113 research outputs found

    Compliant rolling-contact architected materials for shape reconfigurability.

    Get PDF
    Architected materials can achieve impressive shape-changing capabilities according to how their microarchitecture is engineered. Here we introduce an approach for dramatically advancing such capabilities by utilizing wrapped flexure straps to guide the rolling motions of tightly packed micro-cams that constitute the material's microarchitecture. This approach enables high shape-morphing versatility and extreme ranges of deformation without accruing appreciable increases in strain energy or internal stress. Two-dimensional and three-dimensional macroscale prototypes are demonstrated, and the analytical theory necessary to design the proposed materials is provided and packaged as a software tool. An approach that combines two-photon stereolithography and scanning holographic optical tweezers is demonstrated to enable the fabrication of the proposed materials at their intended microscale

    GOPA:Geometrical Optics Positioning Algorithm

    Get PDF
    In this paper, we propose an accurate visible light indoor localization system for a smartphone using the commercial light-emitting diode (LED) panels which are used primarily for lighting. Each of designed lighting panel contains a space-colorcoded identifier, a matrix with a unique pattern of spatially separated colored LEDs, for labeling different positioning cells while the lighting color is kept white by balancing the number of different sets of colored LEDs. The advantage of this idea is that we do not use the time-frequency domain of visible light communication (VLC) networks resources for positioning signaling. Our positioning technique called geometrical optics positioning algorithm (GOPA) is an angle of arrival (AOA)-based geometrical algorithm on smartphones to locate the device. The front-facing camera of the smartphone is used at the receiver side to capture the image. Experimental results show robust two-dimensional (2-D) and three-dimensional (3-D) positioning. The experimental mean positioning error for 2-D positioning is 0.54 cm, in case of ignoring the tilt. The experimental mean positioning errors for 3-D positioning are respectively 1.24 cm, and 1.85 cm for ideal non-tilted and non-oriented, and non-tilted but orientated scenarios

    Additively manufacturable micro-mechanical logic gates.

    Get PDF
    Early examples of computers were almost exclusively based on mechanical devices. Although electronic computers became dominant in the past 60 years, recent advancements in three-dimensional micro-additive manufacturing technology provide new fabrication techniques for complex microstructures which have rekindled research interest in mechanical computations. Here we propose a new digital mechanical computation approach based on additively-manufacturable micro-mechanical logic gates. The proposed mechanical logic gates (i.e., NOT, AND, OR, NAND, and NOR gates) utilize multi-stable micro-flexures that buckle to perform Boolean computations based purely on mechanical forces and displacements with no electronic components. A key benefit of the proposed approach is that such systems can be additively fabricated as embedded parts of microarchitected metamaterials that are capable of interacting mechanically with their surrounding environment while processing and storing digital data internally without requiring electric power

    Online discussion compensates for suboptimal timing of supportive information presentation in a digitally supported learning environment

    Get PDF
    This study used a sequential set-up to investigate the consecutive effects of timing of supportive information presentation (information before vs. information during the learning task clusters) in interactive digital learning materials (IDLMs) and type of collaboration (personal discussion vs. online discussion) in computer-supported collaborative learning (CSCL) on student knowledge construction. Students (N = 87) were first randomly assigned to the two information presentation conditions to work individually on a case-based assignment in IDLM. Students who received information during learning task clusters tended to show better results on knowledge construction than those who received information only before each cluster. The students within the two separate information presentation conditions were then randomly assigned to pairs to discuss the outcomes of their assignments under either the personal discussion or online discussion condition in CSCL. When supportive information had been presented before each learning task cluster, online discussion led to better results than personal discussion. When supportive information had been presented during the learning task clusters, however, the online and personal discussion conditions had no differential effect on knowledge construction. Online discussion in CSCL appeared to compensate for suboptimal timing of presentation of supportive information before the learning task clusters in IDLM

    F3TM: flooding factor based trust management framework for secure data transmission in MANETs

    Get PDF
    Due to the absence of infrastructure support, secure data dissemination is a challenging task in scalable mobile ad hoc networks (MANETs) environment. In most of the traditional routing techniques for MANETs, either security has not been taken into account or only one aspect of security concern has been addressed without optimizing the routing performance. This paper proposes Flooding Factor based Framework for Trust Management (F3TM) in MANETs. True flooding approach is utilized to identify attacker nodes based on the calculation of trust value. Route Discovery Algorithm is developed to discover an efficient and secure path for data forwarding using Experimental Grey Wolf algorithm for validating network nodes. Enhanced Multi-Swarm Optimization is used to optimize the identified delivery path. Simulations are carried out in ns2 to assess and compare the performance of F3TM with the state-of-the-art frameworks: CORMAN and PRIME considering the metrics including delay, packet delivery ration, overhead and throughput. The performance assessment attests the reliable security of F3TM compared to the state-of-the-art frameworks
    corecore