Search results for: Convergence order
3411 Design and Trajectory Planning of Bipedal Walking Robot with Minimum Sufficient Actuation System
Authors: H. Siswoyo Jo, N. Mir-Nasiri, E. Jayamani
Abstract:
This paper presents a new type of mechanism and trajectory planning strategy for bipedal walking robot. The newly designed mechanism is able to improve the performance of bipedal walking robot in terms of energy efficiency and weight reduction by utilizing minimum number of actuators. The usage of parallelogram mechanism eliminates the needs of having an extra actuator at the knee joint. This mechanism works together with the joint space trajectory planning in order to realize straight legged walking which cannot be achieved by conventional inverse kinematics trajectory planning due to the singularity. The effectiveness of the proposed strategy is confirmed by computer simulation results.
Keywords: Bipedal robot, Energy efficiency, Straight legged walking, Trajectory planning.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 18613410 An Enhanced Cryptanalytic Attack on Knapsack Cipher using Genetic Algorithm
Authors: Poonam Garg, Aditya Shastri, D.C. Agarwal
Abstract:
With the exponential growth of networked system and application such as eCommerce, the demand for effective internet security is increasing. Cryptology is the science and study of systems for secret communication. It consists of two complementary fields of study: cryptography and cryptanalysis. The application of genetic algorithms in the cryptanalysis of knapsack ciphers is suggested by Spillman [7]. In order to improve the efficiency of genetic algorithm attack on knapsack cipher, the previously published attack was enhanced and re-implemented with variation of initial assumptions and results are compared with Spillman results. The experimental result of research indicates that the efficiency of genetic algorithm attack on knapsack cipher can be improved with variation of initial assumption.Keywords: Genetic Algorithm, Knapsack cipher, Key search.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 17023409 Stabilization Technique for Multi-Inputs Voltage Sense Amplifiers in Node Sharing Converters
Authors: Sanghoon Park, Ki-Jin Kim, Kwang-Ho Ahn
Abstract:
This paper discusses the undesirable charge transfer through the parasitic capacitances of the input transistors in a multi-inputs voltage sense amplifier. Its intrinsic rail-to-rail voltage transitions at the output nodes inevitably disturb the input sides through the capacitive coupling between the outputs and inputs. Then, it can possible degrade the stabilities of the reference voltage levels. Moreover, it becomes more serious in multi-channel systems by altering them for other channels, and so degrades the linearity of the overall systems. In order to alleviate the internal node voltage transition, the internal node stabilization techniques are proposed. It achieves 45% and 40% improvements for node stabilization and input referred disturbance, respectively.
Keywords: Voltage sense amplifier, multi-inputs, voltage transition, node stabilization, and biasing circuits.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 24673408 Restricted Pedestrian Flow Performance Measures during Egress from a Complex Facility
Authors: Luthful A. Kawsar, Noraida A. Ghani, Anton A. Kamil, Adli Mustafa
Abstract:
In this paper, we use an M/G/C/C state dependent queuing model within a complex network topology to determine the different performance measures for pedestrian traffic flow. The occupants in this network topology need to go through some source corridors, from which they can choose their suitable exiting corridors. The performance measures were calculated using arrival rates that maximize the throughputs of source corridors. In order to increase the throughput of the network, the result indicates that the flow direction of pedestrian through the corridors has to be restricted and the arrival rates to the source corridor need to be controlled.Keywords: Arrival rate, Multiple arrival sources, Probability of blocking, State dependent queuing networks, Throughput.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 15793407 Color and Layout-based Identification of Documents Captured from Handheld Devices
Authors: Ardhendu Behera, Denis Lalanne, Rolf Ingold
Abstract:
This paper proposes a method, combining color and layout features, for identifying documents captured from low-resolution handheld devices. On one hand, the document image color density surface is estimated and represented with an equivalent ellipse and on the other hand, the document shallow layout structure is computed and hierarchically represented. Our identification method first uses the color information in the documents in order to focus the search space on documents having a similar color distribution, and finally selects the document having the most similar layout structure in the remaining of the search space.Keywords: Document color modeling, document visualsignature, kernel density estimation, document identification.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 15773406 Quantitative Estimation of Periodicities in Lyari River Flow Routing
Authors: Rana Khalid Naeem, Asif Mansoor
Abstract:
The hydrologic time series data display periodic structure and periodic autoregressive process receives considerable attention in modeling of such series. In this communication long term record of monthly waste flow of Lyari river is utilized to quantify by using PAR modeling technique. The parameters of model are estimated by using Frances & Paap methodology. This study shows that periodic autoregressive model of order 2 is the most parsimonious model for assessing periodicity in waste flow of the river. A careful statistical analysis of residuals of PAR (2) model is used for establishing goodness of fit. The forecast by using proposed model confirms significance and effectiveness of the model.Keywords: Diagnostic checks, Lyari river, Model selection, Monthly waste flow, Periodicity, Periodic autoregressive model.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 16543405 Automatic Fingerprint Classification Using Graph Theory
Authors: Mana Tarjoman, Shaghayegh Zarei
Abstract:
Using efficient classification methods is necessary for automatic fingerprint recognition system. This paper introduces a new structural approach to fingerprint classification by using the directional image of fingerprints to increase the number of subclasses. In this method, the directional image of fingerprints is segmented into regions consisting of pixels with the same direction. Afterwards the relational graph to the segmented image is constructed and according to it, the super graph including prominent information of this graph is formed. Ultimately we apply a matching technique to compare obtained graph with the model graphs in order to classify fingerprints by using cost function. Increasing the number of subclasses with acceptable accuracy in classification and faster processing in fingerprints recognition, makes this system superior.
Keywords: Classification, Directional image, Fingerprint, Graph, Super graph.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 36443404 E-Voting: A Trustworthiness In Democratic; A View from Technology, Political and Social Issue
Authors: Sera Syarmila Sameon, Rohaini Ramli
Abstract:
A trustworthy voting process in democratic is important that each vote is recorded with accuracy and impartiality. The accuracy and impartiality are tallied in high rate with biometric system. One of the sign is a fingerprint. Fingerprint recognition is still a challenging problem, because of the distortions among the different impression of the same finger. Because of the trustworthy of biometric voting technologies, it may give a great effect on numbers of voter-s participation and outcomes of the democratic process. Hence in this study, the authors are interested in designing and analyzing the Electronic Voting System and the participation of the users. The system is based on the fingerprint minutiae with the addition of person ID number. This is in order to enhance the accuracy and speed of the voting process. The new design is analyzed by conducting pilot election among a class of students for selecting their representative.Keywords: Biometric, FAR and FRR, democratic, voting
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 15783403 Control of a DC Servomotor Using Fuzzy Logic Sliding Mode Model Following Controller
Authors: Phongsak Phakamach
Abstract:
A DC servomotor position control system using a Fuzzy Logic Sliding mode Model Following Control or FLSMFC approach is presented. The FLSMFC structure consists of an integrator and variable structure system. The integral control is introduced into it in order to eliminated steady state error due to step and ramp command inputs and improve control precision, while the fuzzy control would maintain the insensitivity to parameter variation and disturbances. The FLSMFC strategy is implemented and applied to a position control of a DC servomotor drives. Experimental results indicated that FLSMFC system performance with respect to the sensitivity to parameter variations is greatly reduced. Also, excellent control effects and avoids the chattering phenomenon.
