Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Sciences (1265)
- Environmental Sciences (1026)
- Physics (836)
- Engineering (690)
- Chemistry (652)
-
- Life Sciences (595)
- Earth Sciences (513)
- Social and Behavioral Sciences (498)
- Mathematics (454)
- Statistics and Probability (325)
- Computer Engineering (267)
- Natural Resources and Conservation (219)
- Education (216)
- Oceanography and Atmospheric Sciences and Meteorology (214)
- Geology (186)
- Databases and Information Systems (176)
- Astrophysics and Astronomy (171)
- Natural Resources Management and Policy (168)
- Science and Mathematics Education (155)
- Statistical Theory (138)
- Arts and Humanities (136)
- Applied Statistics (135)
- Physical Chemistry (135)
- Applied Mathematics (130)
- Electrical and Computer Engineering (125)
- Materials Science and Engineering (122)
- Ecology and Evolutionary Biology (107)
- Water Resource Management (107)
- Environmental Monitoring (96)
- Institution
-
- University of Nebraska - Lincoln (712)
- University of Wollongong (316)
- Wright State University (260)
- TÜBİTAK (199)
- University of Nevada, Las Vegas (160)
-
- Selected Works (156)
- Brigham Young University (126)
- Louisiana State University (119)
- Missouri University of Science and Technology (117)
- Singapore Management University (114)
- Wayne State University (108)
- Utah State University (102)
- COBRA (101)
- William & Mary (93)
- California Polytechnic State University, San Luis Obispo (91)
- Old Dominion University (91)
- Chinese Chemical Society | Xiamen University (86)
- University of Tennessee, Knoxville (77)
- Dartmouth College (73)
- SelectedWorks (71)
- University of Kentucky (70)
- University of Colorado Law School (66)
- Air Force Institute of Technology (63)
- Syracuse University (63)
- Department of Primary Industries and Regional Development, Western Australia (58)
- Edith Cowan University (58)
- University of Texas at Arlington (58)
- University of Central Florida (57)
- Technological University Dublin (54)
- Chulalongkorn University (51)
- Keyword
-
- Western Australia (41)
- College for Professional Studies (30)
- Communal forests (30)
- Community forests (30)
- Community-owned forests (30)
-
- MS Computer and Information Technology (29)
- Land use (26)
- School of Computer & Information Science (25)
- Groundwater (24)
- Physics (24)
- Regis University MSCIT thesis (21)
- Salinity (20)
- For (19)
- Geology (19)
- Kentucky (19)
- Natural resources (19)
- Nuclear reactors — Materials — Testing (19)
- Plan (18)
- [aism] (18)
- Eutectic alloys (17)
- Lead-bismuth alloys (17)
- Security (17)
- CMMB (16)
- GeoQUEST (16)
- Ecology (15)
- Mongolia (15)
- Synthesis (15)
- California (14)
- Computer Science (14)
- Computer science (14)
- Publication
-
- Faculty of Informatics - Papers (Archive) (211)
- Theses and Dissertations (174)
- Computer Science & Engineering Syllabi (165)
- Research Collection School Of Computing and Information Systems (109)
- Journal of Modern Applied Statistical Methods (93)
-
- Faculty Publications (90)
- Faculty of Science - Papers (Archive) (89)
- Journal of Electrochemistry (86)
- Electronic Theses and Dissertations (85)
- Turkish Journal of Chemistry (81)
- United States Department of Agriculture Wildlife Services: Staff Publications (81)
- Nebraska Tractor Tests (59)
- LSU Master's Theses (58)
- LSU Doctoral Dissertations (57)
- Masters Theses (53)
- Physics Faculty Research & Creative Works (53)
- Thai Environment (51)
- Wildlife Damage Management Conference Proceedings (51)
- Dissertations (47)
- Doctoral Dissertations (46)
- Dissertations, Theses, and Masters Projects (45)
- Research outputs pre 2011 (45)
- Turkish Journal of Physics (45)
- Physics Faculty Publications (44)
- Theses (44)
- Dartmouth Scholarship (43)
- International Conference on Information and Communication Technologies (43)
- United States Geological Survey: Staff Publications (40)
- Theses Digitization Project (39)
- Kno.e.sis Publications (37)
- Publication Type
Articles 3751 - 3780 of 5573
Full-Text Articles in Physical Sciences and Mathematics
