Applied Mechanics and Materials
Vols. 152-154
Vols. 152-154
Applied Mechanics and Materials
Vol. 151
Vol. 151
Applied Mechanics and Materials
Vol. 150
Vol. 150
Applied Mechanics and Materials
Vols. 148-149
Vols. 148-149
Applied Mechanics and Materials
Vol. 147
Vol. 147
Applied Mechanics and Materials
Vol. 146
Vol. 146
Applied Mechanics and Materials
Vol. 145
Vol. 145
Applied Mechanics and Materials
Vols. 143-144
Vols. 143-144
Applied Mechanics and Materials
Vol. 142
Vol. 142
Applied Mechanics and Materials
Vol. 141
Vol. 141
Applied Mechanics and Materials
Vol. 140
Vol. 140
Applied Mechanics and Materials
Vols. 138-139
Vols. 138-139
Applied Mechanics and Materials
Vol. 137
Vol. 137
Applied Mechanics and Materials Vol. 145
Paper Title Page
Abstract: In this paper, the application of fuzzy mathematics theory to the loader cab man-machine interface analysis and evaluation, preliminary built the interface multi level comprehensive evaluation model, using alternative score set membership function, through the evaluation model of certain type of loader cab man-machine interface for comprehensive evaluation, conducive to the realization of the loader driving human-machine interface optimal design target.
510
Abstract: For Rich Internet applications needs to transfer a large amount of data which cause slow response, the paper studies a data transmission model based on context-aware. By sensing the users' browsing history and current behavior, the system can automatically predict the data needs for the next step, and make full use of the network idle time during the process of users' interaction to transfer data, so as to improve system responsiveness. The experimental results show that the data transmission model can greatly reduces users' waiting time, especially in more complex scenarios, the effect is more significant.
515
Abstract: Optical tapered fiber is one of the most high efficiency evanescent wave coupler for coupling light into and out the optical microcavity. We fabricated the tapered fiber with etching method in a designed groove with HF solution. This method was low cost, readily, and controllable. An etching groove had an oval in the middle and small V-shape towards both sides. HF solution was injected into the oval groove, while the deioned water was injected into the two V-grooves. Because of the solution diffusion, the etching rate was fast in the mid and decreased gradually towards both sides,the tapered fiber was fabricated. The optical power meter was monitoring the fiber transmission during the etching process. The transmission of the tapered fiber was 98%. We proposed a mathematics model to depict the etching process, containing the relationship between the diameter of tapered fiber and the concentration of the HF solution, the etching time, humidity, temperature. We supervised the optical intensity to deduce the tapered fiber diameter. Surface morphology with AFM was detected, the roughness of the tapered fiber surface is less than 1nm. As an evanescent coupler, we used the tapered fiber to transmit 980nm pump laser to couple to Er3+ doped microsphere to stimulate 1557nm laser.
520
Abstract: While image recognition, image detection and tracking technology have been developing for several years the application of the game-based interaction just began to emerge recently. Since the Nintendo WII game console appearred on the market, the somatosensory remote method has greatly changed the way of interaction between people and game. Then, with the boom of somatosensory, other single-user game consoles also introduced new somatosensory-supportable kits for their own system but the mode of operatiom does not change much. Most of them follow the WII’s operating mode, they still have to use the hand-held joystick or pressure-sensitive foot pedal to play the game. When Microsoft’s Kinect released, it completely free users from these somatosensory devices, these game controllers no longer need to be bound with users’ hands and feet, the game operation has entered a new era. However, now Kinect can only be used in Microsoft’s XBOX and XBOX 360 game console. Microsoft has not released its official PC-connectable Kinect driver and operating kits yet, but nowadays, online informatiion accepts no limits, third-party has provided varieties of PC-linking drivers and their operating API, making applications of Kinect no longer confined to XBOX and XBOX360 game console, etc., they can even be combined with Flash ActionScript 3.0. Therefore, one can easily create interactive modes of games by using image recognitipn techniques, and Kinect can also solve the image detect defcts of using WebCam. This study will produce an experiment of “an interactive small aircraft” by using Kinect with Flash to learn more about the advantages of Kinect in using Flash as well as its possible shortcomings, as the reference for the future development of interactive design using Kinect.
525
Abstract: After the World War II, cities expanded rapidly. Some social problems such as traffic jam, air pollution, land waste, inner town’s decline and so on are brought about by the suburb development mode which is represented by low-density single-storey houses and car’s traffic. On the background, New Urbanism which stands for the community living theory that corresponds to suburbanization, rose from the end of 1980s in the U.S., expanded rapidly and formed the design trend of thought which influenced the world. It proposed to renew the tradition of townlets and towns planning before the World War II, modeling communities of compact type possessing towns living atmosphere which substituted suburb’s spread mode. Theory and practice of New Urbanism which receives much attention from the masses, news media and public voice complies with the modern mode which puts emphasis on traditional culture and seeking sustainable development, gets business success and becomes the significant genre in the field of city design and planning in recent years.
