Pub Date : 2012-04-03DOI: 10.1109/IBCAST.2012.6177591
M. Raza, S. Hyder
The black hole attack in wireless Ad Hoc network is major issue that needs efficient solutions. In black hole attack more than one node can be malicious. Most of the time black hole attack occurs in large Ad Hoc networks. The black hole attacks in wireless Ad Hoc network creates misunderstanding in network by introducing error in routing information that leads the node to select wrong path hence data lose occur. We have proposed a novel architecture of FRIMM (A Forced Routing Information Modification Model) prevents black hole attacks in wireless Ad Hoc network by introducing automatic error correction in routing information that leads the node to select correct path thus secure transmission will take place between source and destination. In this model we assume that the network is centralized. In this model we have used the popular protocol AODV (Ad Hoc On-Demand Distance Vector). It is constructed on three basic devices such as server, access points and nodes. Server and access points are fixed and has permanent infrastructure with each other. But the connections of nodes with access points are on Ad Hoc bases. The node can be any device a laptop, mobile phone etc. We used two technologies for communication between sever and access points and the access points to nodes. We have used WiMax technology (IEEE standard 802.16 10 to 66 GHz range) for the communication between server and access point, other technology WiFi (IEEE standard of 802.11b/g 2.400 GHz to 2.487 GHz) for the communication between access point and node. No nodes can communicate with sever without having connection with an access point, because the server does not have the capability of WiFi technology. We have deployed three access points in this scenario. Suppose a node come and generates request to access point for connection. The node gets response from any of the access point near to it depending upon the strength of signal. Suppose access point 1 response its request. The access point will do two amendments in its routing table first adding its MAC address in its routing table then assigning ID (N) to node. Secondly sends the updated routing table to other access points and to the server. Now another node comes into the network broadcast request for accessing access point. Two responses reached to the node, first from access point 2 and other from a malicious node saying that I am the server. In this situation the node decides to communicate directly to the server. Here black hole attack occurs, because server has no capability to communicate directly to node. The access point waits for few minutes then scan the network weather the node has leave the network or become the victim of black hole attack. After scanning the network the access point detect that node is communicating with undetermined node (M), so that access point 2 will listen the traffic between victim node and the malicious node then fetch MAC address of that malicious node. The access point also collects the
无线自组织网络中的黑洞攻击是一个亟待解决的重大问题。在黑洞攻击中,不止一个节点可能是恶意的。黑洞攻击大多发生在大型Ad Hoc网络中。无线Ad Hoc网络中的黑洞攻击通过在路由信息中引入错误,导致节点选择错误的路径,从而造成网络中的误解,从而导致数据丢失。我们提出了一种新的结构FRIMM(一种强制路由信息修改模型),通过在路由信息中引入自动纠错,引导节点选择正确的路径,从而在源和目的之间进行安全传输,从而防止无线Ad Hoc网络中的黑洞攻击。在这个模型中,我们假设网络是中心化的。在这个模型中,我们使用了流行的协议AODV (Ad Hoc On-Demand Distance Vector)。它建立在三个基本设备上:服务器、接入点和节点。服务器和接入点是固定的,并且彼此具有永久的基础设施。但是节点与接入点之间的连接是基于Ad Hoc的。节点可以是任何设备,如笔记本电脑、移动电话等。我们使用了两种技术来实现服务器和接入点之间以及节点接入点之间的通信。我们已经使用WiMax技术(IEEE标准802.16 10至66 GHz范围)用于服务器和接入点之间的通信,其他技术WiFi (IEEE标准802.11b/g 2.400 GHz至2.487 GHz)用于接入点和节点之间的通信。由于服务器不具备WiFi技术的能力,没有接入点连接,任何节点都无法与服务器进行通信。我们在这个场景中部署了三个接入点。假设一个节点来了,并生成了对接入点的连接请求。该节点根据信号的强度从靠近它的任何接入点获得响应。假设接入点1响应了它的请求。接入点将对其路由表进行两次修改,首先在其路由表中添加其MAC地址,然后为节点分配ID (N)。其次,将更新后的路由表发送到其他接入点和服务器。现在另一个节点进入网络广播请求访问接入点。到达节点的两个响应,第一个来自接入点2,另一个来自恶意节点,说我是服务器。在这种情况下,节点决定直接与服务器通信。这里发生黑洞攻击,因为服务器没有能力直接与节点通信。接入点等待几分钟,然后扫描网络是否节点已经离开网络或成为黑洞攻击的受害者。在对网络进行扫描后,接入点检测到该节点正在与未确定的节点(M)通信,接入点2将监听受害节点与恶意节点之间的流量,然后获取该恶意节点的MAC地址。接入点还收集节点向恶意节点发送的请求信息。同时,接入点2向网络内的所有其他接入点发出警报,并更新服务器关于黑洞攻击,并发送该恶意节点的MAC地址,并将收集到的节点请求发送到恶意节点。服务器在获得恶意节点的MAC地址后,通过接入点对黑洞进行攻击,通过引入干扰式DoS攻击,服务器可以通过接入点迫使节点将流量转向接入点。节点同意将其流量转向接入点,然后通过接入点开始节点和服务器之间的通信。这种力量导致节点修改其路由表,因此节点将其流量转向接入点,并通过接入点开始节点与服务器之间的通信。在这里遇到了黑洞攻击,通过自动修改节点的路由表。
