Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Physical Sciences and Mathematics (329)
- Computer Sciences (320)
- Electrical and Computer Engineering (115)
- Social and Behavioral Sciences (46)
- Law (44)
-
- Information Security (43)
- Computer Law (42)
- Forensic Science and Technology (40)
- Legal Studies (40)
- Digital Communications and Networking (34)
- Computer and Systems Architecture (24)
- Electrical and Electronics (22)
- Chemical Engineering (16)
- Civil Engineering (16)
- Civil and Environmental Engineering (16)
- Materials Science and Engineering (16)
- Mechanical Engineering (16)
- Metallurgy (16)
- Ocean Engineering (16)
- Structural Engineering (16)
- Other Computer Engineering (13)
- Robotics (12)
- Data Storage Systems (11)
- Hardware Systems (10)
- Systems and Communications (10)
- Other Electrical and Computer Engineering (8)
- Business (6)
- Life Sciences (6)
- Institution
-
- Wright State University (174)
- University of Texas at El Paso (70)
- Washington University in St. Louis (47)
- Embry-Riddle Aeronautical University (40)
- TÜBİTAK (23)
-
- Air Force Institute of Technology (21)
- University of Nebraska - Lincoln (21)
- Universitas Indonesia (16)
- University of Central Florida (15)
- Missouri University of Science and Technology (14)
- Singapore Management University (13)
- Selected Works (11)
- Technological University Dublin (10)
- University of Tennessee, Knoxville (8)
- Old Dominion University (7)
- University of South Carolina (7)
- University of Dayton (6)
- American University in Cairo (5)
- Marquette University (5)
- Edith Cowan University (4)
- Fordham University (4)
- New Jersey Institute of Technology (4)
- Portland State University (4)
- SelectedWorks (4)
- Universidad de La Salle (4)
- Boise State University (3)
- Cleveland State University (3)
- San Jose State University (3)
- University of Pennsylvania Carey Law School (3)
- University of Wollongong (3)
- Keyword
-
- Department of Computer Science and Engineering (14)
- #antcenter (5)
- Documentation (5)
- Internet (5)
- JML language (5)
-
- Computer Science and Engineering, Biology (4)
- Computer security (4)
- Human Factors (4)
- Information security (4)
- Test data generator (4)
- Wireless communication systems (4)
- Ad hoc networks (Computer networks) (3)
- Computer networks--Security measures (3)
- Computer science (3)
- Field programmable gate arrays (3)
- Genetic algorithms (3)
- Genome (3)
- Genomics (3)
- Interval uncertainty (3)
- Ontology (3)
- Pre and postconditions (3)
- Runtime assertion checking (3)
- Sensor networks (3)
- Abstraction (2)
- Adaptive menu (2)
- Artificial Intelligence (2)
- Asynchronous circuits -- Design and construction<br />Electronic circuit design<br />Logic circuits -- Design and construction (2)
- Auction (2)
- Beef (2)
- Breakpoint graph (2)
- Publication
-
- Computer Science & Engineering Syllabi (160)
- Departmental Technical Reports (CS) (67)
- All Computer Science and Engineering Research (47)
- Journal of Digital Forensics, Security and Law (23)
- Turkish Journal of Electrical Engineering and Computer Sciences (23)
-
- Theses and Dissertations (21)
- Annual ADFSL Conference on Digital Forensics, Security and Law (16)
- Makara Journal of Technology (16)
- Masters Theses (16)
- Electronic Theses and Dissertations (15)
- Browse all Theses and Dissertations (14)
- Faculty Publications (13)
- Department of Electrical and Computer Engineering: Faculty Publications (12)
- Research Collection School Of Computing and Information Systems (11)
- Department of Electrical and Computer Engineering: Faculty Publications (to 2015) (9)
- Electrical and Computer Engineering Faculty Publications (8)
- Doctoral Dissertations (7)
- Archived Theses and Dissertations (5)
- David G. Novick (5)
- Dissertations (5)
- Electrical and Computer Engineering Faculty Research and Publications (5)
- Theses (5)
- Ingeniería en Automatización (4)
- Research outputs pre 2011 (4)
- All Faculty Scholarship (3)
- Conference papers (3)
- Departmental Papers (CS) (3)
- Electrical and Computer Engineering Faculty Publications and Presentations (3)
- Tony Wasserman (3)
- University of Wollongong in Dubai - Papers (3)
Articles 1 - 30 of 581
Full-Text Articles in Computer Engineering
Odometry Correction Of A Mobile Robot Using A Range-Finding Laser, Thomas Epton
Odometry Correction Of A Mobile Robot Using A Range-Finding Laser, Thomas Epton
All Theses
Two methods for improving odometry using a pan-tilt range-finding laser is considered. The first method is a one-dimensional model that uses the laser with a sliding platform. The laser is used to determine how far the platform has moved along a rail. The second method is a two-dimensional model that mounts the laser to a mobile robot. In this model, the laser is used to improve the odometry of the robot. Our results show that the one-dimensional model proves our basic geometry is correct, while the two-dimensional model improves the odometry, but does not completely correct it.