Keywords: Sliding mode model following control, fuzzy logic, DC servomotor.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 19193402 Integrating E-learning Environments with Computational Intelligence Assessment Agents
Authors: Christos E. Alexakos, Konstantinos C. Giotopoulos, Eleni J. Thermogianni, Grigorios N. Beligiannis, Spiridon D. Likothanassis
Abstract:
In this contribution an innovative platform is being presented that integrates intelligent agents in legacy e-learning environments. It introduces the design and development of a scalable and interoperable integration platform supporting various assessment agents for e-learning environments. The agents are implemented in order to provide intelligent assessment services to computational intelligent techniques such as Bayesian Networks and Genetic Algorithms. The utilization of new and emerging technologies like web services allows integrating the provided services to any web based legacy e-learning environment.Keywords: Bayesian Networks, Computational Intelligence techniques, E-learning legacy systems, Service Oriented Integration, Intelligent Agents
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 19413401 Investigation on Novel Based Metaheuristic Algorithms for Combinatorial Optimization Problems in Ad Hoc Networks
Authors: C. Rajan, N. Shanthi, C. Rasi Priya, K. Geetha
Abstract:
Routing in MANET is extremely challenging because of MANETs dynamic features, its limited bandwidth, frequent topology changes caused by node mobility and power energy consumption. In order to efficiently transmit data to destinations, the applicable routing algorithms must be implemented in mobile ad-hoc networks. Thus we can increase the efficiency of the routing by satisfying the Quality of Service (QoS) parameters by developing routing algorithms for MANETs. The algorithms that are inspired by the principles of natural biological evolution and distributed collective behavior of social colonies have shown excellence in dealing with complex optimization problems and are becoming more popular. This paper presents a survey on few meta-heuristic algorithms and naturally-inspired algorithms.
Keywords: Ant colony optimization, genetic algorithm, Naturally-inspired algorithms and particle swarm optimization.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 27093400 Forced Vibration of a Fiber Metal Laminated Beam Containing a Delamination
Authors: Sh. Mirhosseini, Y. Haghighatfar, M. Sedighi
Abstract:
Forced vibration problem of a delaminated beam made of fiber metal laminates is studied in this paper. Firstly, a delamination is considered to divide the beam into four sections. The classic beam theory is assumed to dominate each section. The layers on two sides of the delamination are constrained to have the same deflection. This hypothesis approves the conditions of compatibility as well. Consequently, dynamic response of the beam is obtained by the means of differential transform method (DTM). In order to verify the correctness of the results, a model is constructed using commercial software ABAQUS 6.14. A linear spring with constant stiffness takes the effect of contact between delaminated layers into account. The attained semi-analytical outcomes are in great agreement with finite element analysis.
Keywords: Delamination, forced vibration, finite element modelling, natural frequency.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 8393399 Improvement of the Quality of Internet Service Based On an Internet Exchange Point (IXP)
Authors: Souleymane Oumtanaga, Falilu Abudul Kadiri
Abstract:
Internet is without any doubt the fastest and effective mean of communication making it possible to reach a great number of people in the world. It draws its base from exchange points. Indeed exchange points are used to inter-connect various Internet suppliers and operators in order to allow them to exchange traffic and it is with these interconnections that Internet made its great strides. They thus make it possible to limit the traffic delivered via the operators of transits. This limitation allows a significant improvement of the quality of service, a reduction in the latency time just as a reduction of the cost of connection for the final subscriber. Through this article we will show how the installation of an IXP allows an improvement and a diversification of the services just as a reduction of the Internet connection costs.
Keywords: Quality of service, Exchange point, interconnection, Service providers, bandwidth, traffic, routers, routing table.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 14713398 Production and Mechanical Characterization of Ballistic Thermoplastic Composite Materials
Authors: D. Korsacilar, C. Atas
Abstract:
In this study, first thermoplastic composite materials /plates that have high ballistic impact resistance were produced. For this purpose, the thermoplastic prepreg and the vacuum bagging technique were used to produce a composite material. Thermoplastic prepregs (resin-impregnated fiber) that are supplied ready to be used, namely high-density polyethylene (HDPE) was chosen as matrix and unidirectional glass fiber was used as reinforcement. In order to compare the fiber configuration effect on mechanical properties, unidirectional and biaxial prepregs were used. Then the microstructural properties of the composites were investigated with scanning electron microscopy (SEM) analysis. Impact properties of the composites were examined by Charpy impact test and tensile mechanical tests and then the effects of ultraviolet irradiation were investigated on mechanical performance.
