This work is concerned with application of the
Lattice Boltzmznn Method (LBM) to compute flows in microgeometries.
The choice of using LBM for microflow simulation
is a good one owing to the fact that it is based on the Boltzmann
equation which is valid for the whole range of the Knudsen
number. In this work LBM is applied to simulate the pressure
driven microchannel flows and micro lid-driven cavity flows.
First, the microchannel flow is studied in some details with
the effects of varying the Knudsen number, pressure ratio
and Tangential Momemtum Accomodation Coefficient
(TMAC). The pressure distribution and other parameters are
compared with available experimental and analytical data
with good agreement. After having thus established the
credibility of the code and the method including boundary
conditions, LBM is then used to investigate the micro liddriven
cavity flow. The computations are carried out mainly
for the slip regime and the threshold of the transition regime.
Optimal and Power Aware BIST for Delay Testing of System-On-ChipIDES Editor
Test engineering for fault tolerant VLSI systems is
encumbered with optimization requisites for hardware
overhead, test power and test time. The high level quality of
these complex high-speed VLSI circuits can be assured only
through delay testing, which involves checking for accurate
temporal behavior. In the present paper, a data-path based
built-in test pattern generator (TPG) that generates iterative
pseudo-exhaustive two-patterns (IPET) for parallel delay
testing of modules with different input cone capacities is
implemented. Further, in the present study a CMOS
implementation of low power architecture (LPA) for scan based
built-in self test (BIST) for delay testing and combinational
testing is carried out. This reduces test power dissipation in
the circuit under test (CUT). Experimental results and
comparisons with pre-existing methods prove the reduction
in hardware overhead and test-time.
Study and Development of an Energy Saving Mechanical SystemIDES Editor
A new energy-saving mechanical system with
automatically controlled air valves has been proposed by
investigator and the preliminary model setup has been tested.
The testing results indicated the proper function of this
energy-saving mechanical system. This mechanical system
model has been simulated and analyzed by the computational
aided engineering solution. The major advantages of this
mechanical system include: simple and compact in design,
higher efficiency in mechanical functioning, quiet in
manufacturing operation, less energy losses due to less
frictional forces in this free piston-cylinder setup, selfadjustable
in operational parameter to improve the system
performance, and etc.
Signature PSO: A novel inertia weight adjustment using fuzzy signature for LQ...journalBEEI
Particle swarm optimization (PSO) is an optimization algorithm that is simple and reliable to complete optimization. The balance between exploration and exploitation of PSO searching characteristics is maintained by inertia weight. Since this parameter has been introduced, there have been several different strategies to determine the inertia weight during a train of the run. This paper describes the method of adjusting the inertia weights using fuzzy signatures called signature PSO. Some parameters were used as a fuzzy signature variable to represent the particle situation in a run. The implementation to solve the tuning problem of linear quadratic regulator (LQR) control parameters is also presented in this paper. Another weight adjustment strategy is also used as a comparison in performance evaluation using an integral time absolute error (ITAE). Experimental results show that signature PSO was able to give a good approximation to the optimum control parameters of LQR in this case.
Modelling Quantum Transport in Nanostructuresiosrjce
IOSR Journal of Electronics and Communication Engineering(IOSR-JECE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of electronics and communication engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in electronics and communication engineering. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
Performance Assessment of Polyphase Sequences Using Cyclic Algorithmrahulmonikasharma
Polyphase Sequences (known as P1, P2, Px, Frank) exist for a square integer length with good auto correlation properties are helpful in the several applications. Unlike the Barker and Binary Sequences which exist for certain length and exhibits a maximum of two digit merit factor. The Integrated Sidelobe level (ISL) is often used to define excellence of the autocorrelation properties of given Polyphase sequence. In this paper, we present the application of Cyclic Algorithm named CA which minimizes the ISL (Integrated Sidelobe Level) related metric which in turn improve the Merit factor to a greater extent is main thing in applications like RADAR, SONAR and communications. To illustrate the performance of the P1, P2, Px, Frank sequences when cyclic Algorithm is applied. we presented a number of examples for integer lengths. CA(Px) sequence exhibits the good Merit Factor among all the Polyphase sequences that are considered.
Optimal and Power Aware BIST for Delay Testing of System-On-ChipIDES Editor
Test engineering for fault tolerant VLSI systems is
encumbered with optimization requisites for hardware
overhead, test power and test time. The high level quality of
these complex high-speed VLSI circuits can be assured only
through delay testing, which involves checking for accurate
temporal behavior. In the present paper, a data-path based
built-in test pattern generator (TPG) that generates iterative
pseudo-exhaustive two-patterns (IPET) for parallel delay
testing of modules with different input cone capacities is
implemented. Further, in the present study a CMOS
implementation of low power architecture (LPA) for scan based
built-in self test (BIST) for delay testing and combinational
testing is carried out. This reduces test power dissipation in
the circuit under test (CUT). Experimental results and
comparisons with pre-existing methods prove the reduction
in hardware overhead and test-time.
Study and Development of an Energy Saving Mechanical SystemIDES Editor
A new energy-saving mechanical system with
automatically controlled air valves has been proposed by
investigator and the preliminary model setup has been tested.
The testing results indicated the proper function of this
energy-saving mechanical system. This mechanical system
model has been simulated and analyzed by the computational
aided engineering solution. The major advantages of this
mechanical system include: simple and compact in design,
higher efficiency in mechanical functioning, quiet in
manufacturing operation, less energy losses due to less
frictional forces in this free piston-cylinder setup, selfadjustable
in operational parameter to improve the system
performance, and etc.
Signature PSO: A novel inertia weight adjustment using fuzzy signature for LQ...journalBEEI
Particle swarm optimization (PSO) is an optimization algorithm that is simple and reliable to complete optimization. The balance between exploration and exploitation of PSO searching characteristics is maintained by inertia weight. Since this parameter has been introduced, there have been several different strategies to determine the inertia weight during a train of the run. This paper describes the method of adjusting the inertia weights using fuzzy signatures called signature PSO. Some parameters were used as a fuzzy signature variable to represent the particle situation in a run. The implementation to solve the tuning problem of linear quadratic regulator (LQR) control parameters is also presented in this paper. Another weight adjustment strategy is also used as a comparison in performance evaluation using an integral time absolute error (ITAE). Experimental results show that signature PSO was able to give a good approximation to the optimum control parameters of LQR in this case.