Universal Designated Verifier Signature Proof (Or How To Efficiently Prove Knowledge Of A Signature), Joonsang Baek, R. Safavi-Naini, Willy Susilo
Universal Designated Verifier Signature Proof (Or How To Efficiently Prove Knowledge Of A Signature), Joonsang Baek, R. Safavi-Naini, Willy Susilo
Faculty of Informatics - Papers (Archive)
Proving knowledge of a signature has many interesting applications. As one of them, the Universal Designated Verifier Signature (UDVS), introduced by Steinfeld et al. in Asiacrypt 2003 aims to protect a signature holder’s privacy by allowing him to convince a verifier that he holds a valid signature from the signer without revealing the signature itself. The essence of the UDVS is a transformation from a publicly verifiable signature to a designated verifier signature, which is performed by the signature holder who does not have access to the signer’s secret key. However, one significant inconvenience of all the previous UDVS schemes …
Efficient Multi-Receiver Identity-Based Encryption And Its Application To Broadcast Encryption, Joonsang Baek, R. Safavi-Naini, Willy Susilo
Efficient Multi-Receiver Identity-Based Encryption And Its Application To Broadcast Encryption, Joonsang Baek, R. Safavi-Naini, Willy Susilo
Faculty of Informatics - Papers (Archive)
In this paper, we construct an efficient “multi-receiver identity-based encryption scheme”. Our scheme only needs one (or none if precomputed and provided as a public parameter) pairing computation to encrypt a single message for n receivers, in contrast to the simple construction that re-encrypts a message n times using Boneh and Franklin’s identity-based encryption scheme, considered previously in the literature. We extend our scheme to give adaptive chosen ciphertext security. We support both schemes with security proofs under precisely defined formal security model. Finally, we discuss how our scheme can lead to a highly efficient public key broadcast encryption scheme …
Effects Of Polyethylene Bags, Ethylene Absorbent And 1-Methylcyclopropene On The Storage Of Japanese Pears, M. J. Szczerbanik, K. J. Scott, J. E. Paton, D J. Best
Effects Of Polyethylene Bags, Ethylene Absorbent And 1-Methylcyclopropene On The Storage Of Japanese Pears, M. J. Szczerbanik, K. J. Scott, J. E. Paton, D J. Best
Faculty of Informatics - Papers (Archive)
Storage of the ‘Nijisseiki’ cultivar of Japanese pears was studied over three seasons for periods up to 36 weeks at 0°C. Storage in 50 pm thick low-density polyethylene (LDPE) bags at 0°C considerably delayed yellowing in all experiments, even after fruit was removed to 20°C for 1 week at the end of storage. The addition of an ethylene absorbent made from potassium permanganate on aluminium oxide (Purafil II) further delayed yellowing. Carbon dioxide levels in both treatments varied, but were generally in the range 2-3%. Oxygen levels remained high, generally 16-19%. In bags without Purafil, ethylene levels rose slightly during …
Satellite Dvb Multicast For Remote Desert Community Messaging, A. Eyers, Mehran Abolhasan
Satellite Dvb Multicast For Remote Desert Community Messaging, A. Eyers, Mehran Abolhasan
Faculty of Informatics - Papers (Archive)
A key issue for remote Australian desert community viability is providing services such as health and education, particularly given the limited telecommunications infrastructure. To help address this issue, we examine how satellite Digital Video Broadcast (DVB) TV can support new telecommunications services for these communities. In particular, we consider options for the DVB based multicast which underpins these services. We show that existing DVB and MHP capabilities can provide the required multicast support.
Continued Fractions And The Gauss Map, Bruce Bates, Martin Bunder, Keith Tognetti
Continued Fractions And The Gauss Map, Bruce Bates, Martin Bunder, Keith Tognetti
Faculty of Informatics - Papers (Archive)
We discovered properties of the Gauss Map and its iterates using continued fractions. In particular, we find all points and show that the graph of an iterate over [0, 1/2] is symmetric to the graph of the next higher iterate over [1/2,1].