{"title":"A forced routing information modification model for preventing black hole attacks in wireless Ad Hoc network","authors":"M. Raza, S. Hyder","doi":"10.1109/IBCAST.2012.6177591","DOIUrl":"https://doi.org/10.1109/IBCAST.2012.6177591","url":null,"abstract":"The black hole attack in wireless Ad Hoc network is major issue that needs efficient solutions. In black hole attack more than one node can be malicious. Most of the time black hole attack occurs in large Ad Hoc networks. The black hole attacks in wireless Ad Hoc network creates misunderstanding in network by introducing error in routing information that leads the node to select wrong path hence data lose occur. We have proposed a novel architecture of FRIMM (A Forced Routing Information Modification Model) prevents black hole attacks in wireless Ad Hoc network by introducing automatic error correction in routing information that leads the node to select correct path thus secure transmission will take place between source and destination. In this model we assume that the network is centralized. In this model we have used the popular protocol AODV (Ad Hoc On-Demand Distance Vector). It is constructed on three basic devices such as server, access points and nodes. Server and access points are fixed and has permanent infrastructure with each other. But the connections of nodes with access points are on Ad Hoc bases. The node can be any device a laptop, mobile phone etc. We used two technologies for communication between sever and access points and the access points to nodes. We have used WiMax technology (IEEE standard 802.16 10 to 66 GHz range) for the communication between server and access point, other technology WiFi (IEEE standard of 802.11b/g 2.400 GHz to 2.487 GHz) for the communication between access point and node. No nodes can communicate with sever without having connection with an access point, because the server does not have the capability of WiFi technology. We have deployed three access points in this scenario. Suppose a node come and generates request to access point for connection. The node gets response from any of the access point near to it depending upon the strength of signal. Suppose access point 1 response its request. The access point will do two amendments in its routing table first adding its MAC address in its routing table then assigning ID (N) to node. Secondly sends the updated routing table to other access points and to the server. Now another node comes into the network broadcast request for accessing access point. Two responses reached to the node, first from access point 2 and other from a malicious node saying that I am the server. In this situation the node decides to communicate directly to the server. Here black hole attack occurs, because server has no capability to communicate directly to node. The access point waits for few minutes then scan the network weather the node has leave the network or become the victim of black hole attack. After scanning the network the access point detect that node is communicating with undetermined node (M), so that access point 2 will listen the traffic between victim node and the malicious node then fetch MAC address of that malicious node. The access point also collects the ","PeriodicalId":251584,"journal":{"name":"Proceedings of 2012 9th International Bhurban Conference on Applied Sciences & Technology (IBCAST)","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127141622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-04-03DOI: 10.1109/IBCAST.2012.6177583
U. Naeem, Nausheen Zia, M. A. Shah
The presented work details design of a compact diplexer for space applications. The proposed diplexer is destined for on-board S-band telemetry and tele-command transmit-receive system. Such an application dictates stringent requirements, of performance and compactness, over the design of components. The design offers compactness and will reduce the requirement of two antennas to one dual-band transmit-receive antenna. The proposed design is based on rod resonator waveguide filters. The required isolation between the transmit/receive channels is achieved through the efficient use of cross couplings. The paper focuses on simulation, optimization, and implementation of the design.