Forensics Image Background Matching Using Scale Invariant Feature (Sift)Transform And Speeded Up Robust Features (Surf), Paul N. Fogg Ii
Forensics Image Background Matching Using Scale Invariant Feature (Sift)Transform And Speeded Up Robust Features (Surf), Paul N. Fogg Ii
Theses and Dissertations
In criminal investigations, it is not uncommon for investigators to obtain a photograph or image that shows a crime being committed. Additionally, thousands of pictures may exist of a location, taken from the same or varying viewpoints. Some of these images may even include a criminal suspect or witness. One mechanism to identify criminals and witnesses is to group the images found on computers, cell phones, cameras, and other electronic devices into sets representing the same location. One or more images in the group may then prove the suspect was at the crime scene before, during, and/or after a crime. …
Operational Strategies For Continuum Manipulators, Matt Csencsits
Operational Strategies For Continuum Manipulators, Matt Csencsits
All Theses
We introduce a novel, intuitive user interface for continuum manipulators through the use of various joystick mappings. This user interface allows for the effective use of continuum manipulators in the lab and in the field. A novel geometric approach is developed to produce a more intuitive understanding of continuum manipulator kinematics. Using this geometric approach we derive the first closed-form solution to the inverse kinematics problem for continuum robots. Using the derived inverse kinematics to convert from workspace coordinates to configuration space coordinates we develop a potential-field path planner for continuum manipulators.
System For Sequentially Providing Aberation Corrected Electromagnetic Radation To A Spot On A Sample At Multiple Angles Of Incidence, Martin M. Liphardt, John A. Woollam,
System For Sequentially Providing Aberation Corrected Electromagnetic Radation To A Spot On A Sample At Multiple Angles Of Incidence, Martin M. Liphardt, John A. Woollam,
Department of Electrical and Computer Engineering: Faculty Publications
A system for sequentially providing electromagnetic radia tion to a spot on a sample at different angles of incidence, and after reflection therefrom into a detector. The system includes a plurality of spherical mirrors, and a refractive element for correcting aberration.
Rotating Or Rotatable Compensator Systemi Providing Aberation Corrected Electromagnetic Raadation To A Spot On A Sample At Multiple Angles Of Ancidence, Martin M. Liphardt, Blaine D. Johs, Jeffrey S. Hale, Craig M. Herzinger, Steven E. Green, Ping He, John A. Woollam
Rotating Or Rotatable Compensator Systemi Providing Aberation Corrected Electromagnetic Raadation To A Spot On A Sample At Multiple Angles Of Ancidence, Martin M. Liphardt, Blaine D. Johs, Jeffrey S. Hale, Craig M. Herzinger, Steven E. Green, Ping He, John A. Woollam
Department of Electrical and Computer Engineering: Faculty Publications
The present invention relates to ellipsometer systems, and more particularly to ellipsometer systems comprising trans missive rotating or stepwise rotatable compensators for continuously or step-wise varying polarization states and further comprising transmissive multi-element lens focusing of a spectroscopic electromagnetic beam into a small, chromatically relatively undispersed area spot on a sample system. The ellipsometer system optionally is present in an environmental control chamber.