Keywords: Ballistic, Composite, Thermoplastic.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 28923397 On The Design of Robust Governors of Steam Power Systems Using Polynomial and State-Space Based H∞ Techniques: A Comparative Study
Authors: Rami A. Maher, Ibraheem K. Ibraheem
Abstract:
This work presents a comparison study between the state-space and polynomial methods for the design of the robust governor for load frequency control of steam turbine power systems. The robust governor is synthesized using the two approaches and the comparison is extended to include time and frequency domains performance, controller order, and uncertainty representation, weighting filters, optimality and sub-optimality. The obtained results are represented through tables and curves with reasons of similarities and dissimilarities.
Keywords: Robust control, load frequency control, steam turbine, H∞-norm, system uncertainty, load disturbance.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 20663396 Quality Management in Public e-Administration
Authors: J. Ruso, M. Krsmanovic, A. Trajkovic, Z. Rakicevic
Abstract:
Since the late 1970s, quality management has become an important tool for achieving a high quality of public e-administration services in many countries. Very important part of quality management in e-administration is measurement of quality indicators related to this sector. Therefore, this paper gives a description of e-administration, including statistics about it and other examples from many countries worldwide, as well as the explanation of quality management in public e-administration. The paper also gives a list and description of quality indicators relevant to e-administration, as part of quality management within the e-administration. Through a literature review and best practices, the paper aims to analyze quality indicators measurement and other parts of good quality management when it comes to the public e-administration and consequently to show the usefulness of quality management in public e-administration in order to provide services of high quality.
Keywords: e-Administration, quality indicators, quality management.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 18603395 Clusterization Probability in 14N Nuclei
Authors: N. Burtebayev, Sh. Hamada, Zh. Kerimkulov, D. K. Alimov, A. V. Yushkov, N. Amangeldi, A. N. Bakhtibaev
Abstract:
The main aim of the current work is to examine if 14N is candidate to be clusterized nuclei or not. In order to check this attendance, we have measured the angular distributions for 14N ion beam elastically scattered on 12C target nuclei at different low energies; 17.5, 21, and 24.5MeV which are close to the Coulomb barrier energy for 14N+12C nuclear system. Study of various transfer reactions could provide us with useful information about the attendance of nuclei to be in a composite form (core + valence). The experimental data were analyzed using two approaches; Phenomenological (Optical Potential) and semi-microscopic (Double Folding Potential). The agreement between the experimental data and the theoretical predictions is fairly good in the whole angular range.
Keywords: Deuteron Transfer, Elastic Scattering, Optical Model, Double Folding, Density Distribution.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 14783394 Impact of Terrorism as an Asymmetrical Threat on the State's Conventional Security Forces
Authors: Igor Pejic
Abstract:
The main focus of this research will be on analyzing correlative links between terrorism as an asymmetrical threat and the consequences it leaves on conventional security forces. The methodology behind the research will include qualitative research methods focusing on comparative analysis of books, scientific papers, documents and other sources, in order to deduce, explore and formulate the results of the research. With the coming of the 21st century and the rising multi-polar, new world threats quickly emerged. The realistic approach in international relations deems that relations among nations are in a constant state of anarchy since there are no definitive rules and the distribution of power varies widely. International relations are further characterized by egoistic and self-orientated human nature, anarchy or absence of a higher government, security and lack of morality. The asymmetry of power is also reflected on countries' security capabilities and its abilities to project power. With the coming of the new millennia and the rising multi-polar world order, the asymmetry of power can be also added as an important trait of the global society which consequently brought new threats. Among various others, terrorism is probably the most well-known, well-based and well-spread asymmetric threat. In today's global political arena, terrorism is used by state and non-state actors to fulfill their political agendas. Terrorism is used as an all-inclusive tool for regime change, subversion or a revolution. Although the nature of terrorist groups is somewhat inconsistent, terrorism as a security and social phenomenon has a one constant which is reflected in its political dimension. The state's security apparatus, which was embodied in the form of conventional armed forces, is now becoming fragile, unable to tackle new threats and to a certain extent outdated. Conventional security forces were designed to defend or engage an exterior threat which is more or less symmetric and visible. On the other hand, terrorism as an asymmetrical threat is a part of hybrid, special or asymmetric warfare in which specialized units, institutions or facilities represent the primary pillars of security. In today's global society, terrorism is probably the most acute problem which can paralyze entire countries and their political systems. This problem, however, cannot be engaged on an open field of battle, but rather it requires a different approach in which conventional armed forces cannot be used traditionally and their role must be adjusted. The research will try to shed light on the phenomena of modern day terrorism and to prove its correlation with the state conventional armed forces. States are obliged to adjust their security apparatus to the new realism of global society and terrorism as an asymmetrical threat which is a side-product of the unbalanced world.
