- The document discusses methods for computing moments of mouse-drawn shapes using only corner pixel locations.
- It presents an algorithm that discards redundant vertices, retaining only points where the shape bends sufficiently. This improves time and space complexity over prior methods.
- Moments are computed by dividing the shape into triangles using corner pixels and the origin, then summing the moments of the individual triangles.
The document describes various computer graphics output primitives and algorithms for drawing them, including lines, circles, and filled areas. It discusses line drawing algorithms like DDA, Bresenham's, and midpoint circle algorithms. These algorithms use incremental integer calculations to efficiently rasterize primitives by determining the next pixel coordinates without performing floating point calculations at each step. The midpoint circle algorithm in particular uses a "circle function" and incremental updates to its value to determine whether the next pixel is inside or outside the circle boundary.
The Method of Repeated Application of a Quadrature Formula of Trapezoids and ...IJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
International Journal of Modern Engineering Research (IJMER) covers all the fields of engineering and science: Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Computer Engineering, Agricultural Engineering, Aerospace Engineering, Thermodynamics, Structural Engineering, Control Engineering, Robotics, Mechatronics, Fluid Mechanics, Nanotechnology, Simulators, Web-based Learning, Remote Laboratories, Engineering Design Methods, Education Research, Students' Satisfaction and Motivation, Global Projects, and Assessment…. And many more.
On Edge Control Set of a Graph in Transportation ProblemsEswar Publications
One of the most significant problems in the analysis of the reliability of multi-state transportation systems is to find the
minimal cut sets and minimal edge control sets. For that purpose there are several algorithms that use the minimal path
and cut sets of such systems. In this paper we give an approach to determine the minimal edge control set. This approach directly finds all minimal edge control sets of a transport network. The main aim of the paper is to find optimal locations for sensors for detecting terrorists, weapons, or other dangerous materials on roads leading into major cities.
The document discusses computer graphics concepts like points, pixels, lines, and circles. It begins with definitions of pixels and how they relate to points in geometry. It then covers the basic structure for specifying points in OpenGL and how to draw points, lines, and triangles. Next, it discusses algorithms for drawing lines, including the digital differential analyzer (DDA) method and Bresenham's line algorithm. Finally, it covers circle drawing and introduces the mid-point circle algorithm. In summary:
1) It defines key computer graphics concepts like pixels, points, lines, and circles.
2) It explains the basic OpenGL functions for drawing points and lines and provides examples of drawing simple shapes.
3) It
1. This document provides instructions for completing Section A of a mathematics exam. Students must use a pencil and fill in answers on an answer sheet by making a horizontal line in the correct space.
2. The answer sheet contains the student's name, date of birth, and other identifying information. Students should check this is correct and report any errors.
3. There is one correct answer for each question, and rough work should not be done on the answer sheet.
Cs8092 computer graphics and multimedia unit 3SIMONTHOMAS S
The document discusses various methods for representing 3D objects in computer graphics, including polygon meshes, curved surfaces defined by equations or splines, and sweep representations. It also covers 3D transformations like translation, rotation, and scaling. Key representation methods discussed are polygonal meshes, NURBS curves and surfaces, and extruded and revolved shapes. Transformation operations covered are translation using addition of a offset vector, and rotation using a rotation matrix.
This document discusses various computer graphics primitives and algorithms used to render basic shapes and images on raster displays. It describes point plotting, line drawing using algorithms like DDA and Bresenham's, and area filling using boundary fill and flood fill. Point plotting simply illuminates a single pixel coordinate. Line drawing calculates pixel positions between endpoints using DDA or Bresenham's integer-based methods. Boundary fill and flood fill are used to color interior regions, with boundary fill stopping at a boundary color and flood fill replacing all pixels of a given interior color.
The document describes various computer graphics output primitives and algorithms for drawing them, including lines, circles, and filled areas. It discusses line drawing algorithms like DDA, Bresenham's, and midpoint circle algorithms. These algorithms use incremental integer calculations to efficiently rasterize primitives by determining the next pixel coordinates without performing floating point calculations at each step. The midpoint circle algorithm in particular uses a "circle function" and incremental updates to its value to determine whether the next pixel is inside or outside the circle boundary.
The Method of Repeated Application of a Quadrature Formula of Trapezoids and ...IJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
International Journal of Modern Engineering Research (IJMER) covers all the fields of engineering and science: Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Computer Engineering, Agricultural Engineering, Aerospace Engineering, Thermodynamics, Structural Engineering, Control Engineering, Robotics, Mechatronics, Fluid Mechanics, Nanotechnology, Simulators, Web-based Learning, Remote Laboratories, Engineering Design Methods, Education Research, Students' Satisfaction and Motivation, Global Projects, and Assessment…. And many more.
On Edge Control Set of a Graph in Transportation ProblemsEswar Publications
One of the most significant problems in the analysis of the reliability of multi-state transportation systems is to find the
minimal cut sets and minimal edge control sets. For that purpose there are several algorithms that use the minimal path
and cut sets of such systems. In this paper we give an approach to determine the minimal edge control set. This approach directly finds all minimal edge control sets of a transport network. The main aim of the paper is to find optimal locations for sensors for detecting terrorists, weapons, or other dangerous materials on roads leading into major cities.
The document discusses computer graphics concepts like points, pixels, lines, and circles. It begins with definitions of pixels and how they relate to points in geometry. It then covers the basic structure for specifying points in OpenGL and how to draw points, lines, and triangles. Next, it discusses algorithms for drawing lines, including the digital differential analyzer (DDA) method and Bresenham's line algorithm. Finally, it covers circle drawing and introduces the mid-point circle algorithm. In summary:
1) It defines key computer graphics concepts like pixels, points, lines, and circles.
2) It explains the basic OpenGL functions for drawing points and lines and provides examples of drawing simple shapes.
3) It
1. This document provides instructions for completing Section A of a mathematics exam. Students must use a pencil and fill in answers on an answer sheet by making a horizontal line in the correct space.
2. The answer sheet contains the student's name, date of birth, and other identifying information. Students should check this is correct and report any errors.
3. There is one correct answer for each question, and rough work should not be done on the answer sheet.
Cs8092 computer graphics and multimedia unit 3SIMONTHOMAS S
The document discusses various methods for representing 3D objects in computer graphics, including polygon meshes, curved surfaces defined by equations or splines, and sweep representations. It also covers 3D transformations like translation, rotation, and scaling. Key representation methods discussed are polygonal meshes, NURBS curves and surfaces, and extruded and revolved shapes. Transformation operations covered are translation using addition of a offset vector, and rotation using a rotation matrix.