Fabric-On-A-Chip: Toward Consolidating Packet Switching Functions On Silicon, William B. Matthews
Fabric-On-A-Chip: Toward Consolidating Packet Switching Functions On Silicon, William B. Matthews
Doctoral Dissertations
The switching capacity of an Internet router is often dictated by the memory bandwidth required to bu¤er arriving packets. With the demand for greater capacity and improved service provisioning, inherent memory bandwidth limitations are encountered rendering input queued (IQ) switches and combined input and output queued (CIOQ) architectures more practical. Output-queued (OQ) switches, on the other hand, offer several highly desirable performance characteristics, including minimal average packet delay, controllable Quality of Service (QoS) provisioning and work-conservation under any admissible traffic conditions. However, the memory bandwidth requirements of such systems is O(NR), where N denotes the number of …
Automated Genome-Wide Protein Domain Exploration, Bhanu Prasad Rekepalli
Automated Genome-Wide Protein Domain Exploration, Bhanu Prasad Rekepalli
Doctoral Dissertations
Exploiting the exponentially growing genomics and proteomics data requires high quality, automated analysis. Protein domain modeling is a key area of molecular biology as it unravels the mysteries of evolution, protein structures, and protein functions. A plethora of sequences exist in protein databases with incomplete domain knowledge. Hence this research explores automated bioinformatics tools for faster protein domain analysis. Automated tool chains described in this dissertation generate new protein domain models thus enabling more effective genome-wide protein domain analysis. To validate the new tool chains, the Shewanella oneidensis and Escherichia coli genomes were processed, resulting in a new peptide domain …
Self-Certified Public Key Cryptographic Methodologies For Resource-Constrained Wireless Sensor Networks, Ortal Arazi
Self-Certified Public Key Cryptographic Methodologies For Resource-Constrained Wireless Sensor Networks, Ortal Arazi
Doctoral Dissertations
As sensor networks become one of the key technologies to realize ubiquitous computing, security remains a growing concern. Although a wealth of key-generation methods have been developed during the past few decades, they cannot be directly applied to sensor network environments. The resource-constrained characteristics of sensor nodes, the ad-hoc nature of their deployment, and the vulnerability of wireless media pose a need for unique solutions.
A fundamental requisite for achieving security is the ability to provide for data con…dential- ity and node authentication. However, the scarce resources of sensor networks have rendered the direct applicability of existing public key cryptography …
Sold Downstream: Free Speech, Fair Use, And Anti-Circumvention Law, R. Terry Parker
Sold Downstream: Free Speech, Fair Use, And Anti-Circumvention Law, R. Terry Parker
The University of New Hampshire Law Review
[Excerpt] “Here’s a hypo. Living in Asia, I purchased a shameful amount of music and movies, all legit purchases through reputable stores, HMV and Tower Records, but little of which will get reissued. I wanted to preserve my collection but software in the discs prevented me from ripping backup copies to my computer. Lacking the technological savvy to get around this software myself, I purchased and used a product to help me circumvent these controls. Discuss.
Courts agree that copying the music and movies here is infringement but that fair use may provide a defense. However, courts do not agree …
Computational Complexity Of Determining Which Statements About Causality Hold In Different Space-Time Models, Vladik Kreinovich, Olga Kosheleva
Computational Complexity Of Determining Which Statements About Causality Hold In Different Space-Time Models, Vladik Kreinovich, Olga Kosheleva
Departmental Technical Reports (CS)
Causality is one of the most fundamental notions of physics. It is therefore important to be able to decide which statements about causality are correct in different models of space-time. In this paper, we analyze the computational complexity of the corresponding deciding problems. In particular, we show that: for Minkowski space-time, the deciding problem is as difficult as the Tarski's decision problem for elementary geometry, while for a natural model of primordial space-time, the corresponding decision problem is of the lowest possible complexity among all possible spacetime models.
