Professional Documents
Culture Documents
TURBINE SPEED
Abstract: It is known that PID controller is employed in every facet of industrial automation.
The application of PID controller span from small industry to high technology industry. In this
paper, it is proposed that the controller be tuned using Adaptive fuzzy controller. Adaptive fuzzy
controller is a stochastic global search method that emulates the process of natural evolution.
Adaptive fuzzy controller have been shown to be capable of locating high performance areas in
complex domains without experiencing the difficulties associated with high dimensionality or
false optima as may occur with gradient decent techniques. Using Fuzzy controller to perform
the tuning of the controller will result in the optimum controller being evaluated for the system
every time. For this study, the model selected is of turbine speed control system. The reason for
this is that this model is often encountered in refineries in a form of steam turbine that uses
hydraulic governor to control the speed of the turbine. The PID controller of the model will be
designed using the classical method and the results analyzed. The same model will be redesigned
using the AFC method. The results of both designs will be compared, analyzed and conclusion
will be drawn out of the simulation made.
PID
ControllerFeedback
Figure 3: Illustration of Sustained Oscillation Figure 5: Illustrated Closed Loop Transfer Function
Figure 8: Improved System. Figure 9 (a) & (b): Optimization of Steepest Descent
Gradient Method & Error Signal
6 IMPLEMENTATION OF ADAPTIVE
FUZZY CONTROLLER ON EXPERIMENT
CASE STUDY
• Fuzzy allocation matrix (FAM) or Rule base as in 6.2 Fuzzy Supervisory Controller
Table1.
In this method I try to design a supervisor fuzzy
Table 1: FAM Normalized Fuzzy Controller controller to change the scale factors online design
of the supervisor can be constructed by two
e methods:
NB NM Z PM PB a) Learning method
e
b) Experience of the system and main
NB PB PB PM Z Z requirements must be achieved.
NM PM PB PM Z Z In this paper, the supervisor controller is built
according to the accumulative knowledge of the
Z PM PM Z NM NM previous tuning methods.
PM Z Z NM NB NB
The supervisor fuzzy controller has the following
parameters:
PB Z NM NB NB NB • The universe of discourse of input and output is
selected according to the maximum allowable range
and that is depend on process requirements
• Fuzzy inference system is mundani.
• The number of membership functions for input
• Fuzzy inference methods are “min” for AND,
variables is 3 triangle membership functions denoted
“max”for OR, “min” for fuzzy implication, “max”
as N (negative), Z (zero) and P (positive). For output
for fuzzy aggregation (composition), and “centroid”
variable is 2 membership functions denoted as L
for Defuzzification.
(low) and H (High) as shown in Fig, 12.
Adjusting the gains according to the simulation
results, the system responses for different
input/output gains are shown in Fig. 11.
L H
6 10
c) Output Scale Factor
9 CONCLUSION
ABSTRACT
Providing visually-impaired users with ubiquitous access to mathematical
expressions is a challenge. Our investigation indicates that most, if not all, of the
current state-of-the art systems and solutions for presentation of mathematical
expressions to visually-impaired users are generally not pervasive, that they do not
take into account the user’s interaction context (i.e. combined contexts of the user,
his environment and his computing system) into their system’s configuration and
that they present mathematical expressions in only one format. We address these
weaknesses by providing a middleware that provides a ubiquitous access to
mathematical expressions. Our middleware gathers various suppliers in which one
supplier is selected based on its suitability to the given instance of interaction
context and of the user’s preferences. The configuration of the chosen supplier,
including its quality of service (QoS) dimensions, is also adaptive to the user’s
preferences. This paper discusses the challenges in designing this middleware and
presents a proposed solution to each of these challenges. This paper discusses the
concepts and principles applied on the middleware design as well as their
validation through case studies and formal specification. This work is intended to
contribute on the ongoing research to make informatics accessible to handicapped
users, specifically providing them ubiquitous access to mathematical expressions.