This document discusses various computer graphics primitives and algorithms used to render basic shapes and images on raster displays. It describes point plotting, line drawing using algorithms like DDA and Bresenham's, and area filling using boundary fill and flood fill. Point plotting simply illuminates a single pixel coordinate. Line drawing calculates pixel positions between endpoints using DDA or Bresenham's integer-based methods. Boundary fill and flood fill are used to color interior regions, with boundary fill stopping at a boundary color and flood fill replacing all pixels of a given interior color.
The Day You Finally Use Algebra: A 3D Math PrimerJanie Clayton
This document provides an overview of various math and programming concepts used for graphics. It begins with an introduction to linear algebra and how it allows performing actions on multiple values simultaneously through matrices. It then discusses trigonometry and how triangles are used as a foundation for 3D graphics. Finally, it shares code for a fragment shader that simulates refraction through a sphere to demonstrate these concepts in action.
The document discusses various methods for 3D object modeling and representation, including:
- Polygonal meshes which approximate surfaces and solids using polygons and can represent a broad class of objects.
- Solid modeling using polygonal meshes where directional information is added to faces using normal vectors.
- Sweep representations that form shapes by extruding or sweeping 2D profiles through space.
- Surface modeling using explicit functions of two variables or surfaces of revolution obtained by rotating curves around axes.
1. The document provides instructions for a mathematics exam. It states that calculators may be used, full marks require showing working, and scale drawings will not be credited. It then lists various formulae that may be needed for the exam.
2. The exam consists of 11 multi-part questions testing a range of mathematics skills, including algebra, geometry, trigonometry, calculus and graph sketching. Candidates are advised to attempt all questions.
3. The document concludes by providing blank pages for working, followed by a notice that the exam has ended.
B. SC CSIT Computer Graphics Unit 3 By Tekendra Nath YogiTekendra Nath Yogi
This document discusses various methods for 3D object representation in computer graphics. It covers surface modeling techniques like polygon meshes, parametric cubic curves, and quadratic surfaces. It also discusses solid modeling representations such as sweep, boundary, and spatial partitioning. Additionally, it provides details on polygon mesh data structures, plane equations, quadric surfaces, and parametric cubic curves. Specifically, it explains how to define curves using parametric cubic functions and calculate coefficients for natural cubic splines.
This slide contain description about the line, circle and ellipse drawing algorithm in computer graphics. It also deals with the filled area primitive.
The document discusses algorithms for drawing circles and filling polygons on a computer screen. It covers the mid-point circle algorithm for determining pixel positions on a circle, as well as boundary filling and flood filling algorithms for coloring the interior of polygon shapes. The mid-point circle algorithm uses a decision parameter to iteratively calculate pixel coordinates on the circle path. Filling algorithms like boundary fill use recursion to color neighboring pixels of the same color as the initially selected point.
The document provides examples and explanations for sketching the graphs of various types of functions, including:
1) Linear functions, which produce straight lines. The slope and y-intercept determine the graph.
2) Quadratic functions, which produce parabolas. The direction of opening and intercepts are used to sketch the graph.
3) Cubic functions, which produce S-shaped curves. The direction of turning and intercepts are considered.
4) Reciprocal functions, which produce hyperbolas. The direction and intercepts are the key factors for the graph.
Step-by-step methods are outlined for accurately sketching graphs of each function type based on their defining characteristics.
AU QP Answer key NOv/Dec 2015 Computer Graphics 5 sem CSEThiyagarajan G
This document contains a summary of a computer graphics exam with 10 multiple choice questions in Part A and 4 long answer questions in Part B. Some of the key topics covered include: image resolution, scaling matrices, color conversion between RGB and CMY color modes, Bezier curves, projection planes, dithering, animation principles, turtle attributes in graphics, Bresenham's circle algorithm, Liang-Barsky line clipping algorithm, viewing transformations, cubic Bezier curves, and backface detection. Part B also includes questions on orthographic vs axonometric vs oblique projections, ambient lighting models, raster vs keyframe animation, ray tracing, and morphing.
Cs8092 computer graphics and multimedia unit 2SIMONTHOMAS S
This document discusses two-dimensional graphics transformations and matrix representations. It covers topics such as translation, rotation, scaling, reflections, shearing, and representing composite transformations using matrix multiplication. Homogeneous coordinates are also introduced as a way to represent 2D points using 3-dimensional vectors and matrices for transformations.
Edge linking connects edge pixels that are likely part of the same boundary or object. Local edge linking looks at small neighborhoods around each pixel to link similar nearby pixels based on gradient magnitude and direction. Global edge linking uses the Hough transform to link pixels that fall on the same lines or curves by accumulating pixels that satisfy line or curve equations in a parameter space. The Hough transform allows efficient global edge linking compared to a brute force approach.
3D objects can be represented in several ways including point clouds, surfaces, and solids. Surfaces include meshes composed of polygons, subdivision surfaces defined by rules, and parametric or implicit surfaces with mathematical equations. Solids include voxel grids, binary space partition trees, constructive solid geometry using boolean operations, and swept volumes along trajectories. Each representation has advantages for different applications like rendering, modeling, or 3D scanning.
Here are the steps to solve this problem:
1) The given equation is: y = x2 + 2x
2) To complete the table, we need to calculate the value of y when x = -3 and when x = 1
3) When x = -3:
y = (-3)2 + 2(-3)
y = 9 - 6
y = 3
4) When x = 1:
y = 12 + 2(1)
y = 1 + 2
y = 3
So the completed table is:
Table 1
x -3 1
y 3 3
(b) Sketch the graph of y = x2 + 2
This document describes algorithms for X-ray and maximum intensity projection (MIP) volume rendering. It provides pseudocode for the X-ray and MIP rendering algorithms, which involve casting rays through a volumetric dataset and accumulating or finding the maximum intensity values along each ray. Key steps include intersecting rays with the volume bounding box, trilinear interpolation of sample values, and scaling and rotating the rendered image. Code fragments are presented that implement functions for X-ray and MIP rendering based on these algorithms.
The document describes the Breshenham's circle generation algorithm. It explains that the algorithm uses a decision parameter to iteratively select pixels along the circumference of a circle. It provides pseudocode for the algorithm, which initializes x and y values, calculates a decision parameter, and increments x while decrementing y at each step, plotting points based on the decision parameter. An example of applying the algorithm to generate a circle with radius 5 is also provided.
Output primitives computer graphics c versionMarwa Al-Rikaby
This document describes various algorithms for drawing lines in computer graphics, including the Digital Differential Analyzer (DDA) algorithm and Bresenham's line algorithm. The DDA algorithm samples a line at discrete positions by calculating changes in one coordinate by a fixed amount and determining the corresponding value of the other coordinate. Bresenham's algorithm uses only incremental integer calculations to determine which of two possible pixel positions is closer to the true line at each sample step.
