Mohd Ashraf Ahmad, R. Ismail, M. S. Ramli, M. Zawawi
Conventional model-based control strategies are very complex and difficult to synthesize due to high complexity of the dynamics of robots manipulator considering joint elasticity. This paper presents investigations into the development of composite control schemes for trajectory tracking and vibration control of a flexible joint manipulator respectively. To study the effectiveness of the controllers, initially a collocated PD Controller is developed for tip angular position control of a flexible joint manipulator. This is then extended to incorporate a non-collocated Fuzzy Logic Controller and filtering technique for vibration reduction of the flexible joint system. The Butterworth low-pass filter is designed based on the properties of the system. Simulation results of the response of the flexible joint manipulator with the controllers are presented in time and frequency domains. The performances of the composite control schemes are examined in terms of input tracking capability, level of vibration reduction and time response specifications. Finally, a comparative assessment of the control techniques is presented and discussed.
{"title":"Elastic Joint Control Using Non-Collocated Fuzzy and Filtering Scheme: A Comparative Assessment","authors":"Mohd Ashraf Ahmad, R. Ismail, M. S. Ramli, M. Zawawi","doi":"10.1109/AMS.2010.80","DOIUrl":"https://doi.org/10.1109/AMS.2010.80","url":null,"abstract":"Conventional model-based control strategies are very complex and difficult to synthesize due to high complexity of the dynamics of robots manipulator considering joint elasticity. This paper presents investigations into the development of composite control schemes for trajectory tracking and vibration control of a flexible joint manipulator respectively. To study the effectiveness of the controllers, initially a collocated PD Controller is developed for tip angular position control of a flexible joint manipulator. This is then extended to incorporate a non-collocated Fuzzy Logic Controller and filtering technique for vibration reduction of the flexible joint system. The Butterworth low-pass filter is designed based on the properties of the system. Simulation results of the response of the flexible joint manipulator with the controllers are presented in time and frequency domains. The performances of the composite control schemes are examined in terms of input tracking capability, level of vibration reduction and time response specifications. Finally, a comparative assessment of the control techniques is presented and discussed.","PeriodicalId":437153,"journal":{"name":"2010 Fourth Asia International Conference on Mathematical/Analytical Modelling and Computer Simulation","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128905229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
I. Saad, M. Riyadi, M. Taghi, Zul Atfyi F.M.N., V. Arora
The analytical analysis of ballistic drift velocity for low-dimensional nanodevices was presented. The ballistic transport is predicted in the presence of high electric field for non-degenerate and degenerate regime. The saturation velocity is found to be ballistic regardless of the device dimensions. The intrinsic velocity limits this saturation velocity. It’s does not sensitively depend on the ballistic or scattering-limited nature of the mobility. In the degenerate realm, the saturation velocity is shown to be the Fermi velocity that is independent of temperature but strongly dependent on carrier concentration. In the non-degenerate realm, the intrinsic velocity is the thermal velocity that depends only on the ambient temperature.
{"title":"Analytical Analysis of Ballistic Drift Velocity in Low-dimensional Nano-devices","authors":"I. Saad, M. Riyadi, M. Taghi, Zul Atfyi F.M.N., V. Arora","doi":"10.1109/AMS.2010.121","DOIUrl":"https://doi.org/10.1109/AMS.2010.121","url":null,"abstract":"The analytical analysis of ballistic drift velocity for low-dimensional nanodevices was presented. The ballistic transport is predicted in the presence of high electric field for non-degenerate and degenerate regime. The saturation velocity is found to be ballistic regardless of the device dimensions. The intrinsic velocity limits this saturation velocity. It’s does not sensitively depend on the ballistic or scattering-limited nature of the mobility. In the degenerate realm, the saturation velocity is shown to be the Fermi velocity that is independent of temperature but strongly dependent on carrier concentration. In the non-degenerate realm, the intrinsic velocity is the thermal velocity that depends only on the ambient temperature.","PeriodicalId":437153,"journal":{"name":"2010 Fourth Asia International Conference on Mathematical/Analytical Modelling and Computer Simulation","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114352491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Alaee, R. Amiri, Mohsen Firoozmand, M. Sepahvand
In order to detect targets upon sea surface or near it, marine radars should be capable of distinguishing target reflections from the sea clutter. Our proposed method in this paper relates to detection of dissimilar marine targets in an inhomogeneous environment with clutter and non-stationary noises, and is based on adaptive thresholding determination methods. Variation and mean vales of the noise have been estimated in this paper, based on non-stationary, statistical methods and thresholding has been carried out using the suggested two-pole recursive filter. Fixating the rate of false alarm, the concerned threshold resolves the assumption problem of existence or absence of the signal. Performance of the mentioned algorithm has been compared with method known as CA-CFAR in terms of decreasing the losses and increasing calculation speed. The algorithm provided for detection of signal has been implemented at the end of signal-processing algorithms of sea marine radars. The results obtained from the algorithm performance in a real environment indicate appropriate workability of this method in heterogeneous environment and non-stationary interference.
