28 research outputs found

    Free vibration of symmetric angly-plane layered truncated conical shells under classical theory

    Get PDF
    Truncated conical shell finds wide ranging of engineering applications. They are used in space crafts, robots, shelters, domes, tanks, nozzles and in machinery devices. Thus, the study of their vibrational characteristics has long been of interest for the designers. The use of the lamination for the structures leads to design with the maximum reliability and minimum weight. Moreover, the study of free vibration of laminated conical shells has been treated by a number of researchers. Irie et al. (1982) studied free vibration of conical shells with variable thickness using Rayleigh-Ritz method of solution. Wu and Wu (2000) provided 3D elasticity solutions for the free vibration analysis of laminated conical shells by an asymptotic approach. Wu and Lee (2001) studied the natural frequencies of laminated conical shells with variable stiffness using the differential quadrature method under first-order shear deformation theory (FSDT). Tripathi et al. (2007) studied the free vibration of composite conical shells with random material properties of the finite element method. Civalek (2007) used the Discrete Singular Convolution (DSC) to investigate the frequency response of orthotropic conical and cylindrical shells. Sofiyez et al. (2009) studied the vibrations of orthotropic non-homogeneous conical shells with free boundary conditions. Ghasemi et al. (2012) presented their study of free vibration of composite conical shells which was investigated under various boundary conditions using the solution of beam function and Galerkin method. Viswanathan et al. (2007, 2011) studied free vibration of laminated cross-ply plates, including shear deformation, symmetric angle-ply laminated cylindrical shells of variable thickness with shear deformation theory using the spline collocation method. In the present work, free vibration of symmetric angle-ply laminated truncated conical shells is analyzed and displacement functions are approximated using cubic and quantic spline and collocation procedure is applied to obtain a set of field equations. The field equations along with the equations of boundary conditions yield a system of homogeneous simultaneous algebraic equations on the assumed spline coefficients which resulting to the generalized eigenvalue problem. This eigenvalue problem is solved using eigensolution technique to get as many eigenfrequencies as required. The effect of circumferential mode number, length ratio, cone angle, ply angles and number of layers under two boundary conditions on the frequency parameter is studied for three- and five- layered conical shells consisting of two types of layered materials

    Telecommunication Systems

    Get PDF
    This book is based on both industrial and academic research efforts in which a number of recent advancements and rare insights into telecommunication systems are well presented. The volume is organized into four parts: "Telecommunication Protocol, Optimization, and Security Frameworks", "Next-Generation Optical Access Technologies", "Convergence of Wireless-Optical Networks" and "Advanced Relay and Antenna Systems for Smart Networks." Chapters within these parts are self-contained and cross-referenced to facilitate further study

    Low-power Wearable Healthcare Sensors

    Get PDF
    Advances in technology have produced a range of on-body sensors and smartwatches that can be used to monitor a wearer’s health with the objective to keep the user healthy. However, the real potential of such devices not only lies in monitoring but also in interactive communication with expert-system-based cloud services to offer personalized and real-time healthcare advice that will enable the user to manage their health and, over time, to reduce expensive hospital admissions. To meet this goal, the research challenges for the next generation of wearable healthcare devices include the need to offer a wide range of sensing, computing, communication, and human–computer interaction methods, all within a tiny device with limited resources and electrical power. This Special Issue presents a collection of six papers on a wide range of research developments that highlight the specific challenges in creating the next generation of low-power wearable healthcare sensors

    Counter Unmanned Aircraft Systems Technologies and Operations

    Get PDF
    As the quarter-century mark in the 21st Century nears, new aviation-related equipment has come to the forefront, both to help us and to haunt us. (Coutu, 2020) This is particularly the case with unmanned aerial vehicles (UAVs). These vehicles have grown in popularity and accessible to everyone. Of different shapes and sizes, they are widely available for purchase at relatively low prices. They have moved from the backyard recreation status to important tools for the military, intelligence agencies, and corporate organizations. New practical applications such as military equipment and weaponry are announced on a regular basis – globally. (Coutu, 2020) Every country seems to be announcing steps forward in this bludgeoning field. In our successful 2nd edition of Unmanned Aircraft Systems in the Cyber Domain: Protecting USA’s Advanced Air Assets (Nichols, et al., 2019), the authors addressed three factors influencing UAS phenomena. First, unmanned aircraft technology has seen an economic explosion in production, sales, testing, specialized designs, and friendly / hostile usages of deployed UAS / UAVs / Drones. There is a huge global growing market and entrepreneurs know it. Second, hostile use of UAS is on the forefront of DoD defense and offensive planners. They are especially concerned with SWARM behavior. Movies like “Angel has Fallen,” where drones in a SWARM use facial recognition technology to kill USSS agents protecting POTUS, have built the lore of UAS and brought the problem forefront to DHS. Third, UAS technology was exploding. UAS and Counter- UAS developments in navigation, weapons, surveillance, data transfer, fuel cells, stealth, weight distribution, tactics, GPS / GNSS elements, SCADA protections, privacy invasions, terrorist uses, specialized software, and security protocols has exploded. (Nichols, et al., 2019) Our team has followed / tracked joint ventures between military and corporate entities and specialized labs to build UAS countermeasures. As authors, we felt compelled to address at least the edge of some of the new C-UAS developments. It was clear that we would be lucky if we could cover a few of – the more interesting and priority technology updates – all in the UNCLASSIFIED and OPEN sphere. Counter Unmanned Aircraft Systems: Technologies and Operations is the companion textbook to our 2nd edition. The civilian market is interesting and entrepreneurial, but the military and intelligence markets are of concern because the US does NOT lead the pack in C-UAS technologies. China does. China continues to execute its UAS proliferation along the New Silk Road Sea / Land routes (NSRL). It has maintained a 7% growth in military spending each year to support its buildup. (Nichols, et al., 2019) [Chapter 21]. They continue to innovate and have recently improved a solution for UAS flight endurance issues with the development of advanced hydrogen fuel cell. (Nichols, et al., 2019) Reed and Trubetskoy presented a terrifying map of countries in the Middle East with armed drones and their manufacturing origin. Guess who? China. (A.B. Tabriski & Justin, 2018, December) Our C-UAS textbook has as its primary mission to educate and train resources who will enter the UAS / C-UAS field and trust it will act as a call to arms for military and DHS planners.https://newprairiepress.org/ebooks/1031/thumbnail.jp