This document describes rectangular coordinate systems and how to plot points and graphs in them. It contains the following key points:
- A rectangular coordinate system uses two perpendicular axes (typically x and y) that intersect at the origin to locate points in a plane.
- The coordinates of a point P are ordered pairs (x,y) where x is the point's distance from the y-axis and y is its distance from the x-axis.
- An equation in x and y defines a graph - the set of all points whose coordinates satisfy the equation. Graphs can be approximated by plotting sample points but this has limitations.
- Intercepts are points where a graph crosses an axis,
The document provides an overview of image processing, including its components, representations of images using matrices, types of images like color, grayscale and binary, concepts of neighborhoods, preprocessing techniques like median filtering and edge detection, segmentation using thresholding and connected components, and morphology operations like erosion, dilation, opening and closing.
This document discusses algorithms for rendering lines in raster graphics. It begins by introducing common line primitives in OpenGL and reviewing basic line drawing math. It then describes the Digital Differential Analyzer (DDA) line algorithm and its limitations. The document introduces Bresenham's midpoint line algorithm as a faster alternative that uses integer arithmetic. It explains how Bresenham's algorithm works by tracking the sign of a decision variable to select the next pixel along the line. The document concludes by generalizing Bresenham's algorithm and discussing optimizations.
Using matrices to transform geometric figures, including translations, dilations, reflections, and rotations. Translations use a matrix with the distances of movement in each row. Dilations multiply coordinates by a scalar factor. Reflections across an axis involve changing the sign of coordinates on one side of the axis. Rotation matrices involve trigonometric functions to rotate the figure a specified number of degrees clockwise or counterclockwise. Examples show setting up and performing each type of transformation on sample polygons.
This document provides information about an exam for the Edexcel GCE Core Mathematics C3 Bronze Level B1 qualification. It lists the paper reference, time allowed, materials required and permitted calculators. It provides instructions for candidates on writing details on the front page and information about the structure of the paper. It also lists the 9 questions that make up the exam, covering topics like functions, graphs, derivatives, iterations and logarithms. The final section suggests grade boundaries for the exam.
This document presents a policy-driven architecture for effective service allocation in cloud environments. It begins with an introduction to cloud computing and discusses challenges of scheduling client requests and allocating services as the number of clients increases. It then reviews previous research on resource allocation and process scheduling in distributed cloud systems. The paper proposes a service allocation model and policy-based architecture to address these challenges through effective identification of cloud and client characteristics. This would allow for reliable and efficient allocation of services to clients. The conclusion discusses evaluating the proposed architecture.
The Day You Finally Use Algebra: A 3D Math PrimerJanie Clayton
This document provides an overview of various math and programming concepts used for graphics. It begins with an introduction to linear algebra and how it allows performing actions on multiple values simultaneously through matrices. It then discusses trigonometry and how triangles are used as a foundation for 3D graphics. Finally, it shares code for a fragment shader that simulates refraction through a sphere to demonstrate these concepts in action.
The document discusses various methods for 3D object modeling and representation, including:
- Polygonal meshes which approximate surfaces and solids using polygons and can represent a broad class of objects.
- Solid modeling using polygonal meshes where directional information is added to faces using normal vectors.
- Sweep representations that form shapes by extruding or sweeping 2D profiles through space.
- Surface modeling using explicit functions of two variables or surfaces of revolution obtained by rotating curves around axes.
1. The document provides instructions for a mathematics exam. It states that calculators may be used, full marks require showing working, and scale drawings will not be credited. It then lists various formulae that may be needed for the exam.
2. The exam consists of 11 multi-part questions testing a range of mathematics skills, including algebra, geometry, trigonometry, calculus and graph sketching. Candidates are advised to attempt all questions.
3. The document concludes by providing blank pages for working, followed by a notice that the exam has ended.
B. SC CSIT Computer Graphics Unit 3 By Tekendra Nath YogiTekendra Nath Yogi
This document discusses various methods for 3D object representation in computer graphics. It covers surface modeling techniques like polygon meshes, parametric cubic curves, and quadratic surfaces. It also discusses solid modeling representations such as sweep, boundary, and spatial partitioning. Additionally, it provides details on polygon mesh data structures, plane equations, quadric surfaces, and parametric cubic curves. Specifically, it explains how to define curves using parametric cubic functions and calculate coefficients for natural cubic splines.
This slide contain description about the line, circle and ellipse drawing algorithm in computer graphics. It also deals with the filled area primitive.
The document discusses algorithms for drawing circles and filling polygons on a computer screen. It covers the mid-point circle algorithm for determining pixel positions on a circle, as well as boundary filling and flood filling algorithms for coloring the interior of polygon shapes. The mid-point circle algorithm uses a decision parameter to iteratively calculate pixel coordinates on the circle path. Filling algorithms like boundary fill use recursion to color neighboring pixels of the same color as the initially selected point.
The document provides examples and explanations for sketching the graphs of various types of functions, including:
1) Linear functions, which produce straight lines. The slope and y-intercept determine the graph.
2) Quadratic functions, which produce parabolas. The direction of opening and intercepts are used to sketch the graph.
3) Cubic functions, which produce S-shaped curves. The direction of turning and intercepts are considered.
4) Reciprocal functions, which produce hyperbolas. The direction and intercepts are the key factors for the graph.
Step-by-step methods are outlined for accurately sketching graphs of each function type based on their defining characteristics.
AU QP Answer key NOv/Dec 2015 Computer Graphics 5 sem CSEThiyagarajan G
This document contains a summary of a computer graphics exam with 10 multiple choice questions in Part A and 4 long answer questions in Part B. Some of the key topics covered include: image resolution, scaling matrices, color conversion between RGB and CMY color modes, Bezier curves, projection planes, dithering, animation principles, turtle attributes in graphics, Bresenham's circle algorithm, Liang-Barsky line clipping algorithm, viewing transformations, cubic Bezier curves, and backface detection. Part B also includes questions on orthographic vs axonometric vs oblique projections, ambient lighting models, raster vs keyframe animation, ray tracing, and morphing.
Cs8092 computer graphics and multimedia unit 2SIMONTHOMAS S
This document discusses two-dimensional graphics transformations and matrix representations. It covers topics such as translation, rotation, scaling, reflections, shearing, and representing composite transformations using matrix multiplication. Homogeneous coordinates are also introduced as a way to represent 2D points using 3-dimensional vectors and matrices for transformations.
Edge linking connects edge pixels that are likely part of the same boundary or object. Local edge linking looks at small neighborhoods around each pixel to link similar nearby pixels based on gradient magnitude and direction. Global edge linking uses the Hough transform to link pixels that fall on the same lines or curves by accumulating pixels that satisfy line or curve equations in a parameter space. The Hough transform allows efficient global edge linking compared to a brute force approach.