{"title":"Modeling and Simulation of Adaptive Thresholding in Marine RADARs","authors":"M. Alaee, R. Amiri, Mohsen Firoozmand, M. Sepahvand","doi":"10.1109/AMS.2010.62","DOIUrl":"https://doi.org/10.1109/AMS.2010.62","url":null,"abstract":"In order to detect targets upon sea surface or near it, marine radars should be capable of distinguishing target reflections from the sea clutter. Our proposed method in this paper relates to detection of dissimilar marine targets in an inhomogeneous environment with clutter and non-stationary noises, and is based on adaptive thresholding determination methods. Variation and mean vales of the noise have been estimated in this paper, based on non-stationary, statistical methods and thresholding has been carried out using the suggested two-pole recursive filter. Fixating the rate of false alarm, the concerned threshold resolves the assumption problem of existence or absence of the signal. Performance of the mentioned algorithm has been compared with method known as CA-CFAR in terms of decreasing the losses and increasing calculation speed. The algorithm provided for detection of signal has been implemented at the end of signal-processing algorithms of sea marine radars. The results obtained from the algorithm performance in a real environment indicate appropriate workability of this method in heterogeneous environment and non-stationary interference.","PeriodicalId":437153,"journal":{"name":"2010 Fourth Asia International Conference on Mathematical/Analytical Modelling and Computer Simulation","volume":"2019 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114907665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
As an activity to ensure quality and conformance, testing is one of the most important activities in any software or hardware product development cycle. Often, the challenge in testing is that the system may support a wide range of configurations. Ideally, it is desirable to test all of these configurations exhaustively. However, exhaustive testing is practically impossible due to time and resource limitations. To address this issue, there is a need for a sampling strategy that can select a subset of inputs as test data from an inherently large search space. Recent findings demonstrate that t-way interaction testing strategies based on artificial intelligence (i.e. where t indicates interaction strength) have been successful to obtain a near optimal solution resulting into smaller test set to be considered. Motivated by such findings, we have developed a new test generation strategy, called Particle Swarm Test Generator (PSTG). In this paper, we discuss the design of PSTG and demonstrate our preliminary test size reduction results against other competing t-way strategies including IPOG, WHITCH, Jenny, TConfig, and TVG.
{"title":"PSTG: A T-Way Strategy Adopting Particle Swarm Optimization","authors":"Bestoun S. Ahmed, K. Z. Zamli","doi":"10.1109/AMS.2010.14","DOIUrl":"https://doi.org/10.1109/AMS.2010.14","url":null,"abstract":"As an activity to ensure quality and conformance, testing is one of the most important activities in any software or hardware product development cycle. Often, the challenge in testing is that the system may support a wide range of configurations. Ideally, it is desirable to test all of these configurations exhaustively. However, exhaustive testing is practically impossible due to time and resource limitations. To address this issue, there is a need for a sampling strategy that can select a subset of inputs as test data from an inherently large search space. Recent findings demonstrate that t-way interaction testing strategies based on artificial intelligence (i.e. where t indicates interaction strength) have been successful to obtain a near optimal solution resulting into smaller test set to be considered. Motivated by such findings, we have developed a new test generation strategy, called Particle Swarm Test Generator (PSTG). In this paper, we discuss the design of PSTG and demonstrate our preliminary test size reduction results against other competing t-way strategies including IPOG, WHITCH, Jenny, TConfig, and TVG.","PeriodicalId":437153,"journal":{"name":"2010 Fourth Asia International Conference on Mathematical/Analytical Modelling and Computer Simulation","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131824662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Although desirable as an important activity for quality assurances and enhancing reliability, complete and exhaustive software testing is prohibitively impossible due to resources as well as timing constraints. While earlier work has indicated that uniform pairwise testing (i.e. based on 2-way interaction of variables) can be effective to detect most faults in a typical software system, a counter argument suggests such conclusion cannot be generalized to all software system faults. In some system, faults may also be non-uniform and caused by more than two parameters. Considering these issues, this paper explores the issues pertaining to t-way testing from pairwise to variable strength interaction in order to highlight the state-of-the-art as well as the current state-of-practice.