Conceptual Modelling Of Computations On Data Streams, Anita Dani, Janusz Getta
Conceptual Modelling Of Computations On Data Streams, Anita Dani, Janusz Getta
Faculty of Informatics - Papers (Archive)
This paper proposes a new symbolic language for the conceptual modelling of computations on data streams. We consider a class of algorithms related to the evaluation of mathematical operators on data streams. A vector model is defined to represent the sliding windows. A graph abstraction is used to model the algorithms. The notation is general enough to be used for visualisation and optimisation of a wide class of data stream processing applications.
Stereophonic Acoustic Echo Cancellation, Fenglu Ge, Prashan Premaratne, Jiangtao Xi
Stereophonic Acoustic Echo Cancellation, Fenglu Ge, Prashan Premaratne, Jiangtao Xi
Faculty of Informatics - Papers (Archive)
This paper presents a new approach for Stereophonic acoustic echo cancellation (SAEC), based on a combination of J-H network and the natural gradient algorithm. In the new approach for SAEC, Computer simulations show that echoes are significantly reduced.
Dealing With Web Service Qos Factors Using Constraint Hierarchy, Y. Guan, Aditya K. Ghose
Dealing With Web Service Qos Factors Using Constraint Hierarchy, Y. Guan, Aditya K. Ghose
Faculty of Informatics - Papers (Archive)
Functionality and non-functional properties are two critical factors in web service technology, but non-functional properties (quality factors) are often ignored. Usually, these are articulated as statements of objectives, as opposed to prepositional assertions. A key challenge in dealing with objectives is that there is no obvious means to decide when they are satisfied. In effect, these objectives are never fu lly satisfied, but satisficed to varying degrees. Alternative design decisions need to trade-off varying degrees of satisfaction of potentially mutually contradictory non-functional requirements. In some circumstances, non-Junctional properties are crucial; they do affect the design decision. Upon a request, there …
Loosely-Coupled Consistency Between Agent-Oriented Conceptual Models And Z Specifications, Aneesh Krishna, Aditya K. Ghose, Sergiy A. Viklomir
Loosely-Coupled Consistency Between Agent-Oriented Conceptual Models And Z Specifications, Aneesh Krishna, Aditya K. Ghose, Sergiy A. Viklomir
Faculty of Informatics - Papers (Archive)
Agent-oriented conceptual modelling (AOCM) is a relatively new technique that offers significant benefits in the modelling and development of complex computer systems. It is highly effective in answering questions such that what are the main goals of the system, how key actors depend on each other, and what alternatives exist. A formal method can benefit any stage of the software development lifecycle and improves the quality of the computer systems. The paper defines an approach that allows to complement requirements modelling notations with formal specifications, while preserving the consistency between them.
The Experimental Evaluation Of Fbg Sensor For Strain Measurement Of Prestressed Steel Strand, Enbang Li, Jiangtao Xi, Joe F. Chicharo, Tiegen Liu, Xin Li, Junfeng Jiang, Lina Li, Yunxin Wang
The Experimental Evaluation Of Fbg Sensor For Strain Measurement Of Prestressed Steel Strand, Enbang Li, Jiangtao Xi, Joe F. Chicharo, Tiegen Liu, Xin Li, Junfeng Jiang, Lina Li, Yunxin Wang
Faculty of Informatics - Papers (Archive)
Multi-wire steel strands have been widely used in various prestressed concrete structures. In this study, experimental evaluation of fiber Bragg grating (FBG) sensors for strain measurements in a seven-wire prestressed steel strand has been carried out. An installation technique of FBG sensors has been developed to fulfill the special requirements of the prestressed steel strand. The experiment results show that fiber Bragg gratings can represent the overall stress of the prestressed steel strand without being affected by the specific structure of the strand when it is only fixed on one wire. It is also demonstrated that the maximum strain that …
Novel Color Processing Architecture For Digital Cameras With Cmos Image Sensors, Chaminda Weerasinghe, Wanqing Li, Igor Kharitonenko, Magnus Nilsson, Sue Twelves
Novel Color Processing Architecture For Digital Cameras With Cmos Image Sensors, Chaminda Weerasinghe, Wanqing Li, Igor Kharitonenko, Magnus Nilsson, Sue Twelves
Faculty of Informatics - Papers (Archive)
This paper presents a color processing architecture for digital color cameras utilizing complementary metal oxide semiconductor (CMOS) image sensors. The proposed architecture gives due consideration to the peculiar aspects of CMOS image sensors and the human visual perception related to the particular application of digital color photography. A main difference between the proposed method arid the conventional systems is the fact that color correction module is located before the interpolation module. Therefore, a method of performing color correction on a color filter array (CFA) pattern is also provided in this paper. The interpolation algorithm is especially designed to solve the …
Efficient Broadcast From Trapdoor Functions, Yi Mu, Willy Susilo, Xinyi Huang
Efficient Broadcast From Trapdoor Functions, Yi Mu, Willy Susilo, Xinyi Huang
Faculty of Informatics - Papers (Archive)
We present a novel scheme of broadcast encryption that is suitable for broadcast servers such as pay TV services. The important feature of our scheme is that the length of a broadcast string in our scheme is independent of the number of receivers in the system; hence it is suitable for large groups. Our scheme is based on a trapdoor encryption technique under the RSA assumption. We also describe a variant of our scheme which provides stronger security.