530
Abstract: The main functions of the Power Control and Distribution Unit (PCDU) in FORMOSAT-5 satellite are to condition energy from the solar arrays and distribute power for all subsystems on the satellite. The Power Relay (PR) module, one of the major modules in the PCDU is to manage the switchover of redundant DC-DC converter sections, secondary power distribution and power protections. The PR module controls power protections which are under voltage (UV) protection and Undervoltage-Lockout (UVLO) detection. UVLO detection monitors primary power voltage with majority voting in PR FPGA. UV detector switches nominal DC-DC converter to redundant DC-DC section, when under voltage happens. Power protection circuits all can be realized by Inverting Bistable Multivibrator. This paper describes protection methods for power and the reliable circuit design implementation.
536
Abstract: The hybrid recurrent neural network (HRNN) control for a permanent magnet synchronous motor (PMSM) drive electric scooter using rotor flux estimator was implemented in this paper. Firstly the dynamic models of a PMSM drive system were implemented. Then, a HRNN control control system using rotor flux estimator is developed to control PMSM drive system in order to drive electric scooter. The rotor flux estimator consists of the estimation algorithm of rotor flux position and speed based on the back electromagnetic force (EMF). Moreover, the HRNN controller consists of the RNN and compensated controller with variable structure control (VSC) is applied to PMSM drive system using rotor flux estimator. Finally, the effectiveness of the proposed control schemes is demonstrated by experimental results.
542
Abstract: In this paper a comparison of two approaches for collision avoidance of an automated guided vehicle (AGV) using monocular vision is presented. The first approach is by floor sampling. The floor where the AGV operates, is usually monotone. Thus, by sampling the floor, the information can be used to search similar pixels and establish the floor plane in its vision. Therefore any other objects are considered as obstacles and should be avoided. The second approach employs the Canny edge detection method. The Canny edge detection method allows accurate detection, close to real object, and minimum false detection by image noise. Using this method, every edge detected is considered to be part of an obstacle. This approach tries to avoid the nearest obstacle to its vision. Experiments are conducted in a control environment. The monocular camera is mounted on an ERP-42 Unmanned Solution robot platform and is the sole sensor providing information for the robot about its environment.
547
Abstract: H.264/AVC is a widespread standard for high definition video (HD) for example DVD and HD videos on the internet. To prevent unauthorized modifications, video authentication can be used. In this paper, we present a cryptanalysis of a H.264/AVC video authentication scheme proposed by Saadi et al. [1] at EUSIPCO 2009. Our result will prevent situations where newer schemes are developed from the scheme thus amplifying the flaw. The designers claimed that the scheme can detect modifications on watermarked video. However, we show that an attacker can modify the watermarked video and compute a valid watermark such that the recipient will retrieve a watermark from the modified watermarked video that will match what the recipient computes during video authentication check. Thus, the recipient will think the tampered video is authentic. The first main problem of the scheme is its use of hash functions for watermark generation. Since hash functions are public functions not depending on any secret, the attacker can modify the watermarked video and feed this through the hash function to compute a new watermark. The second problem is that it is possible for the attacker to perform watermark embedding thus producing a modified watermarked video. On receiving the modified video, the recipient recomputes the watermark and compares this with the watermark extracted from the video. They will match because the embedded watermark and recomputed watermark use the same hash function based watermark generation and the same input i.e. the modified video. Our cryptanalysis strategy applies to any watermarking based video authentication scheme where the watermark and embedding are not functions of secrets. As countermeasure, the functions should be designed so that only legitimate parties can perform them. We present two improved schemes that solve this problem based on private key signing functions and message authentication functions respectively.
552
Abstract: This paper proposed a bootstrapped type high-efficient charge pump circuit based on the Dickson charge pump for high output power and pump-efficiency. By using bootstrapped technique, it can increase both of pump-efficiency and power-efficiency. The proposed bootstrapped based charge pump can avoid the threshold voltage drop and enable to generate a higher output voltage. Simulation by using HSPICE level 3 model shows that for conventional Dickson charge pump, it convert the input low DC-voltage (Vin=1.5V) up to 3.8 times of it (VOUT=5.77V), the pump efficiency was 76.93%. Our work, however, can convert the low input DC-voltage (Vin=1.5V) up near to 4.4 times of it (VOUT=6.62V), pump efficiency can reach up to 88.26%.
557