Modelling Quantum Transport in Nanostructuresiosrjce
IOSR Journal of Electronics and Communication Engineering(IOSR-JECE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of electronics and communication engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in electronics and communication engineering. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
Performance Assessment of Polyphase Sequences Using Cyclic Algorithmrahulmonikasharma
Polyphase Sequences (known as P1, P2, Px, Frank) exist for a square integer length with good auto correlation properties are helpful in the several applications. Unlike the Barker and Binary Sequences which exist for certain length and exhibits a maximum of two digit merit factor. The Integrated Sidelobe level (ISL) is often used to define excellence of the autocorrelation properties of given Polyphase sequence. In this paper, we present the application of Cyclic Algorithm named CA which minimizes the ISL (Integrated Sidelobe Level) related metric which in turn improve the Merit factor to a greater extent is main thing in applications like RADAR, SONAR and communications. To illustrate the performance of the P1, P2, Px, Frank sequences when cyclic Algorithm is applied. we presented a number of examples for integer lengths. CA(Px) sequence exhibits the good Merit Factor among all the Polyphase sequences that are considered.
Simulation of Robot Manipulator Trajectory Optimization DesignIJRESJOURNAL
ABSTRACT: Most of the trajectory planning based on robot dynamics and kinematics start from the joint space, can not guarantee the robot end track corresponding relationship. To solve the above problem, the method of trajectory planning is proposed and the optimization algorithm is used to solve the optimization trajectory. Taking the SCARA robot as an example, the trajectory of the end trajectory is preset, the first trajectory is planned by combining the first order acceleration planning and the arc transition. Then, the target model is optimized for the average power and the movement time. Finally, a non-dominated sorting algorithm is introduced to optimize the trajectory to obtain the best performance trajectory. The simulation results show that the optimized trajectory has a certain amount of time-consuming increase compared with the traditional trajectory of SCARA robot, but its energy consumption is obviously reduced, and the overall optimization result is obvious.
Design of accumulator Based 3-Weight Pattern Generation using LP-LSFRIOSR Journals
Abstract: The objective of the BIST is to reduce power dissipation without affecting the fault coverage. Weighted pseudorandom built-in self - test (BIST) schemes have been utilized in order to drive down the number of vectors to achieve complete fault coverage in BIST applications. Weighted sets comprising three weights, namely 0, 1, and 0.5 have been successfully utilized so far for test pattern generation, since they result in both low testing time and low consumed power. In this approach, the single input change patterns generated by a counter and a gray code generator are Exclusive–ORed with the seed generated by the low power linear feedback shift register [LP-LFSR]. Since accumulators are commonly found in current VLSI chips, this scheme can be efficiently utilized to drive down the hardware of BIST pattern generation, as well. From the implementation results, it is verified that the testing power for the proposed method is reduced by a significant percentage. Keywords: Built-in self- test (BIST), test per clock, VLSI testing, weighted test pattern generation, low power linear feedback shift register [LP-LFSR].
A modular abstraction is presented to implement model predictive control (MPC) on a three phase two level voltage source inverter to control its output current. Traditional ways of coded implementation do not provide insights into the complex nature of MPC; hence a more intuitive, logical and flexible approach for hardware implementation is conceptualized in the form of signal flow graphs (SFGs) for estimation, prediction and optimization. Simulation results show good performance of the approach and easier code generation for real time implementation. RL load is assumed for the inverter and the importance of choosing load inductance and sampling time ratio is emphasized for better control performance.
Analysis of Reactivity Accident for Control Rods Withdrawal at the Thermal Re...ijrap
In the present work, the point kinetics equations are solved numerically using the stiffness confinement
method (SCM). The solution is applied to the kinetics equations in the presence of different types of
reactivities, and is compared with other methods. This method is, also used to analyze reactivity accidents
in thermal reactor at start-up, and full power conditions for control rods withdrawal. Thermal reactor
(HTR-M) is fuelled by uranium-235. This analysis presents the effect of negative temperature feedback, and
the positive reactivity of control rods withdrawal. Power, temperature pulse, and reactivity following the
reactivity accidents are calculated using programming language (FORTRAN), and (MATLAB) Codes. The
results are compared with previous works and satisfactory agreement is found.
A Survey on Quality Changes in Positive, Negative and Combined Switching Stra...IJAPEJOURNAL
In this paper uses positive, negative and combined switching strategies for three phase ac/ac matrix converter .the author compares these strategies. The performance comparison of these three strategies is made under balanced operation. The simulation of three phase matrix converter feeding a three phase load was accomplished by means of the matlab/simulink software. After the simulation the comparison of the waveforms THD in three switching sequence is done. It must be mentioned that the duty cycle of the whole switches in the converter is according to Venturini switching algorithm
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
The peer-reviewed International Journal of Engineering Inventions (IJEI) is started with a mission to encourage contribution to research in Science and Technology. Encourage and motivate researchers in challenging areas of Sciences and Technology.
Discrete-wavelet-transform recursive inverse algorithm using second-order est...TELKOMNIKA JOURNAL
The recursive-least-squares (RLS) algorithm was introduced as an alternative to LMS algorithm with enhanced performance. Computational complexity and instability in updating the autocolleltion matrix are some of the drawbacks of the RLS algorithm that were among the reasons for the intrduction of the second-order recursive inverse (RI) adaptive algorithm. The 2nd order RI adaptive algorithm suffered from low convergence rate in certain scenarios that required a relatively small initial step-size. In this paper, we propose a newsecond-order RI algorithm that projects the input signal to a new domain namely discrete-wavelet-transform (DWT) as pre step before performing the algorithm. This transformation overcomes the low convergence rate of the second-order RI algorithm by reducing the self-correlation of the input signal in the mentioned scenatios. Expeirments are conducted using the noise cancellation setting. The performance of the proposed algorithm is compared to those of the RI, original second-order RI and RLS algorithms in different Gaussian and impulsive noise environments. Simulations demonstrate the superiority of the proposed algorithm in terms of convergence rate comparedto those algorithms.