max l
EC l = ⊗ ICParam (3)
y =1 ly
Figure 5: The relation between pre-condition sce-
narios and the post-condition scenarios using su- max m
pervised learning. SC m = ⊗ ICParam (4)
z =1 mz
As shown in the diagram, Xi = an element of X,
and i ∈ 1 ... n, and Yj = a element of Y, and j ∈ 1 ... The first knowledge the ML component must
m. When a new pre-condition Xnew occurs, the learn is to relate the interaction context to an appro-
learning system finds the best possible output value priate modality. In general, a modality is possible if
Ybest using hypothesis. In general, the learner com- there exists at least one modality for data input and
pares the results of hypothesis functions h(f(Xnew) at least one modality for data output. Given a mo-
= Y1), h(f(Xnew) = Y2), … , h(f(Xnew) = Ym) and dality set M = {Vin, Tin, Vout, Tout} wherein Vin = vocal
selects one that yields the best score. The new case input, Vout = vocal output, Tin = tactile input and
is the newly-acquired knowledge which is later on Tout = tactile output then modality is possible under
added to the knowledge repository. This learning the following condition:
process is called incremental machine learning.
Modality Possible = (Vin ∨ Tin ) ∧ (Vout ∨ Tout ) (5)
( )
h f (ICi ) → M j = < suitability_score > (7) Given that the denominator does not depend on
parameter j, then the above equation becomes:
In Mathematics, function h can be written as:
n
h best = M̂ = arg max P(M j ) ∏ P(A i | M j ) (14)
h = P(M j/ICi ) (8)
j i =1
which should be read as the probability of the oc- where P(Mj) = the frequency of Mj in SR ÷ cardi-
currence of Mj given ICi. To simplify calculation, nality of (SR).
Bayes Theorem [29], given below, can be adopted:
5.3 Finding Optimal Modalities for
P(ICi /M j ) × P(M j ) Interaction Context
P(M j/ICi ) = (9) Given that M = {Vin, Tin, Vout, Tout}, then the
P(ICi )
power set (i.e. the set of all subsets) of M is given
by P(M) = {{Vin}, {Tin}, {Vout}, {Tout}, {Vin, Tin}, {Vin,
The implementation of Bayes Theorem leads to
Vout}, {Vin, Tout}, {Vin, Tin, Vout}, {Vin, Tin, Tout}, {Vin, Vout,
the Naive Bayes algorithm [26]. The Naive Bayes
Tout}, {Vin, Tin, Vout, Tout}, {Tin, Vout}, {Tin, Tout}, {Tin, Vout,
algorithm is a classification algorithm that assumes
Tout}, {Vout, Tout}, {}}. Mj, therefore, evaluates the suit-
that ICi attributes A1,…,An are all conditionally in-
dependent of one another given a post condition Mj. ability score of each element of P(M). M̂ = hbest is
The representation of P(ICi|Mj) becomes: then chosen from one of these elements. The se-
lected element is one that satisfies Eq. (14) and one
n with the highest suitability score.
P(ICi | M j ) = ∏ P(Ai | M j ) (10)
i =1 5.4 Realizing User Task Using Optimal
Modalities and Supporting Media Devices
Here, our goal is to train a classifier that, given Given that an optimal modality has just been
a new ICi to classify, will provide the probability selected based on the given instance of interaction
distribution over all possible values of M (i.e. M1, context, the next step is to find the media devices
M2, …, Mm). Given that ICi = (A1, A2, ...,An ), then that will support the chosen modality. To do so, let
Eq. (9) becomes: there be a function f1 that maps a specific modality
to its appropriate media device(s) as given by
P(M j )P(A1...An | M j ) (11) f1: Modality Media, Priority. See Figure 6.
P(M j | A1...An ) =
m
∑ P(Mk )P(A1...An | M k )
k =1
User Satisfaction
User Satisfaction
0,6 0,6
User Satisfaction
0,4
0,6
Jasvir Singh
Department of Electronics Technology, Guru Nanak Dev University, Punjab, India
j_singh00@rediffmail.com
ABSTRACT
Present paper deals with the simulation and implementation of two functional units,
parse-to-shaping-frame and differential encoder, for spectral shaping in 56Kbps
digital modem transmitter. The idea behind spectral shaping is to adapt the shape
of the transmitted signal, to conform to the shape or spectral limitations of the
channel, without changing the basic pulse shape or peak-to-average-ratio. This unit
suppresses the signal component close to dc to minimize the effect of ac couplings
or to provide sufficient data transitions for reliable clock recovery. A combined
algorithm for implementation of the parse-to-shaping-frame and differential
encoder functions utilized in transmitter of 56Kbps digital modem has been
presented. An algorithm to perform parse-to-shaping-frame and differential
encoding functions has been developed during present study. Proposed algorithm
has been simulated and implemented on the Digital Signal Processor. Practical
results obtained have been found almost similar to the theoretical and simulated
results.