Reducing Security Overhead For Mobile Networks, Fangguo Zhang, Yi Mu, Willy Susilo
Reducing Security Overhead For Mobile Networks, Fangguo Zhang, Yi Mu, Willy Susilo
Faculty of Informatics - Papers (Archive)
Security of mobile communications comes with the cost of computational overhead. Reducing the overhead in security computations is critical to ensure the overall performance of a mobile network. In this paper, we present the notion of online/offline signcryption, where most of computations are carried out offline and the online part of our scheme does not require any exponent computations and therefore is very efficient. Our scheme allows any third party to verify the encryption without compromising confidentiality. We also show that our scheme is secure against existential forgery under chosen message attacks and adaptively chosen ciphertext attacks under the notion …
An Id-Based Access Control Scheme For Mospf, Junqi Zhang, Vijay Varadharajan, Yi Mu
An Id-Based Access Control Scheme For Mospf, Junqi Zhang, Vijay Varadharajan, Yi Mu
Faculty of Informatics - Papers (Archive)
Multicast Open Shortest Path First (MOSPF) is an enhancement to unicast routing protocol OSPF. It has been widely used in many multicast applications for years. However, its security is still a major concern in some applications. Much work has been done on data protection, but only a few works have been done on member access control mechanisms. In this paper, we present a new secure multicast architecture and protocol for MOSPF from the perspective of member access control. Our new model includes a variant of previous access control mechanism and a novel ID-based distributed encryption scheme. This architecture in particular …
A Neural Network With Localized Receptive Fields For Visual Pattern Classification, Son Lam Phung, Abdesselam Bouzerdoum
A Neural Network With Localized Receptive Fields For Visual Pattern Classification, Son Lam Phung, Abdesselam Bouzerdoum
Faculty of Informatics - Papers (Archive)
We introduce a new neural network for 2D pattern classification. The new neural network, termed as localized receptive field neural network (RFNet), consists of a receptive field layer for 2D feature extraction, followed by one or more 1D feedforward layers for feature classification. All synaptic weights and biases in the network are automatically determined through supervised training. In this paper, we derive five different training methods for the RFNet, namely gradient descent, gradient descent with momentum, resilient backpropagation, Polak-Ribiere conjugate gradient, and Levenberg-Marquadrt algorithm. We apply the RFNet to classify face and nonface patterns, and study the performances of the …
Scene Analysis For Autonomous System Control, David Ngan Luu, David A. Stirling
Scene Analysis For Autonomous System Control, David Ngan Luu, David A. Stirling
Faculty of Informatics - Papers (Archive)
The potential of autonomous airborne platforms have long been considered for applications in surveillance, exploration and search and rescue. For example, an autonomous blimp or airship, able to navigate through complex unstructured environments, could be used to survey the aftermath of dangerous earthquake zones, or be employed to provide unique replay angles in sporting events. Therefore autonomous airships fill an important gap in the spectrum of aerial observations, supplying images with better resolution and much more acquisition flexibility than those acquired through satellite or airplanes. This paper proposes to configure a semi-autonomous Unmanned Aerial Vehicle (UAV) for research into navigation …
Copyright Protection Scheme For Digital Television Content, Prashan Premaratne, Liyanage C. Desilva, Farzad Safaei
Copyright Protection Scheme For Digital Television Content, Prashan Premaratne, Liyanage C. Desilva, Farzad Safaei
Faculty of Informatics - Papers (Archive)
We have developed a copyright protection system aimed at empowering the content provider to dictate the terms for free-to-air digital TV recording. The system proposes embedding copyright instructions into MPEG2 content to be telecasted so that the complying set top boxes would not be able to bypass the terms such as expiry period of recording or prohibition of recording of any specific program. After the expiration of the program recording rights, as determined by the telecaster, any recorded program is deleted. The system also uses encryption to prevent content copying to external storage devices.
