Abstract: The power system utility has started to think about the green power technology in order to have an eco-friendly environment. The green power technology utilizes renewable energy sources for reduction of GHG emissions. Odisha state (India) is very rich in potential of renewable energy sources especially in solar energy (about 300 solar days), for installation of grid connected photovoltaic system. This paper focuses on the utilization of photovoltaic systems in an Institute building of Bhubaneswar city, Odisha. Different data like solar insolation (kW/m2/day), sunshine duration has been collected from metrological stations for Bhubaneswar city. The required electrical power and cost are calculated for daily load of 1.0 kW. The HOMER (Hybrid Optimization Model of Electric Renewable) software is used to estimate system size and its performance analysis. The simulation result shows that the cost of energy (COE) is $ 0.194/kWh, the Operating cost is $63/yr and the net present cost (NPC) is $3,917. The energy produced from PV array is 1,756kWh/yr and energy purchased from grid is 410kWh/yr. The AC primary load consumption is 1314 kWh/yr and the Grid sales are 746 kWh/yr. One battery is connected in parallel with 12V DC Bus and the usable nominal capacity 2.4 kWh with 9.6 h autonomy capacity.
Abstract: In an increasingly connected world, where speed of communication attempts to match the speed of thought and thus intentions; conflict gets actioned faster using media like the internet and telecommunication technology. This has led to a new form of aggression: “cyber bullying”. The present paper attempts to integrate existing theory on bullying, and the dark triad personality traits in a work environment and extrapolate it to the cyber context.
Abstract: The advent of Flexible AC Transmission Systems (FACTS) is giving rise to a new family of power electronic equipment emerging for controlling and optimizing the performance of power system, e.g. STATCOM. Static synchronous Compensator (STATCOM) is a commonly used FACTS device and has been successfully applied in power systems. In this sense, superconducting magnetic energy storage (SMES) in integration with a static synchronous compensator (STATCOM) is capable of supplying power systems with both active and reactive powers simultaneously and very rapidly, and thus is able to enhance the security dramatically. In this paper the structure and characteristics of the STATCOM/SMES is proposed. In addition, using a proper control scheme, STATCOM/ SMES is tested on an IEEE 3-bus system and more effective performance of the presented STATCOM/SMES compensator is evaluated with alone STATCOM through the dynamic simulation by using PSCAD/EMTDC software.
Abstract: Nanotechnology is the new cyber, according to several major leaders in this field. Just as cyber is entrenched across global society now, nano is poised to be major capabilities enabler of the next decades. Expert members from the National Nanotechnology Initiative (in U.S.) representing government and science disciplines say nano has great significance for the military and the general public. It is predicted that after next 15 years nanotechnology will replace information technology as the most economic technology platform. Nanotechnology has even wider applications than information technology.
Abstract: Botnets are one of the most serious and widespread
cyber threats. Today botnets have been facilitating many
cybercrimes, especially financial, top secret thefts. Botnets can be
available for lease in the market and are utilized by the
cybercriminals to launch massive attacks like DDoS, click fraud,
phishing attacks etc., Several large institutions, hospitals, banks,
government organizations and many social networks such as twitter,
facebook etc., became the target of the botmasters. Recently,
noteworthy researches have been carried out to detect bot, C&C
channels, botnet and botmasters. Using many sophisticated
technologies, botmasters made botnet a titan of the cyber world.
Innumerable challenges have been put forth by the botmasters to the
researchers in the detection of botnet. In this paper we present a
survey of different types of botnet C&C channels and also provide a
comparison of various botnet categories. Finally we hope that our
survey will create awareness for forthcoming botnet research
endeavors.
Abstract: Software Architecture is the basic structure of
software that states the development and advancement of a software
system. Software architecture is also considered as a significant tool
for the construction of high quality software systems. A clean design
leads to the control, value and beauty of software resulting in its
longer life while a bad design is the cause of architectural erosion
where a software evolution completely fails. This paper discusses the
occurrence of software architecture erosion and presents a set of
methods for the detection, declaration and prevention of architecture
erosion. The causes and symptoms of architecture erosion are
observed with the examples of prescriptive and descriptive
architectures and the practices used to stop this erosion are also
discussed by considering different types of software erosion and their
affects. Consequently finding and devising the most suitable
approach for fighting software architecture erosion and in some way
reducing its affect is evaluated and tested on different scenarios.