Keywords: Spectral Shaping, 56Kbps Modem, Differential Encoder, Digital Signal Processor.
48Kbps To
PSTN Linear to µ
DAC or A Law LPF
Convertor
Figure 1: Block diagram of 56Kbps modem
communication system
Figure 2: Transmitter of 56Kbps digital
modem (server side)
2 DISCRIPTION OF 56Kbps DIGITAL
MODEM TRANSMITTER During startup, the following encoder parameters are
established:
Transmitter of V.90/V.92 56Kbps digital modem
is shown in the Fig. 2. First unit is scrambler whose Ci equals the positive constellation points for
purpose is to facilitate effective transmission of the data frame interval i .
data over the telephone channel and to improve the Mi is the number of code points in each
convergence of the adaptive equalization and echo constellation C i .
cancellation in the receiver. It helps the receiver to K is the number of modulus encoder input data
recover the timing information from the received bits per data frame.
data to facilitate synchronous operation. The Sr is the number of PCM code sign bits per data
downstream encoder in Draft Recommendation frame used as redundancy for spectral shaping.
V.90/V.92 uses multiple modulus conversion for S is the number of differential encoder input
mapping scheme and convolutional spectral shaping data bits per data frame, where S + Sr = 6.
as its spectral shaping scheme. The block diagram in
Fig. 3 shows an overview of the downstream encoder The positive constellations (Ci ) to be used in
and represents one data frame. Data frames in the each data frame interval are specified by the analog
digital modem have a six-symbol structure (since the modem during training procedures. The signaling
robbed-bit signaling pattern repeats every six rate is determined by the selection of the parameters
symbols).
Mi Ci
Sign
Assign MUX
Ui PCMi
b0: bk-1 Modulus Ki Data Unit
Encoder Mapper
Bit Parser
$0:$5
Serial PCM Octets
d0: dD-1 Ui
Spectral
Parse To tj (n) Shaper
S0: Ss-1 Pj
Shaping Differential
Frame Encoder
Sr
ACKNOWLEDGEMENTS
Program for parse - to - shaping - frame and
differential encoder to perform spectral shaping has
been loaded into the DSP Module for its practical One of the authors Davinder Pal Sharma is
implementation using communication software thankful to Guru Nanak Dev University, Amritsar,
program XTALK provided by VI Microsystems Pvt. for providing Research facilities at Department of
Ltd. Same inputs and initialization parameters as Electronics Technology for the present research
used during simulation have been taken again here work.
and it has been observed that practical results are in
accordance with the simulated or theoretically
predicted results which confirms the successfulness 10 REFERENCES
of the present study. Various implementation
parameters regarding present implementation of
parse to shaping frame and differential encoding [1] A. A. Gokhale: Introduction to Telecomm-
functions to perform spectral shaping in the unication, Thomson Asia Pvt. Ltd. (2001).
transmitter of 56Kbps digital modem have been
given in Table 2. [2] D. E. A. Clarke et. al: Emerging Broadband
Figure 9: Simulator status after execution of spectral shaping program for Sr=3
Start
NO
YES YES
Sr = 0 Sr = 1
YES
Sr = 2
Loop D
Store the encoded bits at dma Store the encoded bits at dma
'Pnji' and 'Pnjp1i' Store the encoded bits at dma 'Pnji' ,
'Pnji'
corresponding to data frames 'Pnjp1i' and 'Pnjp2i' corresponding to
j and j+1 data frames j , j+1 and j+2
STOP
STOP STOP
(a) Subroutine to perform spectral (b) Subroutine to perform (c) Subroutine to perform spectral shaping
shaping corresponding to Sr=1 and S=5 spectral shaping corresponding to corresponding to Sr=3 and S=3
Sr=2 and S=4
ABSTRACT
A Mobile Ad Hoc network (MANET) is a collection of digital data terminals that can
communicate with one another without any fixed networking infrastructure. Since the
nodes in a MANET are mobile, the routing and power management become critical
issues. Wireless communication has the advantage of allowing untethered communication,
which implies reliance on portable power sources such as batteries. However, due to the
slow advancement in battery technology, battery power continues to be a constrained
resource and so power management in wireless networks remains to be an important
issue. Though many proactive and reactive routing protocols exist for MANETs the
reactive Dynamic Source Routing (DSR) Protocol is considered to be an efficient
protocol. But, when the network size is increased, it is observed that in DSR overhead
and power consumption of the nodes in the network increase, which in turn drastically
reduce the efficiency of the protocol. In order to overcome these effects, in this paper it is
proposed to implement overhead reduction and efficient energy management for DSR in
mobile Ad Hoc networks.