Implementation Of A Turbo Codes Test Bed In The Simulink Environment, Ibrahim S. Raad, Mehmet Yakan
Implementation Of A Turbo Codes Test Bed In The Simulink Environment, Ibrahim S. Raad, Mehmet Yakan
Faculty of Informatics - Papers (Archive)
This paper presents an implementation of turbo codes test bed developed in Matlab’s Simulink which will aid researchers in the field of turbo codes.It discusses the design, implementation and presents the validation results.
A Watermarking Scheme In Low Frequency Components Using 2d Barcodes, Prashan Premaratne, Ian Burnett, Liyanage C. De Silva
A Watermarking Scheme In Low Frequency Components Using 2d Barcodes, Prashan Premaratne, Ian Burnett, Liyanage C. De Silva
Faculty of Informatics - Papers (Archive)
A robust watermark should be able to withstand most image manipulations such as cropping, additive noise and JPEG type compressions. It should also be able to hold telltale signs of attacks that are unknown to the user. Both of these aims can be fulfilled by embedding two watermarks, one fragile and one robust in different domains where watermarks are not vulnerable to the aforementioned manipulations. It is a well known fact that watermarking of DC components of discrete cosine transform (DCT) stand against JPEG compression. We build on this concept by inserting a watermark in the transform domain to further …
Identity-Based Ring Signcryption Schemes: Cryptographic Primitives For Preserving Privacy And Authenticity In The Ubiquitous World, Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang
Identity-Based Ring Signcryption Schemes: Cryptographic Primitives For Preserving Privacy And Authenticity In The Ubiquitous World, Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang
Faculty of Informatics - Papers (Archive)
In this paper, we present a new concept called an identity based ring signcryption scheme (IDRSC,). We argue that this is an important cryptographic primitive that must be used to protect privacy and authenticity of a collection of users who are connected through an ad-hoc network, such as Bluetooth. We also present an efficient IDRSC scheme based on bilinear pairing. As a regular signcryption scheme, our scheme combines the functionality of signature and encryption schemes. However, the idea is to have an identity based system. In our scheme, a user can anonymously sign-crypts a message on behalf of the group. …
Handwritten Digit Recognition Based On Shunting Inhibitory Convolutional Neural Networks, Fok Hing Chi Tivive, Abdesselam Bouzerdoum
Handwritten Digit Recognition Based On Shunting Inhibitory Convolutional Neural Networks, Fok Hing Chi Tivive, Abdesselam Bouzerdoum
Faculty of Informatics - Papers (Archive)
This paper presents the application of a new class of convolutional neural networks based on the mechanism of shunting inhibition for handwritten digit recognition. With a three layer network architecture and the use of shunting inhibitory neurons as information processing elements, the network consists of 1926 trainable parameters which are adapted by a first-order gradient training algorithm derived from Rprop, Quickprop, and SuperSAB. Trained on a dataset of 10,000 samples and evaluated on the entire test set of the MNIST database, these networks achieve classification accuracies above 93% with the best performance obtained from those networks with partial connection schemes.