3D objects can be represented in several ways including point clouds, surfaces, and solids. Surfaces include meshes composed of polygons, subdivision surfaces defined by rules, and parametric or implicit surfaces with mathematical equations. Solids include voxel grids, binary space partition trees, constructive solid geometry using boolean operations, and swept volumes along trajectories. Each representation has advantages for different applications like rendering, modeling, or 3D scanning.
Here are the steps to solve this problem:
1) The given equation is: y = x2 + 2x
2) To complete the table, we need to calculate the value of y when x = -3 and when x = 1
3) When x = -3:
y = (-3)2 + 2(-3)
y = 9 - 6
y = 3
4) When x = 1:
y = 12 + 2(1)
y = 1 + 2
y = 3
So the completed table is:
Table 1
x -3 1
y 3 3
(b) Sketch the graph of y = x2 + 2
This document describes algorithms for X-ray and maximum intensity projection (MIP) volume rendering. It provides pseudocode for the X-ray and MIP rendering algorithms, which involve casting rays through a volumetric dataset and accumulating or finding the maximum intensity values along each ray. Key steps include intersecting rays with the volume bounding box, trilinear interpolation of sample values, and scaling and rotating the rendered image. Code fragments are presented that implement functions for X-ray and MIP rendering based on these algorithms.
The document describes the Breshenham's circle generation algorithm. It explains that the algorithm uses a decision parameter to iteratively select pixels along the circumference of a circle. It provides pseudocode for the algorithm, which initializes x and y values, calculates a decision parameter, and increments x while decrementing y at each step, plotting points based on the decision parameter. An example of applying the algorithm to generate a circle with radius 5 is also provided.
Output primitives computer graphics c versionMarwa Al-Rikaby
This document describes various algorithms for drawing lines in computer graphics, including the Digital Differential Analyzer (DDA) algorithm and Bresenham's line algorithm. The DDA algorithm samples a line at discrete positions by calculating changes in one coordinate by a fixed amount and determining the corresponding value of the other coordinate. Bresenham's algorithm uses only incremental integer calculations to determine which of two possible pixel positions is closer to the true line at each sample step.
This document describes rectangular coordinate systems and how to plot points and graphs in them. It contains the following key points:
- A rectangular coordinate system uses two perpendicular axes (typically x and y) that intersect at the origin to locate points in a plane.
- The coordinates of a point P are ordered pairs (x,y) where x is the point's distance from the y-axis and y is its distance from the x-axis.
- An equation in x and y defines a graph - the set of all points whose coordinates satisfy the equation. Graphs can be approximated by plotting sample points but this has limitations.
- Intercepts are points where a graph crosses an axis,
The document provides an overview of image processing, including its components, representations of images using matrices, types of images like color, grayscale and binary, concepts of neighborhoods, preprocessing techniques like median filtering and edge detection, segmentation using thresholding and connected components, and morphology operations like erosion, dilation, opening and closing.
This document discusses algorithms for rendering lines in raster graphics. It begins by introducing common line primitives in OpenGL and reviewing basic line drawing math. It then describes the Digital Differential Analyzer (DDA) line algorithm and its limitations. The document introduces Bresenham's midpoint line algorithm as a faster alternative that uses integer arithmetic. It explains how Bresenham's algorithm works by tracking the sign of a decision variable to select the next pixel along the line. The document concludes by generalizing Bresenham's algorithm and discussing optimizations.
Using matrices to transform geometric figures, including translations, dilations, reflections, and rotations. Translations use a matrix with the distances of movement in each row. Dilations multiply coordinates by a scalar factor. Reflections across an axis involve changing the sign of coordinates on one side of the axis. Rotation matrices involve trigonometric functions to rotate the figure a specified number of degrees clockwise or counterclockwise. Examples show setting up and performing each type of transformation on sample polygons.
This document provides information about an exam for the Edexcel GCE Core Mathematics C3 Bronze Level B1 qualification. It lists the paper reference, time allowed, materials required and permitted calculators. It provides instructions for candidates on writing details on the front page and information about the structure of the paper. It also lists the 9 questions that make up the exam, covering topics like functions, graphs, derivatives, iterations and logarithms. The final section suggests grade boundaries for the exam.
This document presents a policy-driven architecture for effective service allocation in cloud environments. It begins with an introduction to cloud computing and discusses challenges of scheduling client requests and allocating services as the number of clients increases. It then reviews previous research on resource allocation and process scheduling in distributed cloud systems. The paper proposes a service allocation model and policy-based architecture to address these challenges through effective identification of cloud and client characteristics. This would allow for reliable and efficient allocation of services to clients. The conclusion discusses evaluating the proposed architecture.
Robust Watermarking in Mid-Frequency Band in Transform Domain using Different Transforms with Full, Row and Column Version and Varying Embedding Energy
This document discusses a study on the effects of induced mutations through physical and chemical mutagens on yield and other traits in French bean (Phaseolus vulgaris L.). Mutations were induced using gamma irradiation at doses from 5-40kR and chemical mutagen ethyl methane sulphonate at concentrations from 0.1-0.3%. Observations were recorded on the parental variety, M2 generation, and M3 generation for traits like flowering time, pod yield, pod length, plant height, and seeds per pod. Genetic component analysis found both additive and dominance gene effects were induced, with overdominance observed for most traits, suggesting selection should be deferred to later generations. The study estimated genetic components like additive,
This document summarizes a study on the impact of software development models on software delivery time. It analyzes the waterfall and spiral models. A survey was conducted of 22 software projects in India. The results showed that the waterfall model had a higher success rate of 76.4% for on-time delivery compared to 40% for iterative models. The waterfall model was used for 17 of the 22 projects and 13 of those 17 projects delivered on time. This suggests that the waterfall model has a more positive impact on software delivery time than the spiral model based on the sample of projects studied.
This document describes the crystal structure of the compound terbinafine, which was analyzed using X-ray single crystal diffraction. Key findings include:
- Terbinafine crystallizes in the monoclinic space group P21/n with unit cell parameters a=5.9181(3)Å, b=29.4239(14)Å, c=11.429 β=97.92 ̊, V=1971.24(16) Å3, Z=4.
- Two water molecules were present in the crystal structure unit cell and engaged in hydrogen bonding, providing stability to the structure.
- The two benzene rings in the structure are essentially planar, while the side
The document proposes an improved clustering algorithm for social network analysis. It combines BSP (Business System Planning) clustering with Principal Component Analysis (PCA) to group social network objects into classes based on their links and attributes. Specifically, it applies PCA before BSP clustering to reduce the dimensionality of the social network data and retain only the most important variables for clustering. This improves the BSP clustering results by focusing on the key information in the social network.