Step4: Source address, destination address and previous Step4: The transmitted power is determined using the
node addresses are stored during route reply. following formula,
Step5: The data packet contains only source & destination Transmitted Power = (a x d4) +c (1)
addresses in its header.
Where‘d’ is the distance between two adjacent nodes
Step6: When the data packet travels from source to ‘a’ and ‘c’ are arbitrary constants
destination, through intermediate nodes, for re-broadcasting
of data packet, the node verifies source and destination a=Pr*k (2)
addresses in its cache. If it is present, the data packets are
forwarded, otherwise it is rejected. Pr=Minimum Received power=-91dbm
. k =8 then find c
a = 6.48 x 10-11 and c = 30 x 10-3 W
4.SIMULATION RESULTS
Figure.11 Number of Control Packets vs. No. Of nodes foa Figure.14 Delay Vs. No. Of nodes for a pause
pause time of 600 s time of 900 s
Figure.12 Number of Control Packets vs. No. Of nodes for a Figure.15 Delay Vs. No. Of nodes for a pause time
pause time of 300 s of 600 s
5. CONCLUSIONS
6. REFERENCES
[1] Charles E. Perkins, “Mobile Ad-Hoc
Networks,” Addison-Wesley, 2000.
[2] David B. Johnson, David A. Maltz and
Yih-Chun Hu, “The Dynamic Source
Routing Protocol for Mobile Ad Hoc
Networks (DSR),” Internet Draft, draft-
ietf-manet-dsr-09.txt,15April2004.
URL:http://www.ietf.org/internetdraft/draf
t-ietf-manet-dsr-09.txt
Figure.22 Number Of Control packets For Energy Efficient [3] Rong Zheng and Robin Kravats, “On-
MDSR compared to DSR demand Power Management for Ad-hoc
Networks,” Journal of Ad Hoc networks,
vol.3, pg: 51-68, ELSEVIER, 2005.
[4] Sheetalkumar Doshi and Timothy X
Brown, “Design Considerations for an On-
demand Minimum Energy Routing
Protocol for Wireless Ad Hoc Network,”
Mobile Computing and Communication
Review, Vol.6, No.2, July 2002.
[5] Jorge Nuevo, “A Comprehensible
GloMoSim Tutorial” September 2003.
[6] Qun Li, Javed Aslam and Daniela Rus,
“Distributed Energy-Conserving Routing
Protocols,” Proceedings of 36th HICSS
Figure.23 Comparison Of Delay for Energy Efficient
MDSR,MDSR and Existing DSR 2003.
ABSTRACT
Ad hoc wireless networks are a very potential field offering lot of scope for research.
In these networks, the Medium Access Control (MAC) protocols are responsible for
coordinating the access from active nodes. These protocols assume greater
significance since the wireless communication channel is inherently prone to such
problems as hidden terminal, exposed terminal and fading effects .The scheme
proposed here is used to perform priority scheduling in nodes resolving any
contention scenario that can arise for the channel in the best possible manner. Alert
transmission packets are used as a means of notification whenever a high priority
node wants to transmit data. Suspend transmission packets are used to avoid priority
reversal issue and a retry count is implemented to avoid starvation among the nodes.
