal. Vegard-s law was applied to calculate the parameters of the effective mass approximation (EMA) model and the dimension obtained were compared to the values measured by STM. The good agreement of the calculated and measured values is a direct result of applying Vegard's law in the nanocomposites.Keywords: Alloy semiconductor nanocrystals, STM.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 14661436 Gas Sweetening Process Simulation: Investigation on Recovering Waste Hydraulic Energy
Authors: Meisam Moghadasi, Hassan Ali Ozgoli, Foad Farhani
Abstract:
In this research, firstly, a commercial gas sweetening unit with methyl-di-ethanol-amine (MDEA) solution is simulated and comprised in an integrated model in accordance with Aspen HYSYS software. For evaluation purposes, in the second step, the results of the simulation are compared with operating data gathered from South Pars Gas Complex (SPGC). According to the simulation results, the considerable energy potential contributed to the pressure difference between absorber and regenerator columns causes this energy driving force to be applied in power recovery turbine (PRT). In the last step, the amount of waste hydraulic energy is calculated, and its recovery methods are investigated.
Keywords: Gas sweetening unit, simulation, MDEA, power recovery turbine, waste-to-energy.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 10751435 Solitary Wave Solutions for Burgers-Fisher type Equations with Variable Coefficients
Authors: Amit Goyal, Alka, Rama Gupta, C. Nagaraja Kumar
Abstract:
We have solved the Burgers-Fisher (BF) type equations, with time-dependent coefficients of convection and reaction terms, by using the auxiliary equation method. A class of solitary wave solutions are obtained, and some of which are derived for the first time. We have studied the effect of variable coefficients on physical parameters (amplitude and velocity) of solitary wave solutions. In some cases, the BF equations could be solved for arbitrary timedependent coefficient of convection term.Keywords: Solitary wave solution, Variable coefficient Burgers- Fisher equation, Auxiliary equation method.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 16261434 Evaluating the Effectiveness of Memory Overcommit Techniques on KVM-based Hosting Platform
Authors: Chin-Hung Li
Abstract:
Determining how many virtual machines a Linux host could run can be a challenge. One of tough missions is to find the balance among performance, density and usability. Now KVM hypervisor has become the most popular open source full virtualization solution. It supports several ways of running guests with more memory than host really has. Due to large differences between minimum and maximum guest memory requirements, this paper presents initial results on same-page merging, ballooning and live migration techniques that aims at optimum memory usage on KVM-based cloud platform. Given the design of initial experiments, the results data is worth reference for system administrators. The results from these experiments concluded that each method offers different reliability tradeoff.Keywords: Kernel-based Virtual Machine, Overcommit, Virtualization.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 31191433 Adsorption of Copper by using Microwave Incinerated Rice Husk Ash (MIRHA)
Authors: N.A.Johan, S.R.M.Kutty, M. H. Isa, N.S.Muhamad, H.Hashim
Abstract:
Many non-conventional adsorbent have been studied as economic alternative to commercial activated carbon and mostly agricultural waste have been introduced such as rubber leaf powder and hazelnut shell. Microwave Incinerated Rice Husk Ash (MIRHA), produced from the rice husk is one of the low-cost materials that were used as adsorbent of heavy metal. The aim of this research was to study the feasibility of using MIRHA500 and MIRHA800 as adsorbent for the removal of Cu(II) metal ions from aqueous solutions by the batch studies. The adsorption of Cu(II) into MIRHA500 and MIRH800 favors Fruendlich isotherm and imply pseudo – kinetic second order which applied chemisorptionsKeywords: Copper (II) aqueous solution, batch study, MIRHA500, MIRHA800, Microwave Incinerated Rice Husk Ash(MIRHA)
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 19181432 2n Almost Periodic Attractors for Cohen-Grossberg Neural Networks with Variable and Distribute Delays
Abstract:
In this paper, we investigate dynamics of 2n almost periodic attractors for Cohen-Grossberg neural networks (CGNNs) with variable and distribute time delays. By imposing some new assumptions on activation functions and system parameters, we split invariant basin of CGNNs into 2n compact convex subsets. Then the existence of 2n almost periodic solutions lying in compact convex subsets is attained due to employment of the theory of exponential dichotomy and Schauder-s fixed point theorem. Meanwhile, we derive some new criteria for the networks to converge toward these 2n almost periodic solutions and exponential attracting domains are also given correspondingly.
Keywords: CGNNs, almost periodic solution, invariant basins, attracting domains.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 13801431 Practical Problems as Tools for the Development of Secondary School Students’ Motivation to Learn Mathematics
Authors: M. Rodionov, Z. Dedovets
Abstract:
This article discusses plausible reasoning use for solution to practical problems. Such reasoning is the major driver of motivation and implementation of mathematical, scientific and educational research activity. A general, practical problem solving algorithm is presented which includes an analysis of specific problem content to build, solve and interpret the underlying mathematical model. The author explores the role of practical problems such as the stimulation of students' interest, the development of their world outlook and their orientation in the modern world at the different stages of learning mathematics in secondary school. Particular attention is paid to the characteristics of those problems which were systematized and presented in the conclusions.
