http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
Abdulrahman Al-Ahmari,Mohammad Ashfaq,Abdullah Alfaify,Basem Abdo,Abdulrahman Alomar,Abdelnaser Dawud 대한기계학회 2016 JOURNAL OF MECHANICAL SCIENCE AND TECHNOLOGY Vol.30 No.1
Electron beam melting (EBM) has been found to be a promising technology for producing complex shaped parts from gamma titaniumaluminide alloys (γ-TiAl). The parts produced by this process are projected to have dimensions very close to the desired final shapes. However, the surface roughness of the parts produced by EBM is excessively rough. In many applications, it is necessary to improve thequality of manufactured parts using a convenient post process. This paper determines process parameters of end milling when it is usedas a post process for the parts produced by EBM. Design of experiments has been used to study the effect of the selected input parametersof end milling (spindle speed, feed rate, depth of cut and coolant type) on the surface roughness of γ-TiAl parts. Response surface methodologyis used to develop a predictive model for surface roughness. Effects of the selected milling process are investigated. This paperalso optimizes the selected process parameters to minimize the value of the obtained surface roughness.
Xubin Ping,Zhiwu Li,Abdulrahman Al-Ahmari 제어·로봇·시스템학회 2017 International Journal of Control, Automation, and Vol.15 No.3
For linear parameter varying (LPV) systems with unknown scheduling parameters and bounded disturbance,a synthesis approach of dynamic output feedback robust model predictive control (OFRMPC) with inputsaturation is investigated. By pre-specifying partial controller parameters, a main optimization problem is solvedby convex optimization to reduce the on-line computational burden. The main optimization problem guarantees thatthe estimated state and estimation error converge within the corresponding invariant sets such that recursive feasibilityand robust stability are guaranteed. The consideration of input saturation in the main optimization problemimproves the control performance. Two numerical examples are given to illustrate the effectiveness of the approach.
Filtering and Intrusion Detection Approach for Secured Reconfigurable Mobile Systems
Rim Idriss,Adlen Loukil,Mohamed Khalgui,Zhiwu Li,Abdulrahman Al-Ahmari 대한전기학회 2017 Journal of Electrical Engineering & Technology Vol.12 No.5
This paper deals with reconfigurable secured mobile systems where the reconfigurability has the potential of providing a required adaptability to change the system requirements. The reconfiguration scenario is presented as a run-time automatic operation which allows security mechanisms and the addition-removal-update of software tasks. In particular, there is a definite requirement for filtering and intrusion detection mechanisms that will use fewer resources and also that will improve the security on the secured mobile devices. Filtering methods are used to control incoming traffic and messages, whereas, detection methods are used to detect malware events. Nevertheless, when different reconfiguration scenarios are applied at run-time, new security threats will be emerged against those systems which need to support multiple security objectives: Confidentiality, integrity and availability. We propose in this paper a new approach that efficiently detects threats after reconfigurable scenarios and which is based on filtering and intrusion detection methods. The paper’s contribution is applied to Android where the evaluation results demonstrate the effectiveness of the proposed middleware in order to detect the malicious events on reconfigurable secured mobile systems and the feasibility of running and executing such a system with the proposed solutions.
Filtering and Intrusion Detection Approach for Secured Reconfigurable Mobile Systems
Idriss, Rim,Loukil, Adlen,Khalgui, Mohamed,Li, Zhiwu,Al-Ahmari, Abdulrahman The Korean Institute of Electrical Engineers 2017 Journal of Electrical Engineering & Technology Vol.12 No.5
This paper deals with reconfigurable secured mobile systems where the reconfigurability has the potential of providing a required adaptability to change the system requirements. The reconfiguration scenario is presented as a run-time automatic operation which allows security mechanisms and the addition-removal-update of software tasks. In particular, there is a definite requirement for filtering and intrusion detection mechanisms that will use fewer resources and also that will improve the security on the secured mobile devices. Filtering methods are used to control incoming traffic and messages, whereas, detection methods are used to detect malware events. Nevertheless, when different reconfiguration scenarios are applied at run-time, new security threats will be emerged against those systems which need to support multiple security objectives: Confidentiality, integrity and availability. We propose in this paper a new approach that efficiently detects threats after reconfigurable scenarios and which is based on filtering and intrusion detection methods. The paper's contribution is applied to Android where the evaluation results demonstrate the effectiveness of the proposed middleware in order to detect the malicious events on reconfigurable secured mobile systems and the feasibility of running and executing such a system with the proposed solutions.