The rest of this paper is organized as follows. Different flows in multi-hop networks have different
Section 2 presents the related work. The proposed degree of contention. Here, the contention degree for
Priority Scheduling scheme with a Suspend a flow is defined as the number of flows with which
Transmission mechanism is explained in Section 3. it is competing for the channel. Two types of MAC
Simulation results are given in section 4. schemes are prominently used. Reservation and
contention based schemes. Reservation based
2 RELATED WORK schemes usually make some assumptions about high
priority traffic. Flow scheduling is done locally
2.1 Classic CSMA problems while contention resolving probabilistically. Black-
In fig 1 Node B is within the range of A and C burst dealt in [8] is a typical example where a high
but nodes A and C are not visible to each other Let priority node transmits this black-burst signal as a
us consider the case where A is transmitting to B. notification for its transmission. Reference [9]
Node C, unaware of the transmission at B can generalizes this for wireless ad-hoc network. That is
UbiCC Journal
transmit data -toVolume 3
B thus causing collision at B. This is each station can sense the transmission of the other42
referred to as the hidden-terminal problem, as nodes nodes in the network. Reference [6] explains a
dynamic priority scheduling with a CAN MAC low priority packets that hear either BT1 or BT2 will
protocol. defer their transmissions for some duration. In this
way, channel access priority of a high priority node
2.2 IEEE MAC 802.11 DCF can be ensured. Certainly, if there is no high priority
The 802.11 DCF function [5] is subjected to packet backlogged at a high priority node, a low
several research modifications, which is giving a priority node will not receive any busy tone.
back-off counter to each node such a way that every
node can choose a random number between 0 to 3 PROPOSED SCHEME
maximum contention window size. After sensing the
channel to be idle for an inter-frame space the nodes In this scheme priority scheduling in wireless
start counting their back-off counters to zero, and if ad-hoc networks, using alert transmission
the channel is found to be busy they freeze the back- mechanism is implemented. This way contention for
off counters. The value of Contention Window is channel access between nodes is resolved. This is
constrained to be between CWmin and CWmax. A also seen to eliminate the hidden terminal and
source station sends an RTS for which it receives exposed terminal problems occurring frequently in
back CTS following which it transmits data and gets ad-hoc networks. Individual nodes are assigned
an ACK packet back. In the event of CTS or ACK priority ‘Low and High’ based on the back off
not received the source is led to believe that collision counter value. It is computed using the formula
has occurred, so it is imperative that there is shown in Eq. (1)
adequate waiting time for the source before it arrives
at some decision. There are two waiting stages in Back Off = (1%cw)*priority*slot time …..(1)
DIFS+
AT1 SIFS DATA
WAIT
Node 1
t1 (bc=10) t2(bc=0) DIFS+
SIFS
ST AT1 WAIT DATA
Node 4
t3 t4 t5(bc=9)t6(bc=2) t7 t9(bc=0)
AT1 DIFS +
Node 3 SIFS WAIT
Node 5
t1 (bc=18) t2(bc=8) t5(bc=8) t6(bc=1)
used.
2000
1500 5 NODES
10 NODES
15 NODES
1000
120
500 100
THRO UG HP UT
0 80
0 20 40 60 80 100
60
Number of nodes
40
0.2
REFERENCES
0
0 20 40 60 80 100
[1] Andrew Muir, J.J. Garcia Luna Aceves, “An
Number of Nodes
Efficient Packet Sensing MAC protocol for Wireless
Networks”, 1998
[2] Chunhung Richard Lin and Mario Gerla, “Real-
Figure 9: Comparison of delivery Ratio of High time support in multihop wireless networks. Wireless
Priority Packets between the proposed Alert Networks”, 1999
Transmission scheme and the IEEE MAC 802.11 [3] Wei Liu, Yuguang Fang, “Courtesy
Piggybacking, “Supporting Differentiated Services
Figure 10 shows the throughput as a function of in Multi-Hop Mobile Ad Hoc Networks”, April 2004
delay in the arrival rate of packets, the number of [4] Xue Yang, Nitin H. Vaidya, “Priority Scheduling
nodes used here are 20, 40 and 60, 80, 100 and it is in Ad Hoc Networks“, July 2006 (ACM)
UbiCC Journal - Volume 3 46
[5] Sunil Kumar, Vineet Raghavan, Jing Deng, [9] J.L.Sobrinho and A.S.Krishnakumar. Quality-of-
“Medium Access control Protocols for ad hoc Service in Ad Hoc Carrier Sense Multiple Access
wireless networks” A survey”, June 2004 Wireless Networks. IEEE Journal on Selected Areas
[6] Oleko Odongo, “Dynamic Priority Scheduling in Communications, 17(8), August 1999.
with Can MAC protocol”, December 2006 [10] Tracy Camp, Jeff Boleng and Vanessa Davies.”