{"title":"A compact diplexer for telemetry and telecommand transmit-receive system for space applications","authors":"U. Naeem, Nausheen Zia, M. A. Shah","doi":"10.1109/IBCAST.2012.6177583","DOIUrl":"https://doi.org/10.1109/IBCAST.2012.6177583","url":null,"abstract":"The presented work details design of a compact diplexer for space applications. The proposed diplexer is destined for on-board S-band telemetry and tele-command transmit-receive system. Such an application dictates stringent requirements, of performance and compactness, over the design of components. The design offers compactness and will reduce the requirement of two antennas to one dual-band transmit-receive antenna. The proposed design is based on rod resonator waveguide filters. The required isolation between the transmit/receive channels is achieved through the efficient use of cross couplings. The paper focuses on simulation, optimization, and implementation of the design.","PeriodicalId":251584,"journal":{"name":"Proceedings of 2012 9th International Bhurban Conference on Applied Sciences & Technology (IBCAST)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125165786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-04-03DOI: 10.1109/IBCAST.2012.6177590
T. Nawaz, S. Baig
Wavelet transform based modulation techniques have been recently proposed in literature, with the motivation of offering more robustness, interference suppression, and providing greater bandwidth efficiency, compared to the Fourier transform based conventional modulation techniques. Wavelet Packet based Orthogonal Frequency Division Multiplexing (WOFDM) technique is a multicarrier modulation technique that has been compared to the conventional OFDM technique in various channel and noise conditions. This paper analyses the performance of WOFDM in a Rayleigh fading wireless communication channel, taking into consideration the Doppler shift in the presence of additive white Gaussian noise. It is shown through bit error rate performance that WOFDM system outperforms the conventional OFDM system with various Doppler shifts, and with interleaving and channel coding the system performance is further enhanced.
{"title":"Wavelet OFDM-A solution for reliable communication in a frequency selective Rayleigh fading channel","authors":"T. Nawaz, S. Baig","doi":"10.1109/IBCAST.2012.6177590","DOIUrl":"https://doi.org/10.1109/IBCAST.2012.6177590","url":null,"abstract":"Wavelet transform based modulation techniques have been recently proposed in literature, with the motivation of offering more robustness, interference suppression, and providing greater bandwidth efficiency, compared to the Fourier transform based conventional modulation techniques. Wavelet Packet based Orthogonal Frequency Division Multiplexing (WOFDM) technique is a multicarrier modulation technique that has been compared to the conventional OFDM technique in various channel and noise conditions. This paper analyses the performance of WOFDM in a Rayleigh fading wireless communication channel, taking into consideration the Doppler shift in the presence of additive white Gaussian noise. It is shown through bit error rate performance that WOFDM system outperforms the conventional OFDM system with various Doppler shifts, and with interleaving and channel coding the system performance is further enhanced.","PeriodicalId":251584,"journal":{"name":"Proceedings of 2012 9th International Bhurban Conference on Applied Sciences & Technology (IBCAST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130675870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-04-03DOI: 10.1109/IBCAST.2012.6177531
Jianfang Xing, Huajun Gong, Jian Yue, Wenping Pan
We present an imaging algorithm for a volumetric display using double-helicoid scanning screen. Swept-volume approach is employed to display 3-D image that occupies a volume of real 3-D space. We use 3-D discrete volumetric data as image source, and subdivide the array of voxels into a number of layers by the double-helicoid rotating screen, and then we render each layer of the voxel into an image frame respectively. Finally, the series of frames are projected on to the synchronous rotating screen by a high-frame-rate projector in time sequence, so the whole spatial image can be scanned out by the screen layer by layer. The software of image rendering and display control has been designed and tested on the volumetric display system. Volume visualization in actual physical space is realized; viewers can watch the spatial images directly from omni-directions and change views directly by changing viewing position, just as observing real physical object.