Interval Computations And Interval-Related Statistical Techniques: Tools For Estimating Uncertainty Of The Results Of Data Processing And Indirect Measurements, Vladik Kreinovich
Interval Computations And Interval-Related Statistical Techniques: Tools For Estimating Uncertainty Of The Results Of Data Processing And Indirect Measurements, Vladik Kreinovich
Departmental Technical Reports (CS)
In many practical situations, we only know the upper bound D on the (absolute value of the) measurement error d, i.e., we only know that the measurement error is located on the interval [-D,D]. The traditional engineering approach to such situations is to assume that d is uniformly distributed on [-D,D], and to use the corresponding statistical techniques. In some situations, however, this approach underestimates the error of indirect measurements. It is therefore desirable to directly process this interval uncertainty. Such "interval computations" methods have been developed since the 1950s. In this chapter, we provide a brief overview of related …
Reasons Why Mobile Telephone Conversations May Be Annoying: Considerations And Pilot Studies, Nigel Ward, Anais G. Rivera, Alejandro Vega
Reasons Why Mobile Telephone Conversations May Be Annoying: Considerations And Pilot Studies, Nigel Ward, Anais G. Rivera, Alejandro Vega
Departmental Technical Reports (CS)
Mobile telephone conversations in public places are often annoying to bystanders. Previous work has focused on the psychological and social causes for this, but has not examined the possible role of properties of the communication channel. In our paper "Do Bystanders and Dialog Participants Differ in Preferences for Telecommunications Channels?" (21st International Symposium on Human Factors in Telecommunication, 2008) we consider the possibility that a reason for the annoyance could be that bystander preferences differ from talker preferences, but conclude that this is in fact unlikely to be a major factor. This technical report provides supplemental information, specifically a broader …
Evaluation Of Robocode As A Teaching Tool For Computer Programming, Arnold Hensman
Evaluation Of Robocode As A Teaching Tool For Computer Programming, Arnold Hensman
Conference Papers
Robocode began as an educational tool to aid in learning Java programming. It has since evolved into something of a phenomenon, as the prospect of creating simple to complex virtual tanks appears to pose an attractive challenge to both novice and expert programmers alike. What started out as a teaching tool has grown into a worldwide network of competitors, all keen to prove that their ‘bot’ stands out from the crowd. Competitions are well organised and many Robocode events are a PR dream for the computing companies that sponsor them. Without a doubt, this easy to use application has sparked …
Optimal Receiver For Space Time Spreading Across A Time Hopping Ppm Over Ultra Wideband Saleh-Valenzuela Mimo Channel, Peter Vial, Beata J. Wysocki, Tadeusz A. Wysocki
Optimal Receiver For Space Time Spreading Across A Time Hopping Ppm Over Ultra Wideband Saleh-Valenzuela Mimo Channel, Peter Vial, Beata J. Wysocki, Tadeusz A. Wysocki
Department of Electrical and Computer Engineering: Faculty Publications (to 2015)
This paper outlines a technique which can use multiple transmit antennas to send more than one binary bit using the same number of transmit antennas over a single transmission. It uses Ultra Wideband orthogonal pulse position modulation to achieve this, with the receiver employing a Rake receiver and a Maximum Ratio Combiner optimal detector. This is done over a Space Time Spreading Time Hopping Ultra Wideband Pulse Position Modulation system assuming a rich multipath Saleh-Valenzuela MIMO channel model. Simulation results indicate that a significant gain can be achieved compared with other proposed schemes utilising multiple transmit antennas for Ultra Wide …
Scalability Of Manet Routing Protocols For Heterogeneous And Homogenous Networks, Huda Al Amri, Mehran Abolhasan, Tadeusz Wysocki
Scalability Of Manet Routing Protocols For Heterogeneous And Homogenous Networks, Huda Al Amri, Mehran Abolhasan, Tadeusz Wysocki
Department of Electrical and Computer Engineering: Faculty Publications (to 2015)
In Mobile Ad hoc Network (MANET), mobility, traffic and node density are main network conditions that significantly affect the performance of routing protocols. Much of the previous researches in MANET routing have focused on developing strategies, which suit one specific networking scenario. Therefore, there is no existing protocol that can work well in all different networking scenarios. This paper reviews characteristics of each different classes of routing protocols. Moreover, most of current routing protocols assume homogeneous networking conditions where all nodes have the same capabilities and resources. Although homogenous networks are easy to model and analysis, they exhibits poor scalability …
Closed-Form Derivations Of Isi And Mui For Time-Reversed Ultra Wideband, K. Popovski, Beata J. Wysocki, Tadeusz Wysocki
Closed-Form Derivations Of Isi And Mui For Time-Reversed Ultra Wideband, K. Popovski, Beata J. Wysocki, Tadeusz Wysocki
Department of Electrical and Computer Engineering: Faculty Publications (to 2015)
Through transmitter pre-filtering, a time reversed UWB system is capable if harnessing a multipath channel to achieve temporal and spatial focusing. Unfortunately, large RMS channel delay spread leads to significant intersymbol and multiuser interference. This paper presents closed-form expressions for self and multi-user interference for a UWB system utilizing a time-reversed approach. The influence of user multiplexing codes is taken to account through incorporation of a ‘separation probability’, which characterizes a family of hopping sequences. The standardized IEEE 802.15.3a channel model is applied, and the derived performances are compared with that of a simulated time hopped time-reversed UWB system.