Keywords: Asymmetrical warfare, conventional forces, security, terrorism.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 12833393 A Parallel Algorithm for 2-D Cylindrical Geometry Transport Equation with Interface Corrections
Authors: Wei Jun-xia, Yuan Guang-wei, Yang Shu-lin, Shen Wei-dong
Abstract:
In order to make conventional implicit algorithm to be applicable in large scale parallel computers , an interface prediction and correction of discontinuous finite element method is presented to solve time-dependent neutron transport equations under 2-D cylindrical geometry. Domain decomposition is adopted in the computational domain.The numerical experiments show that our parallel algorithm with explicit prediction and implicit correction has good precision, parallelism and simplicity. Especially, it can reach perfect speedup even on hundreds of processors for large-scale problems.
Keywords: Transport Equation, Discontinuous Finite Element, Domain Decomposition, Interface Prediction And Correction
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 16693392 Sub-Impact Phenomenon of Elasto-Plastic Free-Free Beam during a Strike
Authors: H. Rong, X. C. Yin, J. Yang, Y. N. Shen
Abstract:
Based on Rayleigh beam theory, the sub-impacts of a free-free beam struck horizontally by a round-nosed rigid mass is simulated by the finite difference method and the impact-separation conditions. In order to obtain the sub-impact force, a uniaxial compression elastic-plastic contact model is employed to analyze the local deformation field on contact zone. It is found that the horizontal impact is a complicated process including the elastic plastic sub-impacts in sequence. There are two sub-zones of sub-impact. In addition, it found that the elastic energy of the free-free beam is more suitable for the Poisson collision hypothesis to explain compression and recovery processes.Keywords: beam, sub-impact, elastic-plastic deformation, finite difference method.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 18613391 The Design of PFM Mode DC-DC Converter with DT-CMOS Switch
Authors: Jae-Chang Kwak, Yong-Seo Koo
Abstract:
The high efficiency power management IC (PMIC) with switching device is presented in this paper. PMIC is controlled with PFM control method in order to have high power efficiency at high current level. Dynamic Threshold voltage CMOS (DT-CMOS) with low on-resistance is designed to decrease conduction loss. The threshold voltage of DT-CMOS drops as the gate voltage increase, resulting in a much higher current handling capability than standard MOSFET. PFM control circuits consist of a generator, AND gate and comparator. The generator is made to have 1.2MHz oscillation voltage. The DC-DC converter based on PFM control circuit and low on-resistance switching device is presented in this paper.