{"title":"Interaction Testing: From Pairwise to Variable Strength Interaction","authors":"K. Z. Zamli, M. Younis","doi":"10.1109/AMS.2010.15","DOIUrl":"https://doi.org/10.1109/AMS.2010.15","url":null,"abstract":"Although desirable as an important activity for quality assurances and enhancing reliability, complete and exhaustive software testing is prohibitively impossible due to resources as well as timing constraints. While earlier work has indicated that uniform pairwise testing (i.e. based on 2-way interaction of variables) can be effective to detect most faults in a typical software system, a counter argument suggests such conclusion cannot be generalized to all software system faults. In some system, faults may also be non-uniform and caused by more than two parameters. Considering these issues, this paper explores the issues pertaining to t-way testing from pairwise to variable strength interaction in order to highlight the state-of-the-art as well as the current state-of-practice.","PeriodicalId":437153,"journal":{"name":"2010 Fourth Asia International Conference on Mathematical/Analytical Modelling and Computer Simulation","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133877701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abstract—E-learning involves the use of digital content in the form of text and multimedia elements that are accessed via hyperlinks and also via browser or search engines. The search engines currently available to the learners are as offered by Acrobat Reader or Google which employ basic search-by-word-matching algorithms and present outputs in linear fashion based on occurrence in the text or arranged hierarchically by popularity or frequency of being accessed. This research aims to improve the meaningfulness of the search results which other systems focused on specifying the context of the search as offered by Yahoo, and the development of the semantic web as in wiki. These methods improve the search results but need further refinements to be truly effective in the e-learning environment. Thus, this study proposes the use of the exceptional representation of learning strategies based on domain ontology and multi-agent systems (MAS).
{"title":"The Design and Development of Exceptional Representation Based on Domain Ontology and Multi-agent Systems for E-Learning Purposes","authors":"Al-Samarraie Hosam, M. Abbas, Irfan Naufal","doi":"10.1109/AMS.2010.105","DOIUrl":"https://doi.org/10.1109/AMS.2010.105","url":null,"abstract":"Abstract—E-learning involves the use of digital content in the form of text and multimedia elements that are accessed via hyperlinks and also via browser or search engines. The search engines currently available to the learners are as offered by Acrobat Reader or Google which employ basic search-by-word-matching algorithms and present outputs in linear fashion based on occurrence in the text or arranged hierarchically by popularity or frequency of being accessed. This research aims to improve the meaningfulness of the search results which other systems focused on specifying the context of the search as offered by Yahoo, and the development of the semantic web as in wiki. These methods improve the search results but need further refinements to be truly effective in the e-learning environment. Thus, this study proposes the use of the exceptional representation of learning strategies based on domain ontology and multi-agent systems (MAS).","PeriodicalId":437153,"journal":{"name":"2010 Fourth Asia International Conference on Mathematical/Analytical Modelling and Computer Simulation","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133670539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mohammad Adnan Baloch, N. Saad, I. Ismail, T. Baloch, N. H. H. M. Hanif
This paper describes the design and analysis of a closed loop Fuzzy Logic Controller for temperature control system of a gas pilot plant. The overall model is built in MATLAB/Simulink- technical computing software that has adjustable structures where variables for the model and control strategies can be modified. Simulations have been performed for both controllers to observe the response. Results of the PI-Fuzzy Controller are compared with the response of the conventional PID controller. The PID controller response using Ziegler Nichols open loop, Ziegler Nichols closed loop and Cohen Coon method are presented and evaluated against the response of 3, 5, 7 and 9 membership functions of the PI-fuzzy Controller.
{"title":"Design and Analysis of Pi-Fuzzy Controller for Temperature Control System","authors":"Mohammad Adnan Baloch, N. Saad, I. Ismail, T. Baloch, N. H. H. M. Hanif","doi":"10.1109/AMS.2010.82","DOIUrl":"https://doi.org/10.1109/AMS.2010.82","url":null,"abstract":"This paper describes the design and analysis of a closed loop Fuzzy Logic Controller for temperature control system of a gas pilot plant. The overall model is built in MATLAB/Simulink- technical computing software that has adjustable structures where variables for the model and control strategies can be modified. Simulations have been performed for both controllers to observe the response. Results of the PI-Fuzzy Controller are compared with the response of the conventional PID controller. The PID controller response using Ziegler Nichols open loop, Ziegler Nichols closed loop and Cohen Coon method are presented and evaluated against the response of 3, 5, 7 and 9 membership functions of the PI-fuzzy Controller.","PeriodicalId":437153,"journal":{"name":"2010 Fourth Asia International Conference on Mathematical/Analytical Modelling and Computer Simulation","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123856909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, potential of implementing the iris recognition system for accessing office is discussed that involved namely applying image processing techniques on the image of the eye for data acquisition, feature extraction for recognition via iris followed by artificial neural network (ANN) as classifier for identification. Only authorized people can pass through the door. The technique we employed for determining a very clear iris image that is required for extracting data from the acquisition of eye image in standard lighting and focusing is discussed. Initial findings proven that the proposed system can be utilized to enhance system security service and reduces the need for security staff.