Abstract: Nowadays, Photovoltaic-PV Farms/ Parks and large
PV-Smart Grid Interface Schemes are emerging and commonly
utilized in Renewable Energy distributed generation. However, PVhybrid-
Dc-Ac Schemes using interface power electronic converters
usually has negative impact on power quality and stabilization of
modern electrical network under load excursions and network fault
conditions in smart grid. Consequently, robust FACTS based
interface schemes are required to ensure efficient energy utilization
and stabilization of bus voltages as well as limiting switching/fault
onrush current condition. FACTS devices are also used in smart grid-
Battery Interface and Storage Schemes with PV-Battery Storage
hybrid systems as an elegant alternative to renewable energy
utilization with backup battery storage for electric utility energy and
demand side management to provide needed energy and power
capacity under heavy load conditions. The paper presents a robust
interface PV-Li-Ion Battery Storage Interface Scheme for
Distribution/Utilization Low Voltage Interface using FACTS
stabilization enhancement and dynamic maximum PV power tracking
controllers.
Digital simulation and validation of the proposed scheme is done
using MATLAB/Simulink software environment for Low Voltage-
Distribution/Utilization system feeding a hybrid Linear-Motorized
inrush and nonlinear type loads from a DC-AC Interface VSC-6-
pulse Inverter Fed from the PV Park/Farm with a back-up Li-Ion
Storage Battery.
Abstract: Over the last few decades, oilfield service rolling
equipment has significantly increased in weight, primarily because of
emissions regulations, which require larger/heavier engines, larger
cooling systems, and emissions after-treatment systems, in some
cases, etc. Larger engines cause more vibration and shock loads,
leading to failure of electronics and control systems.
If the vibrating frequency of the engine matches the system
frequency, high resonance is observed on structural parts and mounts.
One such existing automated control equipment system comprising
wire rope mounts used for mounting computers was designed
approximately 12 years ago. This includes the use of an industrialgrade
computer to control the system operation. The original
computer had a smaller, lighter enclosure. After a few years, a newer
computer version was introduced, which was 10 lbm heavier. Some
failures of internal computer parts have been documented for cases in
which the old mounts were used. Because of the added weight, there
is a possibility of having the two brackets impact each other under
off-road conditions, which causes a high shock input to the computer
parts. This added failure mode requires validating the existing mount
design to suit the new heavy-weight computer.
This paper discusses the modal finite element method (FEM)
analysis and experimental modal analysis conducted to study the
effects of vibration on the wire rope mounts and the computer. The
existing mount was modelled in ANSYS software, and resultant
mode shapes and frequencies were obtained. The experimental modal
analysis was conducted, and actual frequency responses were
observed and recorded.
Results clearly revealed that at resonance frequency, the brackets
were colliding and potentially causing damage to computer parts. To
solve this issue, spring mounts of different stiffness were modeled in
ANSYS software, and the resonant frequency was determined.
Increasing the stiffness of the system increased the resonant
frequency zone away from the frequency window at which the engine
showed heavy vibrations or resonance. After multiple iterations in
ANSYS software, the stiffness of the spring mount was finalized,
which was again experimentally validated.
Abstract: Electric vehicles are one of the most complicated
electric devices to simulate due to the significant number of different
processes involved in electrical structure of it. There are concurrent
processes of energy consumption and generation with different
onboard systems, which make simulation tasks more complicated to
perform. More accurate simulation on energy consumption can
provide a better understanding of all energy management for electric
transport. As a result of all those processes, electric transport can
allow for a more sustainable future and become more convenient in
relation to the distance range and recharging time. This paper
discusses the problems of energy consumption simulations for
electric vehicles using different software packages to provide ideas
on how to make this process more precise, which can help engineers
create better energy management strategies for electric vehicles.