On selection of periodic kernels parameters in time series predictioncsandit
In the paper the analysis of the periodic kernels parameters is described. Periodic kernels can
be used for the prediction task, performed as the typical regression problem. On the basis of the
Periodic Kernel Estimator (PerKE) the prediction of real time series is performed. As periodic
kernels require the setting of their parameters it is necessary to analyse their influence on the
prediction quality. This paper describes an easy methodology of finding values of parameters of
periodic kernels. It is based on grid search. Two different error measures are taken into
consideration as the prediction qualities but lead to comparable results. The methodology was
tested on benchmark and real datasets and proved to give satisfactory results.
An Implementation Mechanisms of SVM Control Strategies Applied to Five Levels...IJPEDS-IAES
In the area of the energy control with high voltage and power, the multilevel inverters constitute a relatively recent research orientation. The current applications of this technology are in the domains of the high voltage (over hundred kV), variable speed drives, transport and distribution of a good quality of electrical energy (HVDC, FACTS system, ....). To improve the output voltage for such inverters, many different modulation strategies have been developed. Among these strategies, the SVM (Space Vector Modulation). The technique provide the nearest switching vectors sequence to the reference vector without involving trigonometric functions and provide the additional advantages of superior harmonic quality. In this paper, we analyze different mechanisms of the output voltage synthesis and the problem of even order harmonic production. With the proposed a new trajectory SVM, which can eliminate all the even order harmonics for five levels inverter. Show clearly how to deduce the trajectories from the sequences allowing to have better performances among several possible trajectories. It is dedicated to the application of two particular trajectories.
Finite Element Simulation and Experiment of Chip Formation Process during Hig...IDES Editor
As an advanced manufacturing technology which
has been developed rapidly in recent years, high speed
machining is widely applied in many industries. The chip
formation during high speed machining is a complicated
material deformation and removing process. In research area
of high speed machining, the prediction of chip morphology is
a hot and difficult topic. A finite element method based on the
software ABAOUS which involves Johnson-Cook material
model and fracture criterion was used to simulate the serrated
chip morphology and cutting force during high speed
machining of AISI 1045 hardened steel. The serrated chip
morphology and cutting force were observed and measured by
high speed machining experiment of AISI 1045 hardened steel.
The effects of rake angle on cutting force, sawtooth degree
and space between sawteeth were discussed. The investigation
indicates that the simulation results are consistent with the
experiments and this finite element simulation method
presented can be used to predict the chip morphology and
cutting force accurately during high speed machining of
hardened steel.
PV Hybrid System with DSTATCOM for Residential ApplicationsIDES Editor
Now a days PV based energy systems are playing a
vital role among all the renewable energy sourcesin our day
to day life.Proper control should be required to meet the exact
load conditions such that it should satisfy the non-linear
nature of both the solar irradiance and load. In this paper, a
battery is also incorporated along with the PV system to meet
the necessary drop due to change in weather conditions. Here,
a proper control is achieved by using DSTATCOM to
compensate the reactive power. This paper proposes an
advanced technique of PWM to generate the gating pulses
and applied to a Cascaded H-Bridge multilevel inverter to
improve the voltage quality. Here, the entire system is designed
to meet the load of Mogulthur (W.G.Dt. Andhra Pradesh).
Simulation results are presented through Matlab/Simulink
by taking different cases into consideration.
Application of CAD and SLA Method in Dental ProsthesisIDES Editor
Placement of dental implants requires precise
planning that accounts for anatomic limitations and
restorative goals. Diagnosis can be made with the assistance
of computerized tomographic scanning, but transfer of
planning to the surgical field is limited. Precise implant
placement no longer relies upon so called mental-navigation
but rather can be computer guided, based on a three
dimensional prosthetically directed plan. Recently, novel CAD/
CAM techniques such as stereolithographic rapid prototyping
have been developed to build surgical guides in an attempt to
improve precision of implant placement. The purpose of this
paper is to discuss the use of scanning equipments to transfer
clinically relevant prosthetic information which can be used
for fabrication of stereolithographic medical models and
surgical guides. The proposed method provides solid evidence
that computer-aided design and manufacturing technologies
may become a new avenue for custom-made dental implants
design, analysis, and production in the 21st century.
Reduced Ordering Based Approach to Impulsive Noise Suppression in Color ImagesIDES Editor
In this paper a novel filtering design intended for
the impulsive noise removal in color images is presented.
The described scheme utilizes the rank weighted cumulated
distances between the pixels belonging to the local filtering
window. The impulse detection scheme is based on the
difference between the aggregated weighted distances assigned
to the central pixel of the window and the minimum value,
which corresponds to the rank weighted vector median. If the
difference exceeds an adaptively determined threshold value,
then the processed pixel is replaced by the mean of the
neighboring pixels, which were found to be not corrupted,
otherwise it is retained. The important feature of the described
filtering framework is its ability to effectively suppress
impulsive noise, while preserving fine image details. The
comparison with the state-of-the-art denoising schemes
revealed that the proposed filter yields better restoration
results in terms of objective restoration quality measures.
Simulation of Robot Manipulator Trajectory Optimization DesignIJRESJOURNAL
ABSTRACT: Most of the trajectory planning based on robot dynamics and kinematics start from the joint space, can not guarantee the robot end track corresponding relationship. To solve the above problem, the method of trajectory planning is proposed and the optimization algorithm is used to solve the optimization trajectory. Taking the SCARA robot as an example, the trajectory of the end trajectory is preset, the first trajectory is planned by combining the first order acceleration planning and the arc transition. Then, the target model is optimized for the average power and the movement time. Finally, a non-dominated sorting algorithm is introduced to optimize the trajectory to obtain the best performance trajectory. The simulation results show that the optimized trajectory has a certain amount of time-consuming increase compared with the traditional trajectory of SCARA robot, but its energy consumption is obviously reduced, and the overall optimization result is obvious.