{"title":"Access Office by Iris Recognition","authors":"Musab A. M. Ali, N. Tahir","doi":"10.1109/AMS.2010.72","DOIUrl":"https://doi.org/10.1109/AMS.2010.72","url":null,"abstract":"In this paper, potential of implementing the iris recognition system for accessing office is discussed that involved namely applying image processing techniques on the image of the eye for data acquisition, feature extraction for recognition via iris followed by artificial neural network (ANN) as classifier for identification. Only authorized people can pass through the door. The technique we employed for determining a very clear iris image that is required for extracting data from the acquisition of eye image in standard lighting and focusing is discussed. Initial findings proven that the proposed system can be utilized to enhance system security service and reduces the need for security staff.","PeriodicalId":437153,"journal":{"name":"2010 Fourth Asia International Conference on Mathematical/Analytical Modelling and Computer Simulation","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125923069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Boddu, V. K. Anne, Rajesekhara Rao Kurra, D. Mishra
The World Wide Web is nearing omnipresence. The explosively growing number of Web contents including Digitalized manuals, emails pictures, multimedia, and Web services require a distinct and elaborate structural framework that can provide a navigational surrogate for clients as well as for servers. Due to the increasing amount of data Available online, the World Wide Web has becoming one of the most valuable resources for information retrievals and knowledge discoveries. Web mining technologies are the right solutions for knowledge discovery on the Web. The knowledge extracted from the Web can be used to raise the performances for Web information retrievals, question answering, and Web based data warehousing. In this paper, we provide an introduction of Web mining as well as a review of the Web mining categories. Then we focus on one of these categories: the Web structure mining. Within this category, we introduce link mining and review two popular methods applied in Web structure mining: HITS and Page Rank
{"title":"Knowledge Discovery and Retrieval on World Wide Web Using Web Structure Mining","authors":"S. Boddu, V. K. Anne, Rajesekhara Rao Kurra, D. Mishra","doi":"10.1109/AMS.2010.108","DOIUrl":"https://doi.org/10.1109/AMS.2010.108","url":null,"abstract":"The World Wide Web is nearing omnipresence. The explosively growing number of Web contents including Digitalized manuals, emails pictures, multimedia, and Web services require a distinct and elaborate structural framework that can provide a navigational surrogate for clients as well as for servers. Due to the increasing amount of data Available online, the World Wide Web has becoming one of the most valuable resources for information retrievals and knowledge discoveries. Web mining technologies are the right solutions for knowledge discovery on the Web. The knowledge extracted from the Web can be used to raise the performances for Web information retrievals, question answering, and Web based data warehousing. In this paper, we provide an introduction of Web mining as well as a review of the Web mining categories. Then we focus on one of these categories: the Web structure mining. Within this category, we introduce link mining and review two popular methods applied in Web structure mining: HITS and Page Rank","PeriodicalId":437153,"journal":{"name":"2010 Fourth Asia International Conference on Mathematical/Analytical Modelling and Computer Simulation","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121103606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper presents dual band 4 ×4 Butler Matrix beam forming network integrated with antenna array operating at WLAN systems, 2.45GHz and 5.8GHz bands. Array antenna connected to a beam forming network can produce the desired multilobe radiation pattern. A signal fed in one port of Butler Matrix is divided into equal parts thus generate certain phase and equal amplitude which determine the beam direction. As a result, four orthogonal beams at -45°, -15°, 15° and 45° with high gain are produced. With the need for multi-functional and small-sized mobile telecommunication terminal devices, dual band terminals are widely spread, which are characterized by the simultaneous service of two or more frequencies in one device. In response to such demand, enhancement method of dual band beam forming network has been developed.
{"title":"Dual Band Beamforming Network Integrated with Array Antenna","authors":"N. M. Jizat, S. Rahim, T. Rahman","doi":"10.1109/AMS.2010.113","DOIUrl":"https://doi.org/10.1109/AMS.2010.113","url":null,"abstract":"This paper presents dual band 4 ×4 Butler Matrix beam forming network integrated with antenna array operating at WLAN systems, 2.45GHz and 5.8GHz bands. Array antenna connected to a beam forming network can produce the desired multilobe radiation pattern. A signal fed in one port of Butler Matrix is divided into equal parts thus generate certain phase and equal amplitude which determine the beam direction. As a result, four orthogonal beams at -45°, -15°, 15° and 45° with high gain are produced. With the need for multi-functional and small-sized mobile telecommunication terminal devices, dual band terminals are widely spread, which are characterized by the simultaneous service of two or more frequencies in one device. In response to such demand, enhancement method of dual band beam forming network has been developed.","PeriodicalId":437153,"journal":{"name":"2010 Fourth Asia International Conference on Mathematical/Analytical Modelling and Computer Simulation","volume":"22 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124551952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}