{"title":"Imaging algorithm for volumetric display based on double-helicoid scanning screen","authors":"Jianfang Xing, Huajun Gong, Jian Yue, Wenping Pan","doi":"10.1109/IBCAST.2012.6177531","DOIUrl":"https://doi.org/10.1109/IBCAST.2012.6177531","url":null,"abstract":"We present an imaging algorithm for a volumetric display using double-helicoid scanning screen. Swept-volume approach is employed to display 3-D image that occupies a volume of real 3-D space. We use 3-D discrete volumetric data as image source, and subdivide the array of voxels into a number of layers by the double-helicoid rotating screen, and then we render each layer of the voxel into an image frame respectively. Finally, the series of frames are projected on to the synchronous rotating screen by a high-frame-rate projector in time sequence, so the whole spatial image can be scanned out by the screen layer by layer. The software of image rendering and display control has been designed and tested on the volumetric display system. Volume visualization in actual physical space is realized; viewers can watch the spatial images directly from omni-directions and change views directly by changing viewing position, just as observing real physical object.","PeriodicalId":251584,"journal":{"name":"Proceedings of 2012 9th International Bhurban Conference on Applied Sciences & Technology (IBCAST)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133559643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-04-03DOI: 10.1109/IBCAST.2012.6177581
M. Latif, A. U. Salfi
An optimization algorithm for reduction of coupling matrix to desired waveguide filter topology is proposed and implemented in software tool. With this optimization algorithm developed; the designer is only required to input the initial coupling matrix and desired filter topology. This algorithm automatically finds the rotation angle and rotation sequence to generate desired topology coupling matrix. This algorithm is based on minimization of the error function between the initial coupling matrix and the desired topology coupling matrix. It works in two steps; in first step; pivot angle and pivot element that can reduce the error function is searched roughly. In the second step; pivot angle minimizing the error function is searched very precisely in the vicinity of angle found in step 1. This process is repeated iteratively until error function up to the desired level is achieved. The algorithm can generate waveguide filter configurations like folded, inline, pfitzenmaier, quasi-pfitzenmaier, arrow, cascaded quartets; cascaded trisection, Cul-De-Sac and box section. Three examples are included to demonstrate the excellent performance of the algorithm presented. The response of the initial coupling matrix and desired coupling matrix were found exactly same.
{"title":"General optimization algorithm for reduction of coupling matrix of chebyshev filtering functions","authors":"M. Latif, A. U. Salfi","doi":"10.1109/IBCAST.2012.6177581","DOIUrl":"https://doi.org/10.1109/IBCAST.2012.6177581","url":null,"abstract":"An optimization algorithm for reduction of coupling matrix to desired waveguide filter topology is proposed and implemented in software tool. With this optimization algorithm developed; the designer is only required to input the initial coupling matrix and desired filter topology. This algorithm automatically finds the rotation angle and rotation sequence to generate desired topology coupling matrix. This algorithm is based on minimization of the error function between the initial coupling matrix and the desired topology coupling matrix. It works in two steps; in first step; pivot angle and pivot element that can reduce the error function is searched roughly. In the second step; pivot angle minimizing the error function is searched very precisely in the vicinity of angle found in step 1. This process is repeated iteratively until error function up to the desired level is achieved. The algorithm can generate waveguide filter configurations like folded, inline, pfitzenmaier, quasi-pfitzenmaier, arrow, cascaded quartets; cascaded trisection, Cul-De-Sac and box section. Three examples are included to demonstrate the excellent performance of the algorithm presented. The response of the initial coupling matrix and desired coupling matrix were found exactly same.","PeriodicalId":251584,"journal":{"name":"Proceedings of 2012 9th International Bhurban Conference on Applied Sciences & Technology (IBCAST)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134378960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-04-03DOI: 10.1109/IBCAST.2012.6177575
F. Ahsan, M. Yasin, F. Arneeb, U. Razzaq
Synthetic Aperture Radar (SAR) is an imaging system which can produce very high-resolution images from data collected by a relatively small antenna mounted onto a moving, airborne or spaceborne platform. SAR images are formed from the reflection of coherent signals. Therefore, a SAR system requires a high end data collection system which preserves coherent Doppler phase information in order to reconstruct image properly. In this paper a coherent data logging system is presented that acquires and stores the radar echoes as it moves along its path, preserving the signal characteristics and phase changes. Both the In-phase (I) and Quadrature (Q) signals are acquired through distinct channels. The speed of the platform is also recorded at known interval as speed information is significant for SAR signal processing.