Design of accumulator Based 3-Weight Pattern Generation using LP-LSFRIOSR Journals
Abstract: The objective of the BIST is to reduce power dissipation without affecting the fault coverage. Weighted pseudorandom built-in self - test (BIST) schemes have been utilized in order to drive down the number of vectors to achieve complete fault coverage in BIST applications. Weighted sets comprising three weights, namely 0, 1, and 0.5 have been successfully utilized so far for test pattern generation, since they result in both low testing time and low consumed power. In this approach, the single input change patterns generated by a counter and a gray code generator are Exclusive–ORed with the seed generated by the low power linear feedback shift register [LP-LFSR]. Since accumulators are commonly found in current VLSI chips, this scheme can be efficiently utilized to drive down the hardware of BIST pattern generation, as well. From the implementation results, it is verified that the testing power for the proposed method is reduced by a significant percentage. Keywords: Built-in self- test (BIST), test per clock, VLSI testing, weighted test pattern generation, low power linear feedback shift register [LP-LFSR].
A modular abstraction is presented to implement model predictive control (MPC) on a three phase two level voltage source inverter to control its output current. Traditional ways of coded implementation do not provide insights into the complex nature of MPC; hence a more intuitive, logical and flexible approach for hardware implementation is conceptualized in the form of signal flow graphs (SFGs) for estimation, prediction and optimization. Simulation results show good performance of the approach and easier code generation for real time implementation. RL load is assumed for the inverter and the importance of choosing load inductance and sampling time ratio is emphasized for better control performance.
Analysis of Reactivity Accident for Control Rods Withdrawal at the Thermal Re...ijrap
In the present work, the point kinetics equations are solved numerically using the stiffness confinement
method (SCM). The solution is applied to the kinetics equations in the presence of different types of
reactivities, and is compared with other methods. This method is, also used to analyze reactivity accidents
in thermal reactor at start-up, and full power conditions for control rods withdrawal. Thermal reactor
(HTR-M) is fuelled by uranium-235. This analysis presents the effect of negative temperature feedback, and
the positive reactivity of control rods withdrawal. Power, temperature pulse, and reactivity following the
reactivity accidents are calculated using programming language (FORTRAN), and (MATLAB) Codes. The
results are compared with previous works and satisfactory agreement is found.
A Survey on Quality Changes in Positive, Negative and Combined Switching Stra...IJAPEJOURNAL
In this paper uses positive, negative and combined switching strategies for three phase ac/ac matrix converter .the author compares these strategies. The performance comparison of these three strategies is made under balanced operation. The simulation of three phase matrix converter feeding a three phase load was accomplished by means of the matlab/simulink software. After the simulation the comparison of the waveforms THD in three switching sequence is done. It must be mentioned that the duty cycle of the whole switches in the converter is according to Venturini switching algorithm
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
The peer-reviewed International Journal of Engineering Inventions (IJEI) is started with a mission to encourage contribution to research in Science and Technology. Encourage and motivate researchers in challenging areas of Sciences and Technology.
Discrete-wavelet-transform recursive inverse algorithm using second-order est...TELKOMNIKA JOURNAL
The recursive-least-squares (RLS) algorithm was introduced as an alternative to LMS algorithm with enhanced performance. Computational complexity and instability in updating the autocolleltion matrix are some of the drawbacks of the RLS algorithm that were among the reasons for the intrduction of the second-order recursive inverse (RI) adaptive algorithm. The 2nd order RI adaptive algorithm suffered from low convergence rate in certain scenarios that required a relatively small initial step-size. In this paper, we propose a newsecond-order RI algorithm that projects the input signal to a new domain namely discrete-wavelet-transform (DWT) as pre step before performing the algorithm. This transformation overcomes the low convergence rate of the second-order RI algorithm by reducing the self-correlation of the input signal in the mentioned scenatios. Expeirments are conducted using the noise cancellation setting. The performance of the proposed algorithm is compared to those of the RI, original second-order RI and RLS algorithms in different Gaussian and impulsive noise environments. Simulations demonstrate the superiority of the proposed algorithm in terms of convergence rate comparedto those algorithms.
On selection of periodic kernels parameters in time series predictioncsandit
In the paper the analysis of the periodic kernels parameters is described. Periodic kernels can
be used for the prediction task, performed as the typical regression problem. On the basis of the
Periodic Kernel Estimator (PerKE) the prediction of real time series is performed. As periodic
kernels require the setting of their parameters it is necessary to analyse their influence on the
prediction quality. This paper describes an easy methodology of finding values of parameters of
periodic kernels. It is based on grid search. Two different error measures are taken into
consideration as the prediction qualities but lead to comparable results. The methodology was
tested on benchmark and real datasets and proved to give satisfactory results.
An Implementation Mechanisms of SVM Control Strategies Applied to Five Levels...IJPEDS-IAES
In the area of the energy control with high voltage and power, the multilevel inverters constitute a relatively recent research orientation. The current applications of this technology are in the domains of the high voltage (over hundred kV), variable speed drives, transport and distribution of a good quality of electrical energy (HVDC, FACTS system, ....). To improve the output voltage for such inverters, many different modulation strategies have been developed. Among these strategies, the SVM (Space Vector Modulation). The technique provide the nearest switching vectors sequence to the reference vector without involving trigonometric functions and provide the additional advantages of superior harmonic quality. In this paper, we analyze different mechanisms of the output voltage synthesis and the problem of even order harmonic production. With the proposed a new trajectory SVM, which can eliminate all the even order harmonics for five levels inverter. Show clearly how to deduce the trajectories from the sequences allowing to have better performances among several possible trajectories. It is dedicated to the application of two particular trajectories.
Finite Element Simulation and Experiment of Chip Formation Process during Hig...IDES Editor
As an advanced manufacturing technology which
has been developed rapidly in recent years, high speed
machining is widely applied in many industries. The chip
formation during high speed machining is a complicated
material deformation and removing process. In research area
of high speed machining, the prediction of chip morphology is
a hot and difficult topic. A finite element method based on the
software ABAOUS which involves Johnson-Cook material
model and fracture criterion was used to simulate the serrated
chip morphology and cutting force during high speed
machining of AISI 1045 hardened steel. The serrated chip
morphology and cutting force were observed and measured by
high speed machining experiment of AISI 1045 hardened steel.
The effects of rake angle on cutting force, sawtooth degree
and space between sawteeth were discussed. The investigation
indicates that the simulation results are consistent with the
experiments and this finite element simulation method
presented can be used to predict the chip morphology and
cutting force accurately during high speed machining of
hardened steel.