Hardware-Efficient Scalable Reinforcement Learning Systems, Zhenzhen Liu
Hardware-Efficient Scalable Reinforcement Learning Systems, Zhenzhen Liu
Doctoral Dissertations
Reinforcement Learning (RL) is a machine learning discipline in which an agent learns by interacting with its environment. In this paradigm, the agent is required to perceive its state and take actions accordingly. Upon taking each action, a numerical reward is provided by the environment. The goal of the agent is thus to maximize the aggregate rewards it receives over time. Over the past two decades, a large variety of algorithms have been proposed to select actions in order to explore the environment and gradually construct an e¤ective strategy that maximizes the rewards. These RL techniques have been successfully applied …
Computationally Efficient Mixed Pixel Decomposition Using Constrained Optimizations, Lidan Miao
Computationally Efficient Mixed Pixel Decomposition Using Constrained Optimizations, Lidan Miao
Doctoral Dissertations
Sensors with spatial resolution larger than targets yield mixed pixel, i.e., pixel whose measurement is a composite of different sources (endmembers). The analysis of mixed pixels demands subpixel methods to perform source separation and quantification, which is a problem of blind source separation (BSS). Although various algorithms have been proposed, several important issues remain unresolved. First, assuming the endmembers are known, the abundance estimation is commonly performed by employing a least squares criterion, which however makes the estimation sensitive to noise and outliers, and the endmembers with very similar signatures are difficult to differentiate. In addition, the …
Using Gis To Optimize The Design And Implementation Of The Rtk Reference Network In Abu Dhabi, Mustafa Abdulla Mohammed Almusawa
Using Gis To Optimize The Design And Implementation Of The Rtk Reference Network In Abu Dhabi, Mustafa Abdulla Mohammed Almusawa
Theses
Several challenging applications and construction works demand real-time measurements for positioning at the centimeter-level accuracy. This positioning accuracy can be obtained by using a Global Positioning System (GPS) roving unit and employing a single reference station (base-station) or through utilizing the service of multiple reference stations forming a Real-Time Kinematics (RTK) Reference Network.
The limitation of the single reference approach is that measurement errors are distance dependent and good accuracy can be only obtained when distances are less than 10 kms. In addition, this method requires a nearby Geodetic Control Point (GCP). Recently, RTK reference networks are widely established in …
Self-Organizing Neural Architectures And Cooperative Learning In A Multiagent Environment, Dan Xiao, Ah-Hwee Tan
Self-Organizing Neural Architectures And Cooperative Learning In A Multiagent Environment, Dan Xiao, Ah-Hwee Tan
Research Collection School Of Computing and Information Systems
Temporal-Difference–Fusion Architecture for Learning, Cognition, and Navigation (TD-FALCON) is a generalization of adaptive resonance theory (a class of self-organizing neural networks) that incorporates TD methods for real-time reinforcement learning. In this paper, we investigate how a team of TD-FALCON networks may cooperate to learn and function in a dynamic multiagent environment based on minefield navigation and a predator/prey pursuit tasks. Experiments on the navigation task demonstrate that TD-FALCON agent teams are able to adapt and function well in a multiagent environment without an explicit mechanism of collaboration. In comparison, traditional Q-learning agents using gradient-descent-based feedforward neural networks, trained with the …
What Is Rcu, Fundamentally?, Paul E. Mckenney, Jonathan Walpole
What Is Rcu, Fundamentally?, Paul E. Mckenney, Jonathan Walpole
Computer Science Faculty Publications and Presentations
Read-copy update (RCU) is a synchronization mechanism that was added to the Linux kernel in October of 2002. RCU achieves scalability improvements by allowing reads to occur concurrently with updates. In contrast with conventional locking primitives that ensure mutual exclusion among concurrent threads regardless of whether they be readers or updaters, or with reader-writer locks that allow concurrent reads but not in the presence of updates, RCU supports concurrency between a single updater and multiple readers. RCU ensures that reads are coherent by maintaining multiple versions of objects and ensuring that they are not freed up until all pre-existing read-side …
Performance Testing An Inline Network Intrusion Detection System Using Snort, Richard Wagoner
Performance Testing An Inline Network Intrusion Detection System Using Snort, Richard Wagoner
Morehead State Theses and Dissertations
A thesis presented to the faculty of the College of Science and Technology at Morehead State University in partial fulfillment of the requirements for the Degree of Master of Science by Richard Wagoner on November 16, 2007.