Keywords: Mathematics, motivation, secondary school, student, practical problem.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 10631430 New Fourth Order Explicit Group Method in the Solution of the Helmholtz Equation
Authors: Norhashidah Hj. Mohd Ali, Teng Wai Ping
Abstract:
In this paper, the formulation of a new group explicit method with a fourth order accuracy is described in solving the two dimensional Helmholtz equation. The formulation is based on the nine-point fourth order compact finite difference approximation formula. The complexity analysis of the developed scheme is also presented. Several numerical experiments were conducted to test the feasibility of the developed scheme. Comparisons with other existing schemes will be reported and discussed. Preliminary results indicate that this method is a viable alternative high accuracy solver to the Helmholtz equation.
Keywords: Explicit group method, finite difference, Helmholtz equation, five-point formula, nine-point formula.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 20791429 A Proposal for Systematic Mapping Study of Software Security Testing, Verification and Validation
Authors: Adriano Bessa Albuquerque, Francisco Jose Barreto Nunes
Abstract:
Software vulnerabilities are increasing and not only impact services and processes availability as well as information confidentiality, integrity and privacy, but also cause changes that interfere in the development process. Security test could be a solution to reduce vulnerabilities. However, the variety of test techniques with the lack of real case studies of applying tests focusing on software development life cycle compromise its effective use. This paper offers an overview of how a Systematic Mapping Study (MS) about security verification, validation and test (VVT) was performed, besides presenting general results about this study.
Keywords: Software test, software security verification validation and test, security test institutionalization, systematic mapping study.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 16221428 Polydopamine Nanoparticle as a Stable and Capacious Nano-Reservoir of Rifampicin
Authors: Tasnuva Tamanna, Aimin Yu
Abstract:
Application of nanoscience in biomedical field has come across as a new era. This study involves the synthesis of nano drug carrier with antibiotic loading. Based on the founding that polydopamine (PDA) nanoparticles could be formed via self-polymerization of dopamine at alkaline pH, one-step synthesis of rifampicin coupled polydopamine (PDA-R) nanoparticles was achieved by adding rifampicin into the dopamine solution. The successful yield of PDA nanoparticles with or without the presence of rifampicin during the polymerization process was characterized by scanning electron microscopy, Fourier transform infrared spectroscopy, and Raman spectroscopy. Drug loading was monitored by UV-vis spectroscopy and the loading efficiency of rifampicin was calculated to be 76%. Such highly capacious nano-reservoir was found very stable with little drug leakage at pH 3.
Keywords: Drug loading, nanoparticles, polydopamine, rifampicin.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 26691427 Ion-Acoustic Double Layer in a Plasma with Two- Temperature Nonisothermal Electrons and Charged Dust Grains
Authors: Basudev Ghosh, Sreyasi Banerjee
Abstract:
Using the pseudopotential technique the Sagdeev potential equation has been derived in a plasma consisting of twotemperature nonisothermal electrons, negatively charged dust grains and warm positive ions. The study shows that the presence of nonisothermal two-temperature electrons and charged dust grains have significant effects on the excitation and structure of the ionacoustic double layers in the model plasma under consideration. Only compressive type double layer is obtained in the present plasma model. The double layer solution has also been obtained by including higher order nonlinearity and nonisothermality, which is shown to modify the amplitude and deform the shape of the double layer.
Keywords: Two temperature non-isothermal electrons and charged dust grains.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 32041426 Batch and Continuous Packed Column Studies Biosorption by Yeast Supported onto Granular Pozzolana
Authors: A. Djafer, S. Kouadri Moustefai, A. Idou, M. Douani
Abstract:
The removal of chromium by living yeast biomass immobilized onto pozzolana was studied. The results obtained in batch experiments indicate that the immobilized yeast on to pozzolana is a excellent biosorbent of Cr(V) with a good removal rates of 85–90%. The initial concentration solution and agitation speed affected Cr(V) removal. The batch studies data were described using the Freundlich and Langmuir models, but the best fit was obtained with Langmuir model. The breakthrough curve from the continuous flow studies shows that immobilized yeast in the fixed-bed column is capable of decreasing Cr(VI) concentration from 15mg/l to a adequate level.
Keywords: Biosorption, yeast, chromium, kinetic biosorption, fixed biomass
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 30661425 Effect of Thermal Radiation on Temperature Variation in 2-D Stagnation-Point flow
Authors: Vai Kuong Sin
Abstract:
Non-isothermal stagnation-point flow with consideration of thermal radiation is studied numerically. A set of partial differential equations that governing the fluid flow and energy is converted into a set of ordinary differential equations which is solved by Runge-Kutta method with shooting algorithm. Dimensionless wall temperature gradient and temperature boundary layer thickness for different combinaton of values of Prandtl number Pr and radiation parameter NR are presented graphically. Analyses of results show that the presence of thermal radiation in the stagnation-point flow is to increase the temperature boundary layer thickness and decrease the dimensionless wall temperature gradient.