PV Hybrid System with DSTATCOM for Residential ApplicationsIDES Editor
Now a days PV based energy systems are playing a
vital role among all the renewable energy sourcesin our day
to day life.Proper control should be required to meet the exact
load conditions such that it should satisfy the non-linear
nature of both the solar irradiance and load. In this paper, a
battery is also incorporated along with the PV system to meet
the necessary drop due to change in weather conditions. Here,
a proper control is achieved by using DSTATCOM to
compensate the reactive power. This paper proposes an
advanced technique of PWM to generate the gating pulses
and applied to a Cascaded H-Bridge multilevel inverter to
improve the voltage quality. Here, the entire system is designed
to meet the load of Mogulthur (W.G.Dt. Andhra Pradesh).
Simulation results are presented through Matlab/Simulink
by taking different cases into consideration.
Application of CAD and SLA Method in Dental ProsthesisIDES Editor
Placement of dental implants requires precise
planning that accounts for anatomic limitations and
restorative goals. Diagnosis can be made with the assistance
of computerized tomographic scanning, but transfer of
planning to the surgical field is limited. Precise implant
placement no longer relies upon so called mental-navigation
but rather can be computer guided, based on a three
dimensional prosthetically directed plan. Recently, novel CAD/
CAM techniques such as stereolithographic rapid prototyping
have been developed to build surgical guides in an attempt to
improve precision of implant placement. The purpose of this
paper is to discuss the use of scanning equipments to transfer
clinically relevant prosthetic information which can be used
for fabrication of stereolithographic medical models and
surgical guides. The proposed method provides solid evidence
that computer-aided design and manufacturing technologies
may become a new avenue for custom-made dental implants
design, analysis, and production in the 21st century.
Reduced Ordering Based Approach to Impulsive Noise Suppression in Color ImagesIDES Editor
In this paper a novel filtering design intended for
the impulsive noise removal in color images is presented.
The described scheme utilizes the rank weighted cumulated
distances between the pixels belonging to the local filtering
window. The impulse detection scheme is based on the
difference between the aggregated weighted distances assigned
to the central pixel of the window and the minimum value,
which corresponds to the rank weighted vector median. If the
difference exceeds an adaptively determined threshold value,
then the processed pixel is replaced by the mean of the
neighboring pixels, which were found to be not corrupted,
otherwise it is retained. The important feature of the described
filtering framework is its ability to effectively suppress
impulsive noise, while preserving fine image details. The
comparison with the state-of-the-art denoising schemes
revealed that the proposed filter yields better restoration
results in terms of objective restoration quality measures.
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...IDES Editor
Damping of power system oscillations with the help
of proposed optimal Proportional Integral Derivative Power
System Stabilizer (PID-PSS) and Static Var Compensator
(SVC)-based controllers are thoroughly investigated in this
paper. This study presents robust tuning of PID-PSS and
SVC-based controllers using Genetic Algorithms (GA) in
multi machine power systems by considering detailed model
of the generators (model 1.1). The effectiveness of FACTSbased
controllers in general and SVC-based controller in
particular depends upon their proper location. Modal
controllability and observability are used to locate SVC–based
controller. The performance of the proposed controllers is
compared with conventional lead-lag power system stabilizer
(CPSS) and demonstrated on 10 machines, 39 bus New England
test system. Simulation studies show that the proposed genetic
based PID-PSS with SVC based controller provides better
performance.
An Efficient Algorithm for Contact Angle Estimation in Molecular Dynamics Sim...CSCJournals
It is important to find contact angle for a liquid to understand its wetting properties, capillarity and surface interaction energy with a surface. The estimation of contact angle from Non Equilibrium Molecular Dynamics (NEMD), where we need to track the changes in contact angle over a period of time is challenging compared to the estimation from a single image from an experimental measurement. Often such molecular simulations involve finite number of molecules above some metallic or non-metallic substrates and coupled to a thermostat. The identification of profile of the droplet formed during this time will be difficult and computationally expensive to process as an image. In this paper a new algorithm is explained which can efficiently calculate time dependent contact angle from a NEMD simulation just by processing the molecular coordinates. The algorithm implements many simple yet accurate mathematical methods available, especially to remove the vapor molecules and noise data and thereby calculating the contact angle with more accuracy. To further demonstrate the capability of the algorithm a simulation study has been reported which compares the contact angle influence with different thermostats in the Molecular Dynamics (MD) simulation of water over platinum surface.
LATTICE BOLTZMANN SIMULATION OF NON-NEWTONIAN FLUID FLOW IN A LID DRIVEN CAVITY IAEME Publication
Lattice Boltzmann Method (LBM) is used to simulate the lid driven cavity flow to explore the mechanism of non-Newtonian fluid flow. The power law model is used to represent the class of non-Newtonian fluids (shear-thinning and shear-thickening fluids) by considering a range of 0.8 to 1.6. Investigation is carried out to study the influence of power law index and Reynolds number on the variation of velocity profiles and streamlines plots. Velocity profiles and the streamline patterns
for various values of power law index at Reynolds numbers ranging 100 to 3200 are presented. Half way bounce back boundary conditions are employed in the numerical method.
This is a Powerpoint for basic understanding regarding Molecular dynamics and NAMD simulation to providing basic information, schematic representation, to understanding the mechanism or process of molecular dynamics ( MD), and NAMD simulation brief discussion.
Researched improvements on increasing efficiency of organic solar cells by utilizing and modifying the Purdue University researchers NanoMOS MATLAB simulations
https://nanohub.org/resources/1305?rev=1
Applications of Lattice Boltzmann Method in Dynamic Modelling of Fluid FlowsAngshuman Pal
Computational Fluid Dynamics techniques are an important development in the study of fluid behaviour where complicated differential equations involving complex geometries and irregular flows can be solved using iterative numerical techniques. Such techniques are being used extensively in the field of fluid mechanics and heat transfer. Solving the Navier Stokes equation for viscous fluids is of particular importance in this field.
The Lattice Boltzmann Method is an alternative to the commonly used discretization principle for solving the Navier Stokes equation. It deals with the properties of fluid particles on a micro scale and subsequently uses them to generate the model of the entire flow domain on a macro scale. The flow domain is broken up into lattices inhabited by finitely many fluid particles. Governed by rules of streaming and collision, all the particles together generate the model of the entire flow.
