In this work, an attempt has been made to join the AA6082-T651 and AA7075-T651 aluminium alloys by friction stir welding (FSW). The FSW is a solid-state joining process which primarily used on aluminium because the me...
In this work, an attempt has been made to join the AA6082-T651 and AA7075-T651 aluminium alloys by friction stir welding (FSW). The FSW is a solid-state joining process which primarily used on aluminium because the metal is not melted during the process so the base material can not soften. For the welding were using cylindrical pin tool, marble table to avoid the harmful heat conduction, two rotation rate of 500 and1000 rpm and different traverse speeds of 15, 20, 25 and 30 mm/min to weld butt joints. The aim of present study were to experimentally explore the dissimilar bounds. For evaluations, hardness testing were using to create hardness profiles across the joint in through thickness direction and optical microscope to classify the microstructures and crystallographic textures of base materials (BM). Based on the results obtained it can be stated that the FSW suitable for AA7075 and AA6082 welding by further optimization of the process parameters.
Due to of the bandwidth constraint, sensors may only be able to transmit a finite number of bits to save the energy, and the measurement data may have to be quantized before transmission especially in wireless sensor ...
详细信息
ISBN:
(纸本)9781538629024
Due to of the bandwidth constraint, sensors may only be able to transmit a finite number of bits to save the energy, and the measurement data may have to be quantized before transmission especially in wireless sensor networks (WSNs). This paper studies the problem of the general quantized innovation filtering with random packet dropouts for linear stochastic uncertain systems. The multiplicative uncertainty of system parameters is first converted into additive noises. Then under the Gaussian assumption on the predicted density, the Lloyd-Max quantizer, a general quantized innovation filter with random packet dropouts in the linear minimum mean square error (LMMSE) sense is derived based on the projection theory and Bayes Rule. Furthermore a sufficient condition is provided, under which a general quantized innovation filter with random packet dropouts can be reduced into a standard Kalman filter. An example is simulated to illustrate the effectiveness and correctness of the designed filter.
This computational study analyses the pulsatile flow of blood in a narrow artery with mild asymmetric stenosis, treating the blood flow as two-layered model with the suspension of all the erythrocytes in the core laye...
详细信息
This computational study analyses the pulsatile flow of blood in a narrow artery with mild asymmetric stenosis, treating the blood flow as two-layered model with the suspension of all the erythrocytes in the core layer region as Casson fluid and the cell dep.eted plasma in the peripheral layer region as Newtonian fluid. Finite difference method is employed to solve the resulting system of non-linear partial differential equations along with a set of initial and boundary conditions. Explicit finite difference scheme is derived for velocity profile, flow rate, wall shear stress and longitudinal impedance to flow. It is noted that skin friction and longitudinal impedance to flow increase with the increase of yield stress, Hartmann number and stenosis dep.h. The aforementioned fluid behaviour is reversed to the velocity profile and flow rate when these parameters increase. It is found that the longitudinal impedance to flow for the two-fluid Casson model is considerably lower than that of the single-fluid Casson model.
Autonomous photovoltaic systems have already been proved as one of the most reliable ways to handle the electrification requirements of remote consumers in isolated areas. The technology improvement in the field of bu...
详细信息
Autonomous photovoltaic systems have already been proved as one of the most reliable ways to handle the electrification requirements of remote consumers in isolated areas. The technology improvement in the field of building integrated photovoltaic systems, along with the governmental financial incentives for boosting the corresponding energy sector, have increased the interest of installing small scale photovoltaic systems not only in remote dwellings but also in grid-connected households. The penetration of photovoltaic systems in densely populated areas has made people even more familiar with them and therefore people with environmental consciousness are more likely to adopt the specific technology. In this context, the present work aims in highlighting the capabilities of building integrated photovoltaic systems along with battery storage devices in covering the electrical needs of a typical dwelling using real electricity demand and meteorological data based on Typical Meteorological Year time series. The system is simulated on an hourly basis by using an integrated numerical code that has been developed by the Soft Energy Applications & Environmental Protection Laboratory of the Mechanical Engineering dep.. of Piraeus University of Applied Sciences in Greece. The proposed solution guarantees zero load rejections under different solar potential schemes investigating also the possibilities of minimizing the storage system capacity.
Selecting the most suitable local invariant feature detector for a particular application has rendered the task of evaluating feature detectors a critical issue in vision research. Although the literature offers a var...
详细信息
Quantum computers offer an intriguing path for a paradigmatic change of computing in the natural sciences and beyond, with the potential for achieving a so-called quantum advantage, namely a significant (in some cases...
详细信息
Self-localization is the process of estimating the robot position exploiting noisy measurements. Since localization is a key issue for soccer playing robots, some probabilistic approaches have been developed over last...
详细信息
Different methods to generate cartoonized painterly effect on grayscale and colored images are discussed in this paper. The Concept of vector quantization is used to get the painterly effect on images. Algorithms LBG,...
详细信息
ISBN:
(纸本)9781509032921
Different methods to generate cartoonized painterly effect on grayscale and colored images are discussed in this paper. The Concept of vector quantization is used to get the painterly effect on images. Algorithms LBG, KPE and KMCG are used to generate cartoonized painterly results. The results of applying each algorithm on images is compared based on time taken and effect generated. The results obtained by discussed methods can be incorporated in many application which are used for movie to comic conversions and digital art software.
Privacy, trust and confidentiality are the main issues of sensor layer in Internet of Things (IOT). In sensor layer, the sensing information must be transmitted from sensor node to gather node by multiple hopping. Eve...
详细信息
ISBN:
(纸本)9781509024629
Privacy, trust and confidentiality are the main issues of sensor layer in Internet of Things (IOT). In sensor layer, the sensing information must be transmitted from sensor node to gather node by multiple hopping. Every sensor node will be the sender and the relay node to forward the sensing information sent by other nodes. In this paper, BS embeds S+1 secret into the keys that are derived from the real identity of sensor node, to be as the private secret keys for every sensor node. One of the secret is the common secret that is owned by all sensor nodes, the rest S secretes are the random secret used for making mutual trust. Based on the secret index set and private secret keys, we propose a mutual trust method to explore the trust types and the pairing value among the sensor nodes without any negotiating process. To deny the right of malicious nodes to make trust with other nodes, we involve a group key to hash the secret index set to do making trust and pairing value mutually. Based on the trust types and the pairing values, the sensor nodes can set a secure path to deliver the sensing information to base station.
Biometrie Authentication is the main stream to attract attention of researcher to develop algorithm for data and security concern. The palm vein biometric is emerging as the most promising physiological characteristic...
详细信息
ISBN:
(纸本)9781509042654;9781509042647
Biometrie Authentication is the main stream to attract attention of researcher to develop algorithm for data and security concern. The palm vein biometric is emerging as the most promising physiological characteristic to develop efficient recognition system. This paper discuss about the new dimension to generate biometric trait key rather a template free key generation extracted by means of rigorous pattern recognition and information security tactics. The generation of key is exercised through mapping of certain digital image processing operation, distance metric computation and information security policies. The model of recognition system proposed that includes phases such as feature extraction and detection followed by the development of recognition technique based on unique and distinct detected palm vein feature characteristics. The proposed work gives novel and robust algorithm for the recognition of the subject. The experimental work gives result with 99.47% high rate of accuracy for the recognition of the subject.
暂无评论