Application Of Intermediate Wavelength Band Spectroscopic Ellipsometry To In-Stu. Real Time Fabrication Of Multiple Layer Alternating Hghalow Refractive Index Filters, Blaine D. Johs, Jeffery S. Hale, John A. Woollam, Craig M. Herzinger
Application Of Intermediate Wavelength Band Spectroscopic Ellipsometry To In-Stu. Real Time Fabrication Of Multiple Layer Alternating Hghalow Refractive Index Filters, Blaine D. Johs, Jeffery S. Hale, John A. Woollam, Craig M. Herzinger
Department of Electrical and Computer Engineering: Faculty Publications
Disclosed is application of oblique angle of incidence, reflection and/or transmission mode spectroscopic ellipsometry PSI and/or DELTA, (including combinations thereof and/or mathematical equivalents), vs. wavelength data over an intermediate wavelength band range around a pass or reject band, to monitor and/or control fabrication of multiple layer high/low refractive index band-pass, band-reject and varied attenuation vs. wavelength thin film interference filters, either alone or in combination with transmissive non-ellipsometric electromagnetic beam turning point vs. layer data obtained at an essentially normal angle of incidence.
A Theoretical Framework For Quality-Aware Cross-Layer Optimized Wireless Multimedia Communications, Song Chi, Haohong Wang, Dalei Wu
A Theoretical Framework For Quality-Aware Cross-Layer Optimized Wireless Multimedia Communications, Song Chi, Haohong Wang, Dalei Wu
Department of Electrical and Computer Engineering: Faculty Publications
Although cross-layer has been thought as one of themost effective and efficient ways formultimedia communications over wireless networks and a plethora of research has been done in this area, there is still lacking of a rigorous mathematical model to gain indepth understanding of cross-layer design tradeoffs, spanning from application layer to physical layer. As a result, many existing cross-layer designs enhance the performance of certain layers at the price of either introducing side effects to the overall system performance or violating the syntax and semantics of the layered network architecture. Therefore, lacking of a rigorous theoretical study makes existing cross-layer …
Analysis Of Three Phase Controlled Rectifier With The Same Distance Control As Compared To The Same Angle Control, Sudirman S., Sri Kurniati A.
Analysis Of Three Phase Controlled Rectifier With The Same Distance Control As Compared To The Same Angle Control, Sudirman S., Sri Kurniati A.