A detailed study is performed on the LBM model and its underlying principles. A program for its execution is written in MATLAB environment. Simulations are run on a simple geometry involving steady flow through a circular pipe. The results obtained are analysed and verified against the expected results given by mathematical models and actual experimentation.
An analysis of the Lattice Boltzmann Method (LBM) has been developed as an alternating Computational Fluid Dynamic (CFD) method based on the collective behavior of microscopic particles. This numerical method contrasts
with the traditional approaches which usually consider macroscopic descriptions by using Navier-Stokes (NS) equations.The specific purpose of the present thesis is to supply a comprehensive description of the field providing a source code for practical applications under GNU copyright.
In the first part the review of the fundamental macroscopic variables is emphasized to outline the NS equations with advantages and drawbacks.
Numerical methods are investigated in the second part, evolving from Cellular Automata, the most recent Lattice Gas Cellular Automata and specially its extension, the LBM.
The last part of this thesis shows the results of the method comparing to a traditional Navier-Stokes solver. It is also pointed out the advantages adopted with LBM approach in nano-scale multiphase fluid flow under complex boundary conditions.
Power System State Estimation - A ReviewIDES Editor
The aim of this article is to provide a comprehensive
survey on power system state estimation techniques. The
algorithms used for finding the system states under both static
and dynamic state estimations are discussed in brief. The
authors are opinion that the scope of pursuing research in the
area of state estimation with PMU and SCADA measurements
is the state of the art and timely.
Artificial Intelligence Technique based Reactive Power Planning Incorporating...IDES Editor
Reactive Power Planning is a major concern in the
operation and control of power systems This paper compares
the effectiveness of Evolutionary Programming (EP) and
New Improved Differential Evolution (NIMDE) to solve
Reactive Power Planning (RPP) problem incorporating
FACTS Controllers like Static VAR Compensator (SVC),
Thyristor Controlled Series Capacitor (TCSC) and Unified
power flow controller (UPFC) considering voltage stability.
With help of Fast Voltage Stability Index (FVSI), the critical
lines and buses are identified to install the FACTS controllers.
The optimal settings of the control variables of the generator
voltages,transformer tap settings and allocation and parameter
settings of the SVC,TCSC,UPFC are considered for reactive
power planning. The test and Validation of the proposed
algorithm are conducted on IEEE 30–bus system and 72-bus
Indian system.Simulation results shows that the UPFC gives
better results than SVC and TCSC and the FACTS controllers
reduce the system losses.
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...IDES Editor
This paper presents the need to operate the power
system economically and with optimum levels of voltages has
further led to an increase in interest in Distributed
Generation. In order to reduce the power losses and to improve
the voltage in the distribution system, distributed generators
(DGs) are connected to load bus. To reduce the total power
losses in the system, the most important process is to identify
the proper location for fixing and sizing of DGs. It presents a
new methodology using a new population based meta heuristic
approach namely Artificial Bee Colony algorithm(ABC) for
the placement of Distributed Generators(DG) in the radial
distribution systems to reduce the real power losses and to
improve the voltage profile, voltage sag mitigation. The power
loss reduction is important factor for utility companies because
it is directly proportional to the company benefits in a
competitive electricity market, while reaching the better power
quality standards is too important as it has vital effect on
customer orientation. In this paper an ABC algorithm is
developed to gain these goals all together. In order to evaluate
sag mitigation capability of the proposed algorithm, voltage
in voltage sensitive buses is investigated. An existing 20KV
network has been chosen as test network and results are
compared with the proposed method in the radial distribution
system.
Line Losses in the 14-Bus Power System Network using UPFCIDES Editor
Controlling power flow in modern power systems
can be made more flexible by the use of recent developments
in power electronic and computing control technology. The
Unified Power Flow Controller (UPFC) is a Flexible AC
transmission system (FACTS) device that can control all the
three system variables namely line reactance, magnitude and
phase angle difference of voltage across the line. The UPFC
provides a promising means to control power flow in modern
power systems. Essentially the performance depends on proper
control setting achievable through a power flow analysis
program. This paper presents a reliable method to meet the
requirements by developing a Newton-Raphson based load
flow calculation through which control settings of UPFC can
be determined for the pre-specified power flow between the
lines. The proposed method keeps Newton-Raphson Load Flow
(NRLF) algorithm intact and needs (little modification in the
Jacobian matrix). A MATLAB program has been developed to
calculate the control settings of UPFC and the power flow
between the lines after the load flow is converged. Case studies
have been performed on IEEE 5-bus system and 14-bus system
to show that the proposed method is effective. These studies
indicate that the method maintains the basic NRLF properties
such as fast computational speed, high degree of accuracy and
good convergence rate.
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...IDES Editor
The size and shape of opening in dam causes the
stress concentration, it also causes the stress variation in the
rest of the dam cross section. The gravity method of the analysis
does not consider the size of opening and the elastic property
of dam material. Thus the objective of study is comprises of
the Finite Element Method which considers the size of
opening, elastic property of material, and stress distribution
because of geometric discontinuity in cross section of dam.
Stress concentration inside the dam increases with the opening
in dam which results in the failure of dam. Hence it is
necessary to analyses large opening inside the dam. By making
the percentage area of opening constant and varying size and
shape of opening the analysis is carried out. For this purpose
a section of Koyna Dam is considered. Dam is defined as a
plane strain element in FEM, based on geometry and loading
condition. Thus this available information specified our path
of approach to carry out 2D plane strain analysis. The results
obtained are then compared mutually to get most efficient
way of providing large opening in the gravity dam.
Assessing Uncertainty of Pushover Analysis to Geometric ModelingIDES Editor
Pushover Analysis a popular tool for seismic
performance evaluation of existing and new structures and is
nonlinear Static procedure where in monotonically increasing
loads are applied to the structure till the structure is unable
to resist the further load .During the analysis, whatever the
strength of concrete and steel is adopted for analysis of
structure may not be the same when real structure is
constructed and the pushover analysis results are very sensitive
to material model adopted, geometric model adopted, location
of plastic hinges and in general to procedure followed by the
analyzer. In this paper attempt has been made to assess
uncertainty in pushover analysis results by considering user
defined hinges and frame modeled as bare frame and frame
with slab modeled as rigid diaphragm and results compared
with experimental observations. Uncertain parameters
considered includes the strength of concrete, strength of steel
and cover to the reinforcement which are randomly generated
and incorporated into the analysis. The results are then
compared with experimental observations.