This document discusses using virtualization to optimize resource utilization and reduce costs. It introduces virtualization and describes how virtual machines allow multiple environments to run isolated on the same physical machine. Virtualization can reduce hardware costs by converting physical servers into logical resources that are allocated as needed. The document then presents an experimental study comparing the hardware costs of configuring different servers physically versus virtualizing them on a single system using Oracle VM VirtualBox. The results show virtualization significantly reduced costs by consolidating multiple servers onto one physical machine.
- The document analyzes the effect of varying antenna gain and sectorization on site requirements for an LTE radio access network.
- It models three site layouts: single omni-directional antenna sites, 3-sector sites with directional antennas per sector, and 6-sector sites.
- Link budget calculations are performed for different clutter types to estimate the number of sites needed to cover the deployment area under each configuration.
This document summarizes previous research on thermal and moisture behavior in buildings. It discusses factors that influence indoor humidity levels and strategies to control humidity. The document also reviews numerical models that simulate coupled heat, air, and moisture transfer in buildings. It examines studies on natural convection in cavities, the effects of inclined lamellar structures, and correlations for heat and mass transfer. The research aims to numerically study the thermal and moisture behavior of a premise with walls equipped with inclined alveolar structures under variable climate conditions.
The document discusses using laser scanning point clouds to create Building Information Models (BIM). It describes how point clouds collected via laser scanning can be processed and used to efficiently generate 3D digital models of objects. The models integrate spatial data with semantic information like material properties. BIM allows all project stakeholders to access shared information across design, construction and management. Laser scanning provides accurate spatial data to complete the BIM workflow and plays an important role in construction projects. The document presents a case study of a church scanning project and processing the point clouds in Revit software to generate object-oriented BIM models for documentation and future applications.
This document describes a face recognition technique that uses a hybrid of principal component analysis (PCA) and an artificial neural network. PCA is used to extract global features of the entire face and local features of the eyes, nose, and mouth regions. These features are used as inputs to an artificial neural network for training and testing. The technique aims to leverage both global and local features for face recognition while reducing computation time compared to local-feature-only approaches.
This document describes a hierarchical decentralized averaging algorithm for wireless sensor networks. The algorithm recursively partitions the network into subnetworks at different scales. Initially, neighboring nodes gossip to compute local averages. These local averages are then used to compute global averages in a multi-hop fashion between non-neighboring nodes using geographic routing. The algorithm aims to reduce message complexity, distribute computation evenly across the network, and reduce message congestion compared to existing randomized gossip and path averaging algorithms. Simulations show this multiscale gossip approach outperforms existing methods in terms of communication cost scaling with network size.
Thirty-two Bradyrhizobium japonicum isolates collected from Maharashtra, India were tested for compatibility with commonly used agrochemicals in soybean cultivation. Isolates BJ12, BJ32 and BJ25 showed compatibility with thiram fungicide. Isolates BJ16, BJ4, BJ5, BJ23 and BJ27 were compatible with carbendazim and copper oxychloride fungicides at all concentrations tested and with ridomil MZ fungicide even at higher concentrations. Isolates BJ2, BJ10, BJ11, BJ12 and BJ23 tolerated pre- and post-emergence herbic
This document discusses different encoding mechanisms that can be used to perform secure communication in sensor networks in an energy-efficient manner. It first discusses routing approaches in sensor networks such as unicast routing, multicast routing, global routing and maze routing. It then examines various error detection techniques like repetition schemes, parity schemes and error-correcting codes. The document goes on to explain different encoding techniques - convolution codes, Hamming codes, Reed Solomon encoding. Convolution codes use shift registers and modulo-2 addition to encode input bits into output bits. Hamming codes are block codes that use a generator matrix to encode data bits into codewords. Reed Solomon encoding is a block encoding scheme that forms codewords by adding parity bits to the data using
This document presents a new algorithm for extracting partial and total models from Industry Foundation Classes (IFC) instance files without requiring an IFC schema or model view definition. The algorithm traverses the IFC data instances using a graph structure and breadth-first search. It was tested on 10 IFC test cases and an actual building information model, generating partial and total models. The extracted models were validated and results were stored in an Excel file containing hyperlinks between IFC entities. The algorithm aims to parse IFC data generated by BIM software in an efficient manner without external dependencies.
The document summarizes research on using DNA barcoding of the COI gene to identify aphid subspecies. It analyzed COI sequences from 17 aphid species and subspecies across 4 genera. Most subspecies (76.92%) had distinct COI sequences, with nucleotide substitutions ranging from 2-7 positions. Differences between subspecies reached levels typical between closely related species. Phylogenetic trees reliably separated the Myzus cerasi subspecies into 3 clusters. Genetic distances between subspecies were on average 0.011, similar to distances between closely related species. The results suggest COI sequencing can effectively identify aphid subspecies and help distinguish morphologically similar forms that may differ in pest status.
Surveillance refers to the task of observing a scene, often for lengthy periods in search of particular objects or particular behaviour. This task has many applications, foremost among them is security (monitoring for undesirable behaviour such as theft or vandalism), but increasing numbers of others in areas such as agriculture also exist. Historically, closed circuit TV (CCTV) surveillance has been mundane and labour Intensive, involving personnel scanning multiple screens, but the advent of reasonably priced fast hardware means that automatic surveillance is becoming a realistic task to attempt in real time. Several attempts at this are underway.
Three sentences:
The document summarizes techniques for meshing and re-meshing used in computer graphics. It discusses using Voronoi diagrams and Delaunay triangulations to reconstruct meshes from point clouds, and using centroidal Voronoi tessellations to improve existing meshes through re-meshing by minimizing quantization noise. The document outlines methods for reconstruction, re-meshing scanned meshes, and converting meshes to subdivision surfaces.
The Geometric Characteristics of the Linear Features in Close Range Photogram...IJERD Editor
The accuracy of photogrammetry can be increased with better instruments, careful geometric
characteristics of the system, more observations and rigorous adjustment. The main objective of this research is
to develop a new mathematical model of two types of linear features (straight line, spline curve) in addition to
relating linear features in object space to the image space using the Direct Linear Transformation (DLT). The
second main objective of the present paper is to study of some geometric characteristics of the system, when the
linear features are used in close range photogrammetric reduction processes. In this research, the accuracy
improvement has been evaluated by adopting certain assessment criteria, this will be performed by computing
the positional discrepancies between the photogrammetrically calculated object space coordinates of some check
object points, with the original check points of the test field, in terms of their respective RMS errors values. In
addition, the resulting least squares estimated covariance matrices of the check object point's space coordinates.
To perform the above purposes, some experiments are performed with synthetic images. The obtained results
showed significant improvements in the positional accuracy of close range photogrammetry, when starting node,
end nodes, and interior node on straight line and spline curve are increased with certain specifications regarding
the location and magnitude of each type of them.