Privacy-Enhanced Internet Storage: Non-Interactive Publicly Verifiable 1-Out-Of-N Encryption Schemes, Willy Susilo, Fangguo Zhang, Yi Mu
Privacy-Enhanced Internet Storage: Non-Interactive Publicly Verifiable 1-Out-Of-N Encryption Schemes, Willy Susilo, Fangguo Zhang, Yi Mu
Faculty of Informatics - Papers (Archive)
One of the main important uses of Internet is its ability to connect people through the use of email or Internet storage. However, it is often desirable to limit the use of email or Internet storage due to organization's restriction, avoiding spams, etc. In particular, emails with multimedia contents will take up a lot of spaces. In this paper, we propose cryptographic schemes that can be used to stop unwanted messages to be stored in the Internet server. We refer this technique as privacy enhancement for Internet storage, since the Internet server will not learn any information directed to …
Using Simcts Framework To Model Determinants Of Customer Satisfaction: A Case In An Isp, Karthik Vilapakkam Nagarajan, Meena Chavan, Tamrad Woldu Tewoldeberhan, Peter James Vial, V. N. Srivalli
Using Simcts Framework To Model Determinants Of Customer Satisfaction: A Case In An Isp, Karthik Vilapakkam Nagarajan, Meena Chavan, Tamrad Woldu Tewoldeberhan, Peter James Vial, V. N. Srivalli
Faculty of Informatics - Papers (Archive)
In this paper we describe a call center simulation case study that uses real data obtained from an Internet Service Provider (ISP). The case study is conducted using SIMCTS (Simulation Modelling and Analysis of Customer Satisfaction Patterns for Telecommunication Service Providers) framework [25]. The applicability of this framework to model ISP business scenario is discussed in detail. The simulation case study reveal that the dimensions of service quality have huge impact on customer satisfaction and also provide valuable insight in to gap analysis of customer perception and expectation. Various key satisfaction variables in relation to call center are modelled using …
An Eye Feature Detector Based On Convolutional Neural Network, Fok Hing Chi Tivive, Abdesselam Bouzerdoum
An Eye Feature Detector Based On Convolutional Neural Network, Fok Hing Chi Tivive, Abdesselam Bouzerdoum
Faculty of Informatics - Papers (Archive)
One of the main problems when developing an eye detection and tracking system is to build a robust eye classifier that can detect the true eye patterns in complex scenes. This classi fication task is very challenging as the eye can appear in different locations with varying orientations and scales. Furthermore, the eye pattern varies intrinsically between ethnic groups, and with age and gender of a person. To cope better with these variations, we propose to use a bio-inspired convolutional neural network, based on the mechanism of shunting inhibition, for the detection of eye patterns in unconstrained environments. A learning …
An Ultra Wide Band Simulator Using Matlab/Simulink, Peter James Vial, Beata J. Wysocki, Tad Wysocki
An Ultra Wide Band Simulator Using Matlab/Simulink, Peter James Vial, Beata J. Wysocki, Tad Wysocki
Faculty of Informatics - Papers (Archive)
Ultra Wide Band (UWB) is a promising technology for sensor networks, broadband wireless data access and location finding applications. This study outlines the development and validation of a single transmitter and receiver system across the multipath channel proposed by Saleh-Valenzuela. We have designed and tested a UWB simulator using MATLAB’s Simulink in combination with the Real Time Workshop(RTW) Tool box for Simulink using the Fixed Step Discrete Solvers of RTW which is required to produce executable simulations on multiple computers (both Linux and Microsoft based devices). This paper outlines the basic design and modules chosen for the simulation and compares …
Smicts: A Simulation Based Approach To Understand And Manage Service Quality, Karthik Vilapakkam Nagarajan, Meena Chavan, Tamrad Woldu Tewoldeberhan, Peter James Vial, V. N. Srivalli
Smicts: A Simulation Based Approach To Understand And Manage Service Quality, Karthik Vilapakkam Nagarajan, Meena Chavan, Tamrad Woldu Tewoldeberhan, Peter James Vial, V. N. Srivalli
Faculty of Informatics - Papers (Archive)