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...IDES Editor
This paper is an attempt to base on auctions which
presents a frame work for the secure multi-party decision
protocols. In addition to the implementations which are very
light weighted, the main focus is on synchronizing security
features for avoiding agreements manipulations and reducing
the user traffic. Through this paper one can understand that
this different auction protocols on top of the frame work can
be collaborated using mobile devices. This paper present the
negotiation between auctioneer and the proffered and this
negotiation shows that multiparty security is far better than
the existing system.
Selfish Node Isolation & Incentivation using Progressive ThresholdsIDES Editor
The problems associated with selfish nodes in
MANET are addressed by a collaborative watchdog approach
which reduces the detection time for selfish nodes thereby
improves the performance and accuracy of watchdogs[1]. In
the related works they make use of credit based systems, reputation
based mechanisms, pathrater and watchdog mechanism
to detect such selfish nodes. In this paper we follow an approach
of collaborative watchdog which reduces the detection
time for selfish nodes and also involves the removal of such
selfish nodes based on some progressively assessed thresholds.
The threshold gives the nodes a chance to stop misbehaving
before it is permanently deleted from the network.
The node passes through several isolation processes before it
is permanently removed. Another version of AODV protocol
is used here which allows the simulation of selfish nodes in
NS2 by adding or modifying log files in the protocol.
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...IDES Editor
Wireless sensor networks are networks having non
wired infrastructure and dynamic topology. In OSI model each
layer is prone to various attacks, which halts the performance
of a network .In this paper several attacks on four layers of
OSI model are discussed and security mechanism is described
to prevent attack in network layer i.e wormhole attack. In
Wormhole attack two or more malicious nodes makes a covert
channel which attracts the traffic towards itself by depicting a
low latency link and then start dropping and replaying packets
in the multi-path route. This paper proposes promiscuous mode
method to detect and isolate the malicious node during
wormhole attack by using Ad-hoc on demand distance vector
routing protocol (AODV) with omnidirectional antenna. The
methodology implemented notifies that the nodes which are
not participating in multi-path routing generates an alarm
message during delay and then detects and isolate the
malicious node from network. We also notice that not only
the same kind of attacks but also the same kind of
countermeasures can appear in multiple layer. For example,
misbehavior detection techniques can be applied to almost all
the layers we discussed.
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...IDES Editor
The recent advancements in the wireless technology
and their wide-spread deployment have made remarkable
enhancements in efficiency in the corporate and industrial
and Military sectors The increasing popularity and usage of
wireless technology is creating a need for more secure wireless
Ad hoc networks. This paper aims researched and developed
a new protocol that prevents wormhole attacks on a ad hoc
network. A few existing protocols detect wormhole attacks but
they require highly specialized equipment not found on most
wireless devices. This paper aims to develop a defense against
wormhole attacks as an Anti-worm protocol which is based on
responsive parameters, that does not require as a significant
amount of specialized equipment, trick clock synchronization,
no GPS dependencies.
Cloud Security and Data Integrity with Client Accountability FrameworkIDES Editor
The Cloud based services provide much efficient
and seamless ways for data sharing across the cloud. The fact
that the data owners no longer possess data makes it very
difficult to assure data confidentiality and to enable secure
data sharing in the cloud. Despite of all its advantages this
will remain a major limitation that acts as a barrier to the
wider deployment of cloud based services. One of the possible
ways for ensuring trust in this aspect is the introduction of
accountability feature in the cloud computing scenario. The
Cloud framework requires promotion of distributed
accountability for such dynamic environment[1]. In some
works, there‘s an accountable framework suggested to ensure
distributed accountability for data sharing by the generation
of only a log of data access, but without any embedded feedback
mechanism for owner permission towards data
protection[2].The proposed system is an enhanced client
accountability framework which provides an additional client
side verification for each access towards enhanced security of
data. The integrity of content of data which resides in the
cloud service provider is also maintained by secured
outsourcing. Besides, the authentication of JAR(Java Archive)
files are done to ensure file protection and to maintain a safer
environment for data sharing. The analysis of various
functionalities of the framework depicts both the
accountability and security feature in an efficient manner.
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetIDES Editor
A System state in HTTP botnet uses HTTP protocol
for the creation of chain of Botnets thereby compromising
other systems. By using HTTP protocol and port number 80,
attacks can not only be hidden but also pass through the
firewall without being detected. The DPR based detection
leads to better analysis of botnet attacks [3]. However, it
provides only probabilistic detection of the attacker and also
time consuming and error prone. This paper proposes a Genetic
algorithm based layered approach for detecting as well as
preventing botnet attacks. The paper reviews p2p firewall
implementation which forms the basis of filtering.
Performance evaluation is done based on precision, F-value
and probability. Layered approach reduces the computation
and overall time requirement [7]. Genetic algorithm promises
a low false positive rate.
Enhancing Data Storage Security in Cloud Computing Through SteganographyIDES Editor
in cloud computing data storage is a significant issue
because the entire data reside over a set of interconnected
resource pools that enables the data to be accessed through
virtual machines. It moves the application software’s and
databases to the large data centers where the management of
data is actually done. As the resource pools are situated over
various corners of the world, the management of data and
services may not be fully trustworthy. So, there are various
issues that need to be addressed with respect to the
management of data, service of data, privacy of data, security
of data etc. But the privacy and security of data is highly
challenging. To ensure privacy and security of data-at-rest in
cloud computing, we have proposed an effective and a novel
approach to ensure data security in cloud computing by means
of hiding data within images following is the concept of
steganography. The main objective of this paper is to prevent
data access from cloud data storage centers by unauthorized
users. This scheme perfectly stores data at cloud data storage
centers and retrieves data from it when it is needed.
The main tasks of a Wireless Sensor Network
(WSN) are data collection from its nodes and communication
of this data to the base station (BS). The protocols used for
communication among the WSN nodes and between the WSN
and the BS, must consider the resource constraints of nodes,
battery energy, computational capabilities and memory. The
WSN applications involve unattended operation of the network
over an extended period of time. In order to extend the lifetime
of a WSN, efficient routing protocols need to be adopted. The
proposed low power routing protocol based on tree-based
network structure reliably forwards the measured data towards
the BS using TDMA. An energy consumption analysis of the
WSN making use of this protocol is also carried out. It is
found that the network is energy efficient with an average
duty cycle of 0:7% for the WSN nodes. The OmNET++
simulation platform along with MiXiM framework is made
use of.