{"title":"Design and development of coherent data logging system for offline SAR processor","authors":"F. Ahsan, M. Yasin, F. Arneeb, U. Razzaq","doi":"10.1109/IBCAST.2012.6177575","DOIUrl":"https://doi.org/10.1109/IBCAST.2012.6177575","url":null,"abstract":"Synthetic Aperture Radar (SAR) is an imaging system which can produce very high-resolution images from data collected by a relatively small antenna mounted onto a moving, airborne or spaceborne platform. SAR images are formed from the reflection of coherent signals. Therefore, a SAR system requires a high end data collection system which preserves coherent Doppler phase information in order to reconstruct image properly. In this paper a coherent data logging system is presented that acquires and stores the radar echoes as it moves along its path, preserving the signal characteristics and phase changes. Both the In-phase (I) and Quadrature (Q) signals are acquired through distinct channels. The speed of the platform is also recorded at known interval as speed information is significant for SAR signal processing.","PeriodicalId":251584,"journal":{"name":"Proceedings of 2012 9th International Bhurban Conference on Applied Sciences & Technology (IBCAST)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114934242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-04-03DOI: 10.1109/IBCAST.2012.6177550
A. Ahmed, A. Baig, S. Bilal, S. Zahir
The study of jet impingement on axisymmetric deflector plate is done using commercial CFD code. The problem of jet impingement was analyzed by developing a supersonic nozzle flow as free expansion and then capturing the effects of its jet impinging upon flat plate first and then deflector plate. The deflector plate was optimized for its design by varying distance between nozzle exit plane and deflector plate apex. The CFD solutions were time-variant but phenomenon of jet plume formation stabilizes after a time interval after which the effects were captured in form of pressure distribution on deflector plate.
{"title":"CFD analysis of supersonic jet impingement on axisymmetric deflector plate","authors":"A. Ahmed, A. Baig, S. Bilal, S. Zahir","doi":"10.1109/IBCAST.2012.6177550","DOIUrl":"https://doi.org/10.1109/IBCAST.2012.6177550","url":null,"abstract":"The study of jet impingement on axisymmetric deflector plate is done using commercial CFD code. The problem of jet impingement was analyzed by developing a supersonic nozzle flow as free expansion and then capturing the effects of its jet impinging upon flat plate first and then deflector plate. The deflector plate was optimized for its design by varying distance between nozzle exit plane and deflector plate apex. The CFD solutions were time-variant but phenomenon of jet plume formation stabilizes after a time interval after which the effects were captured in form of pressure distribution on deflector plate.","PeriodicalId":251584,"journal":{"name":"Proceedings of 2012 9th International Bhurban Conference on Applied Sciences & Technology (IBCAST)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124933606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-04-03DOI: 10.1109/IBCAST.2012.6177520
A. Zeeshan, N. Nauman, M. Khan
The ball balancing system in a 2-degree of freedom platform is of unique importance in understanding the control system applications. It is a platform to test and identify different aspects of controls, as the non-linearities increases with the degree of freedoms. So far many techniques have been applied to sense the position of the ball on a plate in real time, most common of them is touchpad and audio video camera system. This paper describes the design, development and control strategy of balancing a ball on a plate using low cost phototransistor sensors. These Phototransistors are triggered by monochromatic sharp beams of laser light. The plate area is 1sq. foot and an array of 11 sensors each 1 inch apart is used on each axis making total of 121 points on the plate. To balance the ball, two motors are used one for each axis. The ground motor is fixed, while to control the other axis second motor is fixed on top of the ground motor. Hence the system utilizes two sets of independent control mechanisms, each operating in isolation for each axis. ATMEGA16 microcontroller is used which is an Atmel AVR family controller with a flash memory of 16 kb. Since it has two independently switched PWM channels, therefore, it makes this controller ideal for the purpose. Dynamic modeling of the system yields the digital controller capable of balancing the ball in any of the desired positions out of 121 points, on the plate. Although the system becomes quite discrete but still it provides sufficient basis for implementing different control strategies and investigating different system parameters such as actuation mechanism, sensors, controller design and experimental testing, under the predefined condition of the ball diameter.