Keywords: DT-CMOS, PMIC, PFM, DC-DC converter.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 32073390 A Numerical Study on Heat Transfer in Laminar Pulsed Slot Jets Impinging on a Surface
Authors: D. Kim
Abstract:
Numerical simulations are performed for laminar continuous and pulsed jets impinging on a surface in order to investigate the effects of pulsing frequency on the heat transfer characteristics. The time-averaged Nusselt number of pulsed jets is larger in the impinging jet region as compared to the continuous jet, while it is smaller in the outer wall jet region. At the stagnation point, the mean and RMS Nusselt numbers become larger and smaller, respectively, as the pulsing frequency increases. Unsteady behaviors of vortical fluid motions and temperature field are also investigated to understand the underlying mechanisms of heat transfer enhancement.Keywords: Pulsed slot jet, impingement, pulsing frequency, heat transfer enhancement.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 17363389 Trends in IT Consulting in Austria
Authors: Michael Torggler
Abstract:
IT consultants often take over an important role as an interface between technological, organizational and managerial structures. As a result, the services offered are in many cases assigned to different disciplines which can cause a lack of transparency on the market for consulting services. However, not all consulting products are suitable for every company because of different frameworks and business processes. In this context the questions arises as to what consulting products are currently offered and how they can be compared as well as how the market for IT consulting services is structured on the supply side. The presented study aims to shed light on the IT consulting market by giving an overview of the current structure of the supply-side for IT consulting services as well as proposing a categorization of the currently available consulting services (consulting fields) in order to provide a theoretical background for the empirical study. Apart from these theoretical considerations, the empirical results of field surveys on the Austrian IT consulting market are presented and analyzed.Keywords: IT Consulting, Management Consulting, ISConsulting, Consulting Fields, Market study.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 14153388 System Survivability in Networks in the Context of Defense/Attack Strategies: The Large Scale
Authors: A. Ben Yaghlane, M. N. Azaiez, M. Mrad
Abstract:
We investigate the large scale of networks in the context of network survivability under attack. We use appropriate techniques to evaluate and the attacker-based- and the defenderbased- network survivability. The attacker is unaware of the operated links by the defender. Each attacked link has some pre-specified probability to be disconnected. The defender choice is so that to maximize the chance of successfully sending the flow to the destination node. The attacker however will select the cut-set with the highest chance to be disabled in order to partition the network. Moreover, we extend the problem to the case of selecting the best p paths to operate by the defender and the best k cut-sets to target by the attacker, for arbitrary integers p,k>1. We investigate some variations of the problem and suggest polynomial-time solutions.Keywords: Defense/attack strategies, large scale, networks, partitioning a network.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 14853387 Adoptability Issues of GPS in Public Sector in Pakistan
Authors: Asim Tanvir, Numera Rafaqat
Abstract:
This study discusses the stumbling blocks stifling the adoption of GPS technology in the public sector of Pakistan. This study has been carried out in order to describe the value of GPS technology and its adoption at various public sector organisations in Pakistan. Sample size for the research conducted was 200; personnel working in public sector having age above 29 years were surveyed. Data collected for this research has been quantitatively analysed with the help of SPSS. Regression analysis, correlation and cross tabulation were the techniques used to determine the strength of relationship between key variables. Findings of this research indicate that main hurdles in GPS adoption in the public sector of Pakistan are lack of awareness about GPS among masses in general and the stakeholders in particular, lack of initiative on part of government in promoting new technologies, unavailability of GPS infrastructure in Pakistan and prohibitions on map availability because of security reasons.Keywords: Adoptability issues, Growth of GPS, GPSinfrastructure, Public sectors in Pakistan
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 17613386 Highly Efficient Silicon Photomultiplier for Positron Emission Tomography Application
Authors: Fei Sun, Ning Duan, Guo-Qiang Lo
Abstract:
A silicon photomultiplier (SiPM) was designed, fabricated and characterized. The SiPM was based on SACM (Separation of Absorption, Charge and Multiplication) structure, which was optimized for blue light detection in application of positron emission tomography (PET). The achieved SiPM array has a high geometric fill factor of 64% and a low breakdown voltage of about 22V, while the temperature dependence of breakdown voltage is only 17mV/°C. The gain and photon detection efficiency of the device achieved were also measured under illumination of light at 405nm and 460nm wavelengths. The gain of the device is in the order of 106. The photon detection efficiency up to 60% has been observed under 1.8V overvoltage.