Makara Journal of Technology
Analysis of three phase controlled rectifier with the same distance control as compared to the same angle control. This research aim to compare the firing of the same distance and the same angle control at three phase controlled rectifier with seen generated harmonic at input (AC side). Then calculate of rectifier efficiency and power factor comparison from both the control type. The rectifier use passive filter with resistance 11 ohm and is analysed with program simulation using PSPICE version 7.1. Result of research indicate that use of the same distance control generates the 5th and 7th harmonics, while the same …
Limiting Maximum Drag Reduction Asymptote For The Moment Coefficient Of An Enclosed Rotating Disk With Fine Spiral Grooves, Budiarso Budiarso, Keizo Watanabe, Satoshi Ogata
Limiting Maximum Drag Reduction Asymptote For The Moment Coefficient Of An Enclosed Rotating Disk With Fine Spiral Grooves, Budiarso Budiarso, Keizo Watanabe, Satoshi Ogata
Makara Journal of Technology
In this study, the limiting maximum drag reduction asymptote for the moment coefficient of an enclosed rotating disk with fine spiral grooves in turbulent flow region were obtained analytically. Analysis which were based on an assumption for a simple parabolic velocity distribution of turbulent pipe flow to represent relative tangential velocity, was carried out using momentum integral equations of the boundary layer. For a certain K- parameter the moment coefficient results agree well with experimental results for maximum drag reduction in an enclosed rotating disk with fine spiral grooves and drag reduction ratio approximately was 15 %. Additionally, the experimental …
Reverse Link Cdma System Capacity Evaluation For Stratospheric Platform Mobile Communications, Iskandar Iskandar
Reverse Link Cdma System Capacity Evaluation For Stratospheric Platform Mobile Communications, Iskandar Iskandar
Makara Journal of Technology
We propose an analysis of reverse link CDMA multispot beam stratospheric platforms (SPF) in this paper. The SPF is currently proposed as a novel wireless technology for the development of the next generation fixed and mobile communications. The geometry of this technology is different from that of the terrestrial but rather similar to the satellite based cellular system. However, evaluation on the CDMA system capacity of this technology has not been much reported. This paper addresses all possible multiple access interference analyses including the effects of channel fading and shadowing in order to evaluate the system capacity. Single SPF and …
Trajectory Shaping Of Surface-To-Surface Missile With Terminal Impact Angle Constraint, S. Subchan
Trajectory Shaping Of Surface-To-Surface Missile With Terminal Impact Angle Constraint, S. Subchan
Makara Journal of Technology
This paper presents trajectory shaping of a surface-to-surface missile attacking a fixed with terminal impact angle constraint. The missile must hit the target from above, subject to the missile dynamics and path constraints. The problem is reinterpreted using optimal control theory resulting in the formulation of minimum integrated altitude. The formulation entails nonlinear, two-dimensional missile flight dynamics, boundary conditions and path constraints. The generic shape of optimal trajectory is: level flight, climbing, diving; this combination of the three flight phases is called the bunt manoeuvre. The numerical solution of optimal control problem is solved by a direct collocation method. The …
Effect Of Contact Time On Interface Reaction Between Aluminum Silicon (7% And 11%) Alloy And Steel Dies Skd 61, Bambang Suharno, Neni Octapiani Nurhayati, Bustanul Arifin, Sri Harjanto
Effect Of Contact Time On Interface Reaction Between Aluminum Silicon (7% And 11%) Alloy And Steel Dies Skd 61, Bambang Suharno, Neni Octapiani Nurhayati, Bustanul Arifin, Sri Harjanto
Makara Journal of Technology
Effect of Contact Time on Interface Reaction between Aluminum Silicon (7% and 11%) Alloy and Steel Dies SKD 61. Die soldering (die sticking) is a defect of metal casting in which molten metal “welds” to the metallic die mold surface during casting process. Die soldering is the result of an interface reaction between the molten aluminum and the die material. Aluminum alloy with 7 and 11% silicon and SKD 61 die steel are the most common melt and die material used in aluminum die casting. This research is done to study the morphology and the characteristics of the formed AlxFeySiz …
Co2 Absorption From Its Mixture With Ch4 Or N2 Through Hollow Fiber Membrane Contactor Using Water As Solvent, Sutrasno Kartohardjono, Anggara Anggara, Subihi Subihi, Yuliusman Yuliusman
Co2 Absorption From Its Mixture With Ch4 Or N2 Through Hollow Fiber Membrane Contactor Using Water As Solvent, Sutrasno Kartohardjono, Anggara Anggara, Subihi Subihi, Yuliusman Yuliusman
Makara Journal of Technology
CO2 Absorption from Its Mixture with CH4 or N2 through Hollow Fiber Membrane Contactor using Water as Solvent. Hollow fiber membrane contactors have been widely used as gas-liquid contactors recently such as in the CO2 absorption process from gas stream. This research aims to evaluate the effectiveness of hollow fiber membrane contactor to absorb CO2 from its mixture with CH4 or N2 using water through mass transfer and hydrodynamic tests. There are 3 membrane modules used in this research with shell diameter of 1.9 cm, length of 40 cm, outer fiber diameter of 2.7 mm and fiber number in the …