In this paper a novel simulation framework SIMCTS (Simulation Modelling and Analysis of Customer Satisfaction Patterns for Telecommunication Service Providers) for ISP business process modelling is described. It is shown that simulation technology can tackle a wide range of operational challenges in telecommunication service industry. The lack of very specific building blocks for functional service quality simulation has made the development SIMCTS simulation framework an absolute necessity. The paper introduces service quality framework that could transform a conceptual service quality model in to computer simulation model using the available service quality data in a fast and a effective way. The …
Novel Two-Dimension Fbg Sensor Based On Rectangle Cantiliver Beam For Simultaneous Measurement Of Force And Temperature, Weigang Zhang, Guiyan Kai, Shuzhong Yuan, Xiaoyi Dong, Enbang Li, Jiangtao Xi, Joe F. Chicharo
Novel Two-Dimension Fbg Sensor Based On Rectangle Cantiliver Beam For Simultaneous Measurement Of Force And Temperature, Weigang Zhang, Guiyan Kai, Shuzhong Yuan, Xiaoyi Dong, Enbang Li, Jiangtao Xi, Joe F. Chicharo
Faculty of Informatics - Papers (Archive)
In this paper, for the first time to our knowledge, we report a novel FBG-type two-dimensional sensor that is able to simultaneously measure two-dimension (2-D) force and temperature, and the 2-D force sensing process can be tuned by applying rectangular cantilever beam (RCB). In the vertical directions of the RCB axis, the wavelengths shifts of two FBGs bonded to the surface of the RCB are quasi-linear with respect to the 2-D force and temperature, respectively. Two FBGs are experimentally demonstrated to have the 2-D force sensitivities of ~5.32 nm/N and 3.21 nm/N, a temperature sensitivity of ~0.095nm/°C between 0°C and …
Measuring The Linewidth Enhancement Factor Of Semiconductor Lasers Based On Weak Optical Feedback Effect, Yanguang Yu, Jiangtao Xi, Enbang Li, Joe F. Chicharo
Measuring The Linewidth Enhancement Factor Of Semiconductor Lasers Based On Weak Optical Feedback Effect, Yanguang Yu, Jiangtao Xi, Enbang Li, Joe F. Chicharo
Faculty of Informatics - Papers (Archive)
Semiconductor lasers are very different from other lasers because refraction variation can't be avoided when the gain is changed. Refraction variation can be introduced the theory of semiconductor laser by a dimensional parameter. This parameter is called linewidth enhancement factor (LEF). The value of LEF is very important for many aspects of laser behavior. The LEF characterizes the linewidth broadening and chirp due to fluctuation in the carrier density. A simple method to measure the linewidth enhancement factor of laser diodes is presented in this paper. The method uses the self-mixing effect at a weak feedback level. An optical beam …
Definition Of An Object-Oriented Modeling Language For Enterprise Architecture, Lam-Son Le, Alain Wegmann
Definition Of An Object-Oriented Modeling Language For Enterprise Architecture, Lam-Son Le, Alain Wegmann
Faculty of Informatics - Papers (Archive)
In enterprise architecture, the goal is to integrate business resources and IT resources in order to improve an enterprise's competitiveness. In an enterprise architecture project, the development team usually constructs a model that represents the enterprise: the enterprise model. In this paper, we present a modeling language for building such enterprise models. Our enterprise models are hierarchical object-oriented representations of the enterprises. This paper presents the foundations of our language (i.e. the Living System Theory and the RM-ODP standard), the definition of the language and ends by presenting an example of an enterprise model developed with our web-based CAD tool.
Multi-Attribute Decision Making Approach For Strategic Planning Of Dgs, Ashish Agalgaonkar, S. V. Kulkarni, S. A. Khaparde
Multi-Attribute Decision Making Approach For Strategic Planning Of Dgs, Ashish Agalgaonkar, S. V. Kulkarni, S. A. Khaparde
Faculty of Informatics - Papers (Archive)
The distributed energy sources technology has progressed from isolated operation to hybrid and now to microgrid operation. The planning strategies initially considered cost-benefit analysis of distributed generation (DG). Later supporting advantages of the hybrid system including improvement of the efficiency were also considered for decision making. With increased complexities in DGs planning options along with multiple attributes to be accounted, more sophisticated techniques are needed to arrive at the correct decisions by decision makers. The analytical hierarchy process (AHP) is proposed to identify the relative significance of the chosen attributes. Proper integration of different attributes can be achieved by linear …