[7] Yu Wang, Brahim Bensaou, “Priority Based A Survey of Mobility Models Ad Hoc Network
Multiple Access for Service Differentiation in Research”, 10 September 2002
MANETS”, July 2005
[8] J.L.Sobrinho and A.S.Krishnakumar, “Real-time
traffic over the IEEE 802.11 medium access control
layer, Bell Labs Technical Journal, pages 172187,
Autumn 1996.
S Verma
IIIT, India
sverma@iiita.ac.in
ABSTRACT
Block matching technique is the most significant tool in motion estimation and
compensation in video compression. Block matching is either fixed size block
matching (FSBM) techniques or variable size block matching (VSBM). Rate
distortion optimization problem is related with it. The R-D optimization, NP hard
problem, is solved using Lagrange’s parameter to find a constrained path, where a
given PSNR (distortion) and bit rate is achieved. In this paper, we modify and
study the A*Prune algorithm used in QoS routing in network ,to solve the R-D
optimization problem of video compression .we cast the R-D optimization problem
as KMCSP (K multiple constrained shortest path problem). The modification
presented in this paper is applied to DVF and DFD both and are constrained
simultaneously to find any optional number of constrained shortest paths.
.
Keywords: A* PRUNE,VIDEO COMPRESSION,QUAD TREE
Figure2: Quad tree structure for five calculated Figure 1: comparison of total bits for encoding
shortest path for frame 2
5. CONCLUSION:
6. REFERENCE
Mikael Soini, Jussi Nummela, Petri Oksa, Leena Ukkonen and Lauri Sydänheimo
Tampere University of Technology, Department of Electronics, Rauma Research Unit
mikael.soini@tut.fi
ABSTRACT
In Wearable Well-Being project PUHVI, HipGuard system for patients recovering
from hip surgery was developed. Novel wireless sensors having 3-axis acceleration
and 3-axis magnetic sensors are used to measure patient’s hip and leg position and
rotation. Furthermore, capacitive insole sensors are used to measure the force
between foot and a shoe. This paper concentrates on how these sensors can be
interconnected to a central unit that collects and analyzes the measured information.
Body Area Network (BAN) utilized in wearable healtcare application have several
application-specific challenges such as low-power operation, low latency data
transfer, high system reliability and autonomous network operation. This paper
thoroughly analyzes how ANT wireless sensor networking technology operates as
BAN – the focus is mainly on energy efficiency, communication latency, network
size and reliability issues. Because the main focus of this paper is particularly in
the operability of ANT networking, these results can be directly utilized in many
other wireless sensor networking applications.
1 INTRODUCTION
Sensors can be interconnected to Central Unit As presented in Table 1, ANT protocol has three
either with or without wires. Both of these different message types: Acknowledged, Broadcast
approaches have their pros and cons. Regardless of and Burst. Acknowledged message requires
chosen method, reliable and low latency data transfer acknowledgements which are not usable in real-time
is needed to produce useful and accurate data for hip communication where only fresh new data is
and leg position and rotation calculations. essential. Broadcast is the simplest ANT message (8
Wireless approach enables system transferability bytes payload) which is sent on dedicated slot on
and flexibility. Sensors can be attached, for example, each time frame. Burst is a message that consists of
with straps. Sensors can also be easily replaced if two or more sequential ANT messages (at least 16
needed. There are challenges related to bytes). Fig. 2 presents ANT packet structure.
communication reliability because human body
strongly attenuate RF signal and other radio systems
can cause interference. Also, wireless sensors should
be very low-power and chargeable. Batteries should
endure without a recharge at least a week.
Figure 2: ANT packet structure.
In wired systems data and power is transferred
4 ANT OPERABILITY