In order to determine the deformation modes in AZ31 magnesium alloy at room temperature, computer simulations of deformation
texture development and calculation of formability have been carried out. The simulation results were compared with the measured
texture results. Based on agreement between the experiments and simulations the active deformation modes were determined.
A Visco Plastic Self Consistent model was employed for the simulation of plastic deformation. Simulations and experiments
were performed for different initial textures. The goal of the study was to develop the understanding of deformation texture
evolution and its effects on mechanical properties of magnesium, with an ultimate goal of improving room temperature formability
of magnesium alloys.
This article was presented at Materials Science & Technology 2006, Innovations in Metal Forming symposium held in Cincinnati,
OH, October 15-19, 2006. 相似文献
In this paper, a novel pyramid coding based rate control scheme is proposed for video streaming applications constrained by a constant channel bandwidth. To achieve the target bit rate with the best quality, the initial quantization parameter (QP) is determined by the average spatio-temporal complexity of the sequence, its resolution and the target bit rate. Simple linear estimation models are then used to predict the number of bits that would be necessary to encode a frame for a given complexity and QP. The experimental results demonstrate that the proposed rate control scheme significantly outperforms the existing rate control scheme in the Joint Model (JM) reference software in terms of Peak Signal to Noise Ratio (PSNR) and consistent perceptual visual quality while achieving the target bit rate. Finally, the proposed scheme is validated through experimental evaluation over a miniature test-bed.
Limb repositioning is necessary for individuals with severe physical disabilities to sustain muscle strength and prevent pressure sores. As robotic technologies become ubiquitous, these tools offer promise to support the repositioning process. However, research has yet to focus on ways in which individuals with severe physical disabilities can control robots for these tasks. This paper presents a study that examines the needs and attitudes of potential users with physical disabilities to control a robotic aid for limb repositioning. Subjects expressed interest in using brain–computer interface (BCI) and speech recognition technologies for purposes of executing robotic tasks. The performance of four subjects controlling arm movements on an avatar through the keyboard, mouse, BCI, and Dragon NaturallySpeaking speech recognition was evaluated. Although BCI and speech technologies may limit physical fatigue, more challenges were faced using BCI and speech conditions compared to the keyboard and mouse. This research promotes accessibility into mainstream robotic technologies and represents the first step in the development of a robotic prototype using a BCI and speech recognition technologies for limb repositioning. 相似文献
We propose an optical scheme for quantum key distribution in which bits are encoded in relative phases of four bipartite weak coherent states${|\alpha, \alpha\rangle, |-\alpha, -\alpha\rangle, |-\alpha, \alpha\rangle}$ and ${|\alpha, -\alpha \rangle}$, with respect to a strong reference pulse. We discuss security of the scheme against eavesdropping strategies like, photon number splitting, photon beam splitting and intercept-resend attacks. It is found that present scheme is more sensitive against these eavesdropping strategies than the two-dimensional non-orthogonal state based protocol and BB84 protocol. Our scheme is very simple, requires only passive optical elements like beam splitters, phase shifters and photon detectors, hence is at the reach of presently available technology. 相似文献
Number of software applications demands various levels of security at the time of scheduling in Computational Grid. Grid may offer these securities but may result in the performance degradation due to overhead in offering the desired security. Scheduling performance in a Grid is affected by the heterogeneities of security and computational power of resources. Customized Genetic Algorithms have been effectively used for solving complex optimization problems (NP Hard) and various heuristics have been suggested for solving Multi-objective optimization problems. In this paper a security driven, elitist non-dominated sorting genetic algorithm, Optimal Security with Optimal Overhead Scheduling (OSO2S), based on NSGA-II, is proposed. The model considers dual objectives of minimizing the security overhead and maximizing the total security achieved. Simulation results exhibit that the proposed algorithm delivers improved makespan and lesser security overhead in comparison to other such algorithms viz. MinMin, MaxMin, SPMinMin, SPMaxMin and SDSG. 相似文献
In this paper, an Adaptive Hierarchical Ant Colony Optimization (AHACO) has been proposed to resolve the traditional machine
loading problem in Flexible Manufacturing Systems (FMS). Machine loading is one of the most important issues that is interlinked
with the efficiency and utilization of FMS. The machine loading problem is formulated in order to minimize the system unbalance
and maximize the throughput, considering the job sequencing, optional machines and technological constraints. The performance
of proposed AHACO has been tested over a number of benchmark problems taken from the literature. Computational results indicate
that the proposed algorithm is more effective and produces promising results as compared to the existing solution methodologies
in the literature. The evaluation and comparison of system efficiency and system utilization justifies the supremacy of the
algorithm. Further, results obtained from the proposed algorithm have been compared with well known random search algorithm
viz. genetic algorithm, simulated annealing, artificial Immune system, simple ant colony optimization, tabu search etc. In
addition, the algorithm has been tested over a randomly generated problem set of varying complexities; the results validate
the robustness and scalability of the algorithm utilizing the concepts of ‘heuristic gap’ and ANOVA analysis. 相似文献