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...IDES Editor
The security of authentication of internet based
co-banking services should not be susceptible to high risks.
The passwords are highly vulnerable to virus attacks due to
the lack of high end embedding of security methods. In order
for the passwords to be more secure, people are generally
compelled to select jumbled up character based passwords
which are not only less memorable but are also equally prone
to insecurity. Multiple use of distributed shares has been
studied to solve the problem of authentication by algorithms
based on thresholding of pixels in image processing and visual
cryptography concepts where the subset of shares is considered
for the recovery of the original image for authentication using
correlation function[1][2].The main disadvantage in the above
study is the plain storage of shares and also one of the shares
is being supplied to the customer, which will lead to the
possibility of misuse by a third party. This paper proposes a
technique for scrambling of pixels by key based random
permutation (KBRP) within the shares before the
authentication has been attempted. Total number of shares to
be created is dependent on the multiplicity of ownership of
the account. By this method the problem of uncertainty among
the customers with regard to security, storage, retrieval of
holding of half of the shares is minimized.
This paper presents a trifocal Rotman Lens Design
approach. The effects of focal ratio and element spacing on
the performance of Rotman Lens are described. A three beam
prototype feeding 4 element antenna array working in L-band
has been simulated using RLD v1.7 software. Simulated
results show that the simulated lens has a return loss of –
12.4dB at 1.8GHz. Beam to array port phase error variation
with change in the focal ratio and element spacing has also
been investigated.
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesIDES Editor
Hyperspectral images can be efficiently compressed
through a linear predictive model, as for example the one
used in the SLSQ algorithm. In this paper we exploit this
predictive model on the AVIRIS images by individuating,
through an off-line approach, a common subset of bands, which
are not spectrally related with any other bands. These bands
are not useful as prediction reference for the SLSQ 3-D
predictive model and we need to encode them via other
prediction strategies which consider only spatial correlation.
We have obtained this subset by clustering the AVIRIS bands
via the clustering by compression approach. The main result
of this paper is the list of the bands, not related with the
others, for AVIRIS images. The clustering trees obtained for
AVIRIS and the relationship among bands they depict is also
an interesting starting point for future research.
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...IDES Editor
A microelectronic circuit of block-elements
functionally analogous to two hydrogen bonding networks is
investigated. The hydrogen bonding networks are extracted
from â-lactamase protein and are formed in its active site.
Each hydrogen bond of the network is described in equivalent
electrical circuit by three or four-terminal block-element.
Each block-element is coded in Matlab. Static and dynamic
analyses are performed. The resultant microelectronic circuit
analogous to the hydrogen bonding network operates as
current mirror, sine pulse source, triangular pulse source as
well as signal modulator.
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...IDES Editor
In this paper a method is proposed to discriminate
real world scenes in to natural and manmade scenes of similar
depth. Global-roughness of a scene image varies as a function
of image-depth. Increase in image depth leads to increase in
roughness in manmade scenes; on the contrary natural scenes
exhibit smooth behavior at higher image depth. This particular
arrangement of pixels in scene structure can be well explained
by local texture information in a pixel and its neighborhood.
Our proposed method analyses local texture information of a
scene image using texture unit matrix. For final classification
we have used both supervised and unsupervised learning using
K-Nearest Neighbor classifier (KNN) and Self Organizing
Map (SOM) respectively. This technique is useful for online
classification due to very less computational complexity.
Mental Stress Evaluation using an Adaptive ModelIDES Editor
Chronic stress can have serious physiological and
psychological impact on an individual’s health. Wearable
sensor systems can enable physicians to monitor physiological
variables and observe the impact of stress over long periods of
time. To correlate an individual’s physiological measures with
their perception of psychological stress, it is essential that
the stress monitoring system accounts for individual
differences in self-reporting. Self-reporting of stress is highly
subjective as it is dependent on an individual’s perception of
stress and thus prone to errors. In addition, subjects can tailor
their answers to present their behavior more favorably. In
this paper we present an adaptive model which allows recorded
stress scores and physiological variables to be tuned to remove
biases in self-reported scores. The model takes an individual’s
physiological and psychological responses into account and
adapts to the user’s variations. Using our adaptive model,
physiological data is mapped efficiently to perceived stress
levels with 90% accuracy.
We all have good and bad thoughts from time to time and situation to situation. We are bombarded daily with spiraling thoughts(both negative and positive) creating all-consuming feel , making us difficult to manage with associated suffering. Good thoughts are like our Mob Signal (Positive thought) amidst noise(negative thought) in the atmosphere. Negative thoughts like noise outweigh positive thoughts. These thoughts often create unwanted confusion, trouble, stress and frustration in our mind as well as chaos in our physical world. Negative thoughts are also known as “distorted thinking”.
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
This is a presentation by Dada Robert in a Your Skill Boost masterclass organised by the Excellence Foundation for South Sudan (EFSS) on Saturday, the 25th and Sunday, the 26th of May 2024.
He discussed the concept of quality improvement, emphasizing its applicability to various aspects of life, including personal, project, and program improvements. He defined quality as doing the right thing at the right time in the right way to achieve the best possible results and discussed the concept of the "gap" between what we know and what we do, and how this gap represents the areas we need to improve. He explained the scientific approach to quality improvement, which involves systematic performance analysis, testing and learning, and implementing change ideas. He also highlighted the importance of client focus and a team approach to quality improvement.
How to Split Bills in the Odoo 17 POS ModuleCeline George
Bills have a main role in point of sale procedure. It will help to track sales, handling payments and giving receipts to customers. Bill splitting also has an important role in POS. For example, If some friends come together for dinner and if they want to divide the bill then it is possible by POS bill splitting. This slide will show how to split bills in odoo 17 POS.
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
The Art Pastor's Guide to Sabbath | Steve ThomasonSteve Thomason
What is the purpose of the Sabbath Law in the Torah. It is interesting to compare how the context of the law shifts from Exodus to Deuteronomy. Who gets to rest, and why?
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.