Motivated by presenting mathematics visually and interestingly to common people based on calculus and its extension, parametric curves are explored here to have two and three dimensional objects such that these objects can be used for demonstrating mathematics.
Epicycloid, hypocycloid are particular curves that are implemented in MATLAB programs and the motifs are presented here. The obtained curves are considered to be domains for complex mappings to have new variation of Figures and objects. Additionally Voronoi mapping is also implemented to some parametric curves and some resulting complex mappings.
Some obtained 3 dimensional objects are considered as flowers and animals inspiring to be mathematical ornaments of hypocycloid dance which is also illustrated here.
This document discusses the complex dynamics of the superior Phoenix set. The Phoenix function was introduced by Shigehiro Ushiki and is a modification of the classic Mandelbrot and Julia sets. The paper presents the characteristics of the Phoenix function using superior iterates. Several examples are provided to show the convergence of the Phoenix function to fixed points for different parameter values or escape to infinity. The superior Phoenix set is defined as the collection of points whose orbits are bounded under superior iteration of the Phoenix function.
This document contains lecture notes on calculus of functions of several variables. It covers topics including vectors and vector spaces, geometry, vectors and the dot product, cross product, lines and planes in space, functions, vector valued functions, parameterized surfaces, parameterized curves, arc length and curvature. The notes provide definitions, examples, and exercises for each topic.
This document provides notes on determining various properties of planes in 3D space, including:
1) The perpendicular distance from a point to a plane using either vector or Cartesian methods.
2) The angle between a plane and line by taking the arcsine of the dot product of their normal vectors.
3) The angle between two planes by taking the arccosine of the dot product of their normal vectors.
Worked examples are provided for calculating distances, angles, and deriving relevant formulas. Revision questions at the end reinforce the content through calculation practice.
This document provides 15 multiple choice questions about circles (circunferência in Portuguese). The questions involve finding equations of circles, determining if points lie inside or outside circles, calculating lengths of arcs and distances between points, circles tangent to lines, and other geometric relationships involving circles.
1. The document derives the shape functions for a three-noded constant strain triangular (CST) element.
2. It presents the displacement function in terms of nodal displacements using the element connectivity matrix.
3. The shape functions are obtained by relating the displacement function to the nodal displacement terms, resulting in a set of three linear shape functions that describe the displacement across the element in terms of the displacements at its nodes.
The document is a practice exercise on circles (circunferência in Portuguese) in planar geometry. It contains 15 multiple choice questions related to properties of circles such as equations of circles, points of tangency, radii, areas, and relationships between circles, lines, and other geometric objects. The questions involve identifying equations of circles, finding lengths, radii, areas, and points of tangency/intersection. The answers are provided in a key at the end.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Analytical solution of the relative orbital motion in unperturbed elliptic or...IRJET Journal
This document presents an analytical solution to the relative orbital motion of two objects (a chief and deputy object) moving in unperturbed elliptic orbits about a central body. It begins by deriving the equations of motion for the deputy object relative to the chief in terms of the true anomaly of the chief's orbit. These equations are then linearized and solved using Laplace transformations, representing the solution in terms of the eccentricity of the chief's orbit and its true anomaly. Finally, the document states that the analytical solution will be applied to a numerical example to validate the approach.
This document contains 25 multiple choice questions about digital image processing concepts. It covers topics like the steps in image processing (acquisition, sampling, quantization), neighbor pixels, distances between pixels, interpolation, aliasing, image sensors, contrast, storage requirements, and neighbors of a pixel. The questions range from basic to intermediate levels, testing understanding of foundational imaging concepts.
Preliminary Research on Data Abnormality Diagnosis Methods of Spacecraft Prec...IJERA Editor
For precision measuring the satellite equipments, providing technical support for satellite assembly, combined
with satellite small size, complex structure, satellite equipment shapes vary, and other characteristics, presently,
indirect method that using electronic theodolite to measure cube mirror are commonly used to obtain the relative
attitude of the respective devices. But in the actual measurement process, there are measurement errors in the
measurement data. How to detect anomalies in the data is the focus of this study. This paper proposes two
methods to detect abnormal data, that is mathematical geometric method and outlier detection methods. This
paper analyzes their theoretical basis and verifies the feasibility of the two methods through part of the actual
measurement data to.
The document presents a new encryption method for elliptic curve cryptography based on matrices. It begins by generating an addition table containing all possible point combinations on the elliptic curve. The plaintext is then converted to multiple points on the curve. These points are arranged in a matrix and encrypted using matrix multiplication with a non-singular matrix. The resulting cipher matrix undergoes circular shifting. The decryption process recovers the points from the cipher and performs the inverse operations to obtain the original plaintext. An example is provided to demonstrate the encryption of the word "cipher" using this method.
Moment Preserving Approximation of Independent Components for the Reconstruct...rahulmonikasharma
The application of Independent Component Analysis (ICA) has found considerable success in problems where sets of observed time series may be considered as results of linearly mixed instantaneous source signals. The Independent Components (IC’s) or features can be used in the reconstruction of observed multivariate time seriesfollowing an optimal ordering process. For trend discovery and forecasting, the generated IC’s can be approximated for the purpose of noise removal and for the lossy compression of the signals.We propose a moment-preserving (MP) methodology for approximating IC’s for the reconstruction of multivariate time series.The methodologyis based on deriving the approximation in the signal domain while preserving a finite number of geometric moments in its Fourier domain.Experimental results are presented onthe approximation of both artificial time series and actual time series of currency exchange rates. Our results show that the moment-preserving (MP) approximations of time series are superior to other usual interpolation approximation methods, particularly when the signals contain significant noise components. The results also indicate that the present MP approximations have significantly higher reconstruction accuracy and can be used successfully for signal denoising while achieving in the same time high packing ratios. Moreover, we find that quite acceptable reconstructions of observed multivariate time series can be obtained with only the first few MP approximated IC’s.
The document discusses various policies for order picking, including pick sequencing, batching, and zoning. It describes the pick sequencing problem as analogous to the Traveling Salesman Problem (TSP) of finding the shortest route that visits all locations. It provides an analytical formulation of the TSP as a minimization problem with constraints. It also describes several heuristics for approximating solutions to the TSP, including the closest insertion algorithm. A special case admitting a polynomial-time solution involves a grid-like warehouse layout. Overall, the document outlines different approaches to modeling and solving the pick sequencing problem programmatically to minimize travel time.
The branch of mathematics which deals with location of objects in 2-D (dimensional) plane is called coordinate geometry. Need to present your work in most impressive & informative manner i.e. through Power Point Presentation call us at skype Id: kumar_sukh79 or mail us: clintech2011@gmail.com for using my service.