Keywords: Photon Detection Efficiency, Positron Emission Tomography, Silicon Photomultiplier.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 17423385 A New Technique for Progressive ECG Transmission using Discrete Radon Transform
Authors: Amine Naït-Ali
Abstract:
The aim of this paper is to present a new method which can be used for progressive transmission of electrocardiogram (ECG). The idea consists in transforming any ECG signal to an image, containing one beat in each row. In the first step, the beats are synchronized in order to reduce the high frequencies due to inter-beat transitions. The obtained image is then transformed using a discrete version of Radon Transform (DRT). Hence, transmitting the ECG, leads to transmit the most significant energy of the transformed image in Radon domain. For decoding purpose, the receptor needs to use the inverse Radon Transform as well as the two synchronization frames. The presented protocol can be adapted for lossy to lossless compression systems. In lossy mode we show that the compression ratio can be multiplied by an average factor of 2 for an acceptable quality of reconstructed signal. These results have been obtained on real signals from MIT database.Keywords: Discrete Radon Transform, ECG compression, synchronization.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 14313384 A Numerical Modeling of Piping Phenomenon in Earth Dams
Authors: N. Zaki Alamdari, M. Banihashemi, A. Mirghasemi
Abstract:
To estimate the risks of dam failure phenomenon, it is necessary to understand this phenomenon and the involved governing factors. Overtopping and piping are the two main reasons of earthdam failures. In the piping context, the piping is determined as a phenomenon which is occurred between two phases, the water liquid and the solid soil. In this investigation, the onset of piping and its development, as well as the movement of water in soil, are numerically approached. In this regard, a one-dimensional numerical model based on the mass-conserving finite-volume method is developed and applied in order to simulate the piping phenomenon in a continuous circular tunnel of given initial length and radius, located between upstream and downstream. The simulation result includes the time-variations of radius along the tunnel until the radius value reaches its critical and the piping phenomenon converts to overtopping.
Keywords: Earth dam, dam break, piping, internal erosion
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 27883383 Research and Development of a Biomorphic Robot Driven by Shape Memory Alloys
Authors: Y.J. Lai, H.Y. Peng, M.W. Wu, J. Shaw
Abstract:
In this study, we used shape memory alloys as actuators to build a biomorphic robot which can imitate the motion of an earthworm. The robot can be used to explore in a narrow space. Therefore we chose shape memory alloys as actuators. Because of the small deformation of a wire shape memory alloy, spiral shape memory alloys are selected and installed both on the X axis and Y axis (each axis having two shape memory alloys) to enable the biomorphic robot to do reciprocating motion. By the mechanism we designed, the robot can increase the distance as it moves in a duty cycle. In addition, two shape memory alloys are added to the robot head for controlling right and left turns. By sending pulses through the I/O card from the controller, the signals are then amplified by a driver to heat the shape memory alloys in order to make the SMA shrink to pull the mechanism to move.Keywords: Biomorphic Robot, Shape Memory Alloy.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 16593382 Evaluation of PTFE Composites with Mineral Tailing Considering Friction, Wear and Cost
Authors: Antônio P. de Araújo Neto, Ruy D. A. da Silva Neto, Juliana R. de Souza, Salete K. P. de Medeiros, João T. N. de Medeiros
Abstract:
The tribological test with Pin-On-Disc configuration measures friction and wear properties in dry or lubricated sliding surfaces of a variety of materials and coatings. Polymeric matrix composites loaded with mineral filler were used, 1%, 3%, 10%, 30%, and 50% mass percentage of filler, to reduce the material cost by using mineral tailings. Using a pin-on-disc tribometer to quantify coefficient of friction and wear resistance of the specimens. The parameters known to performing the test were 300 rpm rotation, normal load of 16N and duration of 33.5 minutes. The composite with 10% mineral filler performed better, considering that the wear resistance was good when compared to the other compositions and an average low coefficient of friction, in the order of μ ≤ 0.15.Keywords: Microcomposites, microparticles tailings of scheelite, PTFE, tribology.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1590