{"title":"Design, control and implementation of a ball on plate balancing system","authors":"A. Zeeshan, N. Nauman, M. Khan","doi":"10.1109/IBCAST.2012.6177520","DOIUrl":"https://doi.org/10.1109/IBCAST.2012.6177520","url":null,"abstract":"The ball balancing system in a 2-degree of freedom platform is of unique importance in understanding the control system applications. It is a platform to test and identify different aspects of controls, as the non-linearities increases with the degree of freedoms. So far many techniques have been applied to sense the position of the ball on a plate in real time, most common of them is touchpad and audio video camera system. This paper describes the design, development and control strategy of balancing a ball on a plate using low cost phototransistor sensors. These Phototransistors are triggered by monochromatic sharp beams of laser light. The plate area is 1sq. foot and an array of 11 sensors each 1 inch apart is used on each axis making total of 121 points on the plate. To balance the ball, two motors are used one for each axis. The ground motor is fixed, while to control the other axis second motor is fixed on top of the ground motor. Hence the system utilizes two sets of independent control mechanisms, each operating in isolation for each axis. ATMEGA16 microcontroller is used which is an Atmel AVR family controller with a flash memory of 16 kb. Since it has two independently switched PWM channels, therefore, it makes this controller ideal for the purpose. Dynamic modeling of the system yields the digital controller capable of balancing the ball in any of the desired positions out of 121 points, on the plate. Although the system becomes quite discrete but still it provides sufficient basis for implementing different control strategies and investigating different system parameters such as actuation mechanism, sensors, controller design and experimental testing, under the predefined condition of the ball diameter.","PeriodicalId":251584,"journal":{"name":"Proceedings of 2012 9th International Bhurban Conference on Applied Sciences & Technology (IBCAST)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126165384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-04-03DOI: 10.1109/IBCAST.2012.6177585
U. Naeem, Z. Jawaid, S. Sadruddin
In this paper two techniques employed for compensating the Doppler shift encountered in LEO satellite receivers are presented. These include the analog compensation technique involving the carrier tracking loop and the compressive receiver technique. The compressive receiver technique which involves precise detection of the rapidly time varying carrier frequency received by the satellite receiver is discussed in further detail. A compressive receiver with a center frequency of 100 kHz and a Doppler shift up to ±100 kHz is simulated on MATLAB to test the technique.
{"title":"Doppler shift compensation techniques for LEO satellite on-board receivers","authors":"U. Naeem, Z. Jawaid, S. Sadruddin","doi":"10.1109/IBCAST.2012.6177585","DOIUrl":"https://doi.org/10.1109/IBCAST.2012.6177585","url":null,"abstract":"In this paper two techniques employed for compensating the Doppler shift encountered in LEO satellite receivers are presented. These include the analog compensation technique involving the carrier tracking loop and the compressive receiver technique. The compressive receiver technique which involves precise detection of the rapidly time varying carrier frequency received by the satellite receiver is discussed in further detail. A compressive receiver with a center frequency of 100 kHz and a Doppler shift up to ±100 kHz is simulated on MATLAB to test the technique.","PeriodicalId":251584,"journal":{"name":"Proceedings of 2012 9th International Bhurban Conference on Applied Sciences & Technology (IBCAST)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126188559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-04-03DOI: 10.1109/IBCAST.2012.6177548
L. Guozhu, A. Kamran
This paper presents a study on performance analysis of a nozzle based on modeling of two-phase flow for an available solid rocket motor design. The single and two-phase multi-dimensional flow through the designed conical nozzle was calculated using an Eulerian-Lagrangian description. The flow field results are used to calculate thrust and to evaluate loses in the nozzle by comparing results with ideal one-dimensional nozzle analysis. Further comparison was made between single and two-phase flow computations. The comparison shows that the particulates have significant effects on the nozzle efficiency, hence play an important role for the SRM nozzle design.
{"title":"Performance analysis of a SRM nozzle-based on modeling of two-phase flow","authors":"L. Guozhu, A. Kamran","doi":"10.1109/IBCAST.2012.6177548","DOIUrl":"https://doi.org/10.1109/IBCAST.2012.6177548","url":null,"abstract":"This paper presents a study on performance analysis of a nozzle based on modeling of two-phase flow for an available solid rocket motor design. The single and two-phase multi-dimensional flow through the designed conical nozzle was calculated using an Eulerian-Lagrangian description. The flow field results are used to calculate thrust and to evaluate loses in the nozzle by comparing results with ideal one-dimensional nozzle analysis. Further comparison was made between single and two-phase flow computations. The comparison shows that the particulates have significant effects on the nozzle efficiency, hence play an important role for the SRM nozzle design.","PeriodicalId":251584,"journal":{"name":"Proceedings of 2012 9th International Bhurban Conference on Applied Sciences & Technology (IBCAST)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125184679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}