A Boundary Value Problem and Expansion Formula of I - Function and General Cl...IJERA Editor
In the present paper, we make a model of a boundary value problem and then obtain its solution involving
products of I -function and a general class of polynomials.
This document discusses various techniques for reducing peak-to-average power ratio (PAPR) in orthogonal frequency division multiplexing (OFDM) systems. It describes common PAPR reduction techniques such as partial transmit sequence (PTS), selective mapping (SLM), tone injection, peak cancellation, and peak windowing. It analyzes these techniques based on parameters like distortion, power increase, data rate loss, and bit error rate improvement. The document concludes that while SLM is better for PAPR reduction as it does not cause out-of-band radiation or degrade bit error rate performance, it has the drawback of increased complexity with larger number of subcarriers or phase sequences.
This document summarizes the performance enhancement and characterization of a junctionless vertical slit field effect transistor (JLVeSFET). Key findings from simulations include:
1) The JLVeSFET shows an optimized subthreshold slope of 65mV/decade and OFF current of ~10-18A/μm for a 50nm radius device with a high-k dielectric.
2) Using a high-k dielectric (Si3N4) instead of SiO2 increases the Ion/Ioff ratio to ~1011 and reduces the subthreshold slope to 63mV/decade.
3) Increasing the gate doping concentration reduces the subthreshold slope slightly while increasing the Ion/
This document summarizes research that analyzed the effect of temperature on the parameters of silicon solar cells. It was found that the open circuit voltage (Voc) of the solar cells decreases linearly as temperature increases from 20°C to 80°C. In contrast, the short circuit current (Isc) was found to increase only slightly with higher temperatures. The maximum efficiency of 18.5% was obtained at 20°C when Voc was 667.3mV and Isc was 37.56mA. Overall, the study demonstrated that higher temperatures negatively impact the Voc, fill factor, and efficiency of silicon solar cells.
The document presents a new bridgeless single-phase AC-DC converter based on a single-ended primary inductance converter (SEPIC) topology. The proposed rectifier utilizes a bidirectional switch and two fast diodes. It has less conduction losses compared to existing power factor correction rectifiers due to fewer components conducting during each switching cycle. Experimental results show the converter can achieve a high power factor under universal input voltage conditions and provide regulated output voltage for resistive and incandescent lamp loads. Future work may include further optimizing the design for applications requiring high power quality input power.
The document presents a new ontology matching system based on a multi-agent architecture. The system takes ontologies described in XML, RDF Schema, and OWL as input. It uses multiple matchers and filtering to generate mappings between ontology entities. The mappings are then validated. The system is implemented as a multi-agent system with different agent types responsible for resources, matching, generating mappings, and filtering/validating mappings. The architecture allows for robust, flexible, and scalable ontology matching.
This document discusses techniques to reduce leakage current and power consumption in static random-access memory (SRAM) cells implemented using independent gate fin field-effect transistors (FinFETs). It first describes the independent gate FinFET SRAM cell design and its advantages over other designs. It then examines two circuit-level leakage reduction techniques: 1) using multi-threshold voltages by connecting high-threshold transistors to reduce leakage when in standby mode, and 2) adding a gated power supply transistor to reduce leakage through stacking effects. Simulation results show that both techniques can reduce leakage current and power in the independent gate FinFET SRAM cell, with multi-threshold voltages providing better leakage control.
This document summarizes a survey on string similarity matching search techniques. It discusses how string similarity matching is used to find relevant information in text collections. The document reviews different algorithms for string matching, including edit distance, NR-grep, n-grams, and approaches based on hashing and locality-sensitive hashing. It analyzes techniques like pattern matching, threshold-based joins, and vector representations. The goal is to present an overview of the field and compare algorithm performance for similarity searches.
The document reviews various methods for enhancing the bandwidth of microstrip patch antennas. It discusses how modifying the patch shape, using multilayer configurations, planar/stacked multi-resonator structures, and different feeding techniques can increase the antenna's bandwidth. Modified patch shapes, multilayer structures, and proximity coupled feeding provide the greatest bandwidth enhancements, with multilayer designs potentially achieving over 70% bandwidth. The review concludes that slot loading and multilayer techniques are most effective for enhancing bandwidth while maintaining a small antenna size.
This document presents a new method for interpolation called weighted average interpolation (WAI). WAI uses the concepts of positive and negative effect to determine the influence of neighboring data points. Correction factors are derived from Pascal's triangle to match the results of WAI to Lagrange interpolation. The method is extended to extrapolation and unevenly spaced data using similar concepts. WAI aims to reduce the number of operations compared to Lagrange interpolation while maintaining accuracy.
This document presents a theorem about the almost Norlund summability of conjugate Fourier series. It generalizes previous results by Pati (1961) and Singh and Singh (1993). The main theorem states that if the conjugate partial sums of a Fourier series satisfy certain conditions, including being bounded by a function that approaches 0 as n approaches infinity, then the conjugate Fourier series is almost Norlund summable to the integral of the function at every point where the integral exists. The proof utilizes lemmas about the behavior of the conjugate partial sums and applies mean value theorems to show the necessary conditions are met. References to previous related works are also provided.
The document discusses the determination of diffusion constants in boronated powder metallurgy samples of the iron-carbon-copper system. Experiments were conducted on powdered samples with 0.1% carbon and 1-3% copper. The thickness of the boride layers formed after boronation at temperatures of 920-980°C were measured. The data was used to calculate the activation energy (Q) and pre-exponential factor (Do) based on parabolic growth curves. The results show that Q increases with sample density from 5.8 to 7 g/cm3. Adding up to 2% copper reduces Q values, but higher copper concentrations increase Q similar to pure iron samples.
This document compares various biometric methods for identification and verification. It discusses fingerprint recognition, face recognition, voice recognition, and iris recognition as some of the main biometric techniques. For each method, it describes how the biometric data is captured and analyzed, the advantages and disadvantages, and examples of applications where the technique can be used. The document provides an overview of the history of biometrics and the typical modules involved in a biometric system, such as sensors, feature extraction, matching, and template databases.
This document describes the design of a digital phase locked loop (PLL) with a divide by 4/5 prescaler. The digital PLL uses a digital phase frequency detector, time to digital converter, thermometric decoder, and digitally controlled oscillator. The proposed PLL design uses an accumulator type DCO and ring oscillator type TDC to achieve fast lock time and reduced jitter. The final system incorporates all the components to function as a digital PLL that locks when the reference and feedback frequencies match.
The document discusses energy efficient routing protocols for clustered wireless sensor networks. It provides an overview of wireless sensor networks and discusses how clustering is commonly used to improve energy efficiency and scalability. The document reviews several existing clustering-based routing protocols and analyzes their approaches for prolonging network lifetime by minimizing energy consumption in wireless sensor networks.