Keywords: Stagnation-point flow, Similarity solution, Thermal radiation.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 15331424 Cooperative CDD Scheme Based on Hierarchical Modulation in OFDM System
Authors: Seung-Jun Yu, Yeong-Seop Ahn, Young-Min Ko, Hyoung-Kyu Song
Abstract:
In order to achieve high data rate and increase the spectral efficiency, multiple input multiple output (MIMO) system has been proposed. However, multiple antennas are limited by size and cost. Therefore, recently developed cooperative diversity scheme, which profits the transmit diversity only with the existing hardware by constituting a virtual antenna array, can be a solution. However, most of the introduced cooperative techniques have a common fault of decreased transmission rate because the destination should receive the decodable compositions of symbols from the source and the relay. In this paper, we propose a cooperative cyclic delay diversity (CDD) scheme that use hierarchical modulation. This scheme is free from the rate loss and allows seamless cooperative communication.Keywords: MIMO, Cooperative communication, CDD, Hierarchical modulation.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 21961423 Basket Option Pricing under Jump Diffusion Models
Authors: Ali Safdari-Vaighani
Abstract:
Pricing financial contracts on several underlying assets received more and more interest as a demand for complex derivatives. The option pricing under asset price involving jump diffusion processes leads to the partial integral differential equation (PIDEs), which is an extension of the Black-Scholes PDE with a new integral term. The aim of this paper is to show how basket option prices in the jump diffusion models, mainly on the Merton model, can be computed using RBF based approximation methods. For a test problem, the RBF-PU method is applied for numerical solution of partial integral differential equation arising from the two-asset European vanilla put options. The numerical result shows the accuracy and efficiency of the presented method.Keywords: Radial basis function, basket option, jump diffusion, RBF-PUM.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 12061422 Deficits and Solutions in the Development of Modular Factory Systems
Authors: Achim Kampker, Peter Burggräf, Moritz Krunke, Hanno Voet
Abstract:
As a reaction to current challenges in factory planning, many companies think about introducing factory standards to lower planning times and decrease planning costs. If these factory standards are set-up with a high level of modularity, they are defined as modular factory systems. This paper deals with the main current problems in the application of modular factory systems in practice and presents a solution approach with its basic models. The methodology is based on methods from factory planning but also uses the tools of other disciplines like product development or technology management to deal with the high complexity, which the development of modular factory systems implies. The four basic models that such a methodology has to contain are introduced and pointed out.
Keywords: Factory planning, modular factory systems, factory standards, cost-benefit analysis.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 9831421 Switched Reluctance Generator for Wind Power Applications
Authors: M. Nassereddine, J. Rizk, M. Nagrial
Abstract:
Green house effect has becomes a serious concern in many countries due to the increase consumption of the fossil fuel. There have been many studies to find an alternative power source. Wind energy found to be one of the most useful solutions to help in overcoming the air pollution and global. There is no agreed solution to conversion of wind energy to electrical energy. In this paper, the advantages of using a Switched Reluctance Generator (SRG) for wind energy applications. The theoretical study of the self excitation of a SRG and the determination of the variable parameters in a SRG design are discussed. The design parameters for the maximum power output of the SRG are computed using Matlab simulation. The designs of the circuit to control the variable parameters in a SRG to provide the maximum power output are also discussed.Keywords: Switched Reluctance Generator, Wind Power, Electrical Machines.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 30031420 Commercializing Technology Solutions- Moving from Products to Solutions
Authors: Anand Dass, Hiroaki Murakami
Abstract:
The paper outlines the drivers behind the movement from products to solutions in the Hi-Tech Business-to-Business markets. The paper lists out the challenges in enabling the transformation from products to solutions and also attempts to explore strategic and operational recommendations based on the authors- factual experiences with Japanese Hi-tech manufacturing organizations. Organizations in the Hi-Tech Business-to-Business markets are increasingly being compelled to move to a solutions model from the conventional products model. Despite the added complexity of solutions, successful technology commercialization can be achieved by making prudent choices in defining a relevant solutions model, by backing the solution model through appropriate organizational design, and by overhauling the new product development process and supporting infrastructure.Keywords: Technology commercialization, Solutions, Hi-Tech companies, Japan, Management of technology
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 13571419 Event Monitoring Web Services for Heterogeneous Information Systems
Authors: Arne Koschel, Irina Astrova
Abstract:
Heterogeneity has to be taken into account when integrating a set of existing information sources into a distributed information system that are nowadays often based on Service- Oriented Architectures (SOA). This is also particularly applicable to distributed services such as event monitoring, which are useful in the context of Event Driven Architectures (EDA) and Complex Event Processing (CEP). Web services deal with this heterogeneity at a technical level, also providing little support for event processing. Our central thesis is that such a fully generic solution cannot provide complete support for event monitoring; instead, source specific semantics such as certain event types or support for certain event monitoring techniques have to be taken into account. Our core result is the design of a configurable event monitoring (Web) service that allows us to trade genericity for the exploitation of source specific characteristics. It thus delivers results for the areas of SOA, Web services, CEP and EDA.Keywords: ECA, CEP, SOA, and Web services.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1540