    The doctoral research abstracts. Vol:10 2016 / Institute of Graduate Studies, UiTM

    Get PDF
    Foreword: Congratulations to Institute of Graduate Studies on the continuous efforts to publish the 10th issue of the Doctoral Research Abstracts which showcases the research carried out in the various disciplines range from science and technology, business and administration to social science and humanities. This issue captures the novelty of research contributed by seventy (70) PhD graduands receiving their scrolls in the UiTM’s 85th Convocation. As of October 2016, this year UiTM has produced 138 PhD graduates soaring from125 in the previous year (2015). It shows that UiTM is in the positive direction to achive the total of 1200 PhD graduates in 2020. To the 70 doctorates, I would like it to be known that you have most certainly done UiTM proud by journeying through the scholarly world with its endless challenges and obstacles, and by persevering right till the very end. This convocation should not be regarded as the end of your highest scholarly achievement and contribution to the body of knowledge but rather as the beginning of embarking into more innovative research from knowledge gained during this academic journey, for the community and country. This year marks UiTM’s 60th Anniversary and we have been producing many good quality graduates that have a major impact on the socio-economic development of the country and the bumiputeras. As alumni of UiTM, we hold you dear to our hearts. We sincerely wish you all the best and may the Almighty guide you to a path of excellence and success. As you leave the university as alumni we hope a new relationship will be fostered between you and the faculty in soaring UiTM to greater heights. “UiTM Sentiasa di Hati Ku” / Prof Emeritus Dato’ Dr Hassan Said Vice Chancellor Universiti Teknologi MAR

    Quantum key distribution devices: How to make them and how to break them

    Get PDF
    As more aspects of modern society depend on digital communication, we increasingly rely on infrastructure that ensures the privacy and security of this communication. Classically, this has been provided by cryptographic protocols such as public-key encryption, in which secrets called keys are exchanged between different parties to enable secure communication. The rapid development of quantum algorithms which violate the assumptions of these protocols, however, poses a security challenge to modern cryptography. Quantum resources can also be used to strengthen cryptographic security, particularly the security of key exchange protocols. This approach, QKD, can be implemented by encoding in quantum systems such as single photons sent through free-space or a fiber. Fiber based QKD devices are already commercially available, but are fundamentally limited to distributing keys over a few hundred kilometers. To address this distance limitation, research QKD systems are being developed to exchange keys through free-space to satellites. This work considers practical challenges to building and testing both types of QKD devices. Firstly, we consider modeling and mission analysis for airborne demonstrations of QKD to stratospheric balloons and aircraft to simulate a satellite. Based on the mission parameters available for both platforms, we found aircraft platforms were more promising for testing prototype QKD satellite systems. We developed a mission planning tool to help design the flight geometries for testing the device. Next, we developed three new components for a QKD satellite prototype. The requirements for electro-optical devices in orbit are very different from lab environments, mandating new approaches to designing QKD devices. We developed a quad single photon detector package to meet the requirements for free-space links to low earth orbit. Moreover, we designed and built optical systems for analyzing the polarization of photons and an adaptive optics unit to increase the efficiency of collecting the encoded photons. All three devices were tested in conditions that simulated the time and loss of a satellite pass. Finally, we demonstrated a laser damage attack on a live commercial QKD system. Our attack injected additional optical power into the sender device to modify security-critical components. Specifically, our attack damaged the PIN diodes which monitor the encoded photon number, reducing their sensitivity or completely blinding them. Our damage could compromise the entire key, and was performed during system operation while raising no alarms. In summary, this work shows the trade-offs of testing QKD payloads on different airborne platforms, develops components for a satellite QKD payload, and demonstrates a security vulnerability in a commercial QKD system that can fully compromise the key. These results help address practical challenges to building QKD devices, improving the security of modern cryptography

    Sensor Characteristics Reference Guide

    Full text link
    corecore