The document discusses bit error rate (BER) performance analysis of M-ary quadrature amplitude modulation (M-QAM) for implementation of orthogonal frequency-division multiplexing (OFDM). It analyzes the theoretical BER of M-QAM under different modulation orders and signal-to-noise ratios (SNR). The analysis shows that higher order M-QAM has higher BER than lower order M-QAM for the same SNR due to decreased symbol distances as the modulation order increases. It also discusses the use of M-QAM modulation in OFDM systems and outlines challenges in implementing higher order M-QAM for OFDM.
This document analyzes the groundwater quality of South Karaikal and Nagapattinam districts in Tamil Nadu, India. 14 groundwater samples were collected and analyzed for physicochemical parameters including major ions. Spatial variation maps were generated for parameters like calcium, chloride, sodium, and bicarbonate which showed high and low concentration regions. Piper and Durov plots indicated mixed temporary and permanent water hardness. Sodium absorption ratio values identified areas of excellent, good and fair water quality for irrigation. Overall, comparison to standards showed groundwater was not suitable for drinking in most areas.
The document discusses security issues in distributed database systems. It begins by defining distributed databases and their architecture. It then discusses three main security aspects: access control, authentication, and encryption. The document also discusses distributed database system design considerations like concurrency control and data fragmentation. Emerging security tools for distributed databases mentioned include data warehousing, data mining, collaborative computing, distributed object systems, and web applications. Maintaining security when building and querying data warehouses from multiple sources is highlighted as a key challenge.
Embedded machine learning-based road conditions and driving behavior monitoringIJECEIAES
Car accident rates have increased in recent years, resulting in losses in human lives, properties, and other financial costs. An embedded machine learning-based system is developed to address this critical issue. The system can monitor road conditions, detect driving patterns, and identify aggressive driving behaviors. The system is based on neural networks trained on a comprehensive dataset of driving events, driving styles, and road conditions. The system effectively detects potential risks and helps mitigate the frequency and impact of accidents. The primary goal is to ensure the safety of drivers and vehicles. Collecting data involved gathering information on three key road events: normal street and normal drive, speed bumps, circular yellow speed bumps, and three aggressive driving actions: sudden start, sudden stop, and sudden entry. The gathered data is processed and analyzed using a machine learning system designed for limited power and memory devices. The developed system resulted in 91.9% accuracy, 93.6% precision, and 92% recall. The achieved inference time on an Arduino Nano 33 BLE Sense with a 32-bit CPU running at 64 MHz is 34 ms and requires 2.6 kB peak RAM and 139.9 kB program flash memory, making it suitable for resource-constrained embedded systems.
International Conference on NLP, Artificial Intelligence, Machine Learning an...gerogepatton
International Conference on NLP, Artificial Intelligence, Machine Learning and Applications (NLAIM 2024) offers a premier global platform for exchanging insights and findings in the theory, methodology, and applications of NLP, Artificial Intelligence, Machine Learning, and their applications. The conference seeks substantial contributions across all key domains of NLP, Artificial Intelligence, Machine Learning, and their practical applications, aiming to foster both theoretical advancements and real-world implementations. With a focus on facilitating collaboration between researchers and practitioners from academia and industry, the conference serves as a nexus for sharing the latest developments in the field.
Using recycled concrete aggregates (RCA) for pavements is crucial to achieving sustainability. Implementing RCA for new pavement can minimize carbon footprint, conserve natural resources, reduce harmful emissions, and lower life cycle costs. Compared to natural aggregate (NA), RCA pavement has fewer comprehensive studies and sustainability assessments.
Advanced control scheme of doubly fed induction generator for wind turbine us...IJECEIAES
This paper describes a speed control device for generating electrical energy on an electricity network based on the doubly fed induction generator (DFIG) used for wind power conversion systems. At first, a double-fed induction generator model was constructed. A control law is formulated to govern the flow of energy between the stator of a DFIG and the energy network using three types of controllers: proportional integral (PI), sliding mode controller (SMC) and second order sliding mode controller (SOSMC). Their different results in terms of power reference tracking, reaction to unexpected speed fluctuations, sensitivity to perturbations, and resilience against machine parameter alterations are compared. MATLAB/Simulink was used to conduct the simulations for the preceding study. Multiple simulations have shown very satisfying results, and the investigations demonstrate the efficacy and power-enhancing capabilities of the suggested control system.
ACEP Magazine edition 4th launched on 05.06.2024Rahul
This document provides information about the third edition of the magazine "Sthapatya" published by the Association of Civil Engineers (Practicing) Aurangabad. It includes messages from current and past presidents of ACEP, memories and photos from past ACEP events, information on life time achievement awards given by ACEP, and a technical article on concrete maintenance, repairs and strengthening. The document highlights activities of ACEP and provides a technical educational article for members.
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesChristina Lin
Traditionally, dealing with real-time data pipelines has involved significant overhead, even for straightforward tasks like data transformation or masking. However, in this talk, we’ll venture into the dynamic realm of WebAssembly (WASM) and discover how it can revolutionize the creation of stateless streaming pipelines within a Kafka (Redpanda) broker. These pipelines are adept at managing low-latency, high-data-volume scenarios.
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSIJNSA Journal
The smart irrigation system represents an innovative approach to optimize water usage in agricultural and landscaping practices. The integration of cutting-edge technologies, including sensors, actuators, and data analysis, empowers this system to provide accurate monitoring and control of irrigation processes by leveraging real-time environmental conditions. The main objective of a smart irrigation system is to optimize water efficiency, minimize expenses, and foster the adoption of sustainable water management methods. This paper conducts a systematic risk assessment by exploring the key components/assets and their functionalities in the smart irrigation system. The crucial role of sensors in gathering data on soil moisture, weather patterns, and plant well-being is emphasized in this system. These sensors enable intelligent decision-making in irrigation scheduling and water distribution, leading to enhanced water efficiency and sustainable water management practices. Actuators enable automated control of irrigation devices, ensuring precise and targeted water delivery to plants. Additionally, the paper addresses the potential threat and vulnerabilities associated with smart irrigation systems. It discusses limitations of the system, such as power constraints and computational capabilities, and calculates the potential security risks. The paper suggests possible risk treatment methods for effective secure system operation. In conclusion, the paper emphasizes the significant benefits of implementing smart irrigation systems, including improved water conservation, increased crop yield, and reduced environmental impact. Additionally, based on the security analysis conducted, the paper recommends the implementation of countermeasures and security approaches to address vulnerabilities and ensure the integrity and reliability of the system. By incorporating these measures, smart irrigation technology can revolutionize water management practices in agriculture, promoting sustainability, resource efficiency, and safeguarding against potential security threats.