Abstract: A Distributed Denial of Service (DDoS) attack is a
major threat to cyber security. It originates from the network layer or
the application layer of compromised/attacker systems which are
connected to the network. The impact of this attack ranges from the
simple inconvenience to use a particular service to causing major
failures at the targeted server. When there is heavy traffic flow to a
target server, it is necessary to classify the legitimate access and
attacks. In this paper, a novel method is proposed to detect DDoS
attacks from the traces of traffic flow. An access matrix is created
from the traces. As the access matrix is multi dimensional, Principle
Component Analysis (PCA) is used to reduce the attributes used for
detection. Two classifiers Naive Bayes and K-Nearest neighborhood
are used to classify the traffic as normal or abnormal. The
performance of the classifier with PCA selected attributes and actual
attributes of access matrix is compared by the detection rate and
False Positive Rate (FPR).
Abstract: Early pre-code reinforced concrete structures present
undetermined resistance to earthquakes. This situation is particularly
unacceptable in the case of essential structures, such as healthcare
structures and pilgrims' houses. Amongst these, an existing old RC
building in Madinah city (KSA) is seismically evaluated with and
without infill wall and their dynamic characteristics are compared
with measured values in the field using ambient vibration
measurements (AVM). After updating the mathematical models for
this building with the experimental results, three dimensional
pushover analysis (Nonlinear static analysis) was carried out using
commercial structural analysis software incorporating inelastic
material properties for concrete, infill and steel. The purpose of this
analysis is to evaluate the expected performance of structural systems
by estimating, strength and deformation demands in design, and
comparing these demands to available capacities at the performance
levels of interest. The results summarized and discussed.
Abstract: An existing RC building in Madinah is seismically
evaluated with and without infill wall. Four model systems have been
considered i.e. model I (no infill), model IIA (strut infill-update from
field test), model IIB (strut infill- ASCE/SEI 41) and model IIC (strut
infill-Soft storey- ASCE/SEI 41). Three dimensional pushover
analyses have been carried out using SAP2000 software
incorporating inelastic material behavior for concrete, steel and infill
walls. Infill wall has been modeled as equivalent strut according to
suggested equation matching field test measurements and to the
ASCE/SEI 41 equation. The effect of building modeling on the
performance point as well as capacity and demand spectra due to EQ
design spectrum function in Madinah area has been investigated. The
response modification factor (R) for the 5 story RC building is
evaluated from capacity and demand spectra (ATC-40) for the
studied models. The results are summarized and discussed.
Abstract: This paper introduces novel approaches to partitioning
and mapping in terms of model-based embedded multicore system
engineering and further discusses benefits, industrial relevance and
features in common with existing approaches. In order to assess
and evaluate results, both approaches have been applied to a real
industrial application as well as to various prototypical demonstrative
applications, that have been developed and implemented for
different purposes. Evaluations show, that such applications improve
significantly according to performance, energy efficiency, meeting
timing constraints and covering maintaining issues by using
the AMALTHEA platform and the implemented approaches.
Furthermore, the model-based design provides an open, expandable,
platform independent and scalable exchange format between
OEMs, suppliers and developers on different levels. Our proposed
mechanisms provide meaningful multicore system utilization since
load balancing by means of partitioning and mapping is effectively
performed with regard to the modeled systems including hardware,
software, operating system, scheduling, constraints, configuration and
more data.
Abstract: In this paper we describe one critical research
program within a complex, ongoing multi-year project (2010 to 2014
inclusive) with the overall goal to improve the learning outcomes for
first year undergraduate commerce/business students within an
Information Systems (IS) subject with very large enrolment. The
single research program described in this paper is the analysis of
student attitudes and decision making in relation to the availability of
formative assessment feedback via Web-based real time conferencing
and document exchange software (Adobe Connect). The formative
assessment feedback between teaching staff and students is in respect
of an authentic problem-based, team-completed assignment. The
analysis of student attitudes and decision making is investigated via
both qualitative (firstly) and quantitative (secondly) application of the
Theory of Planned Behavior (TPB) with a two statistically-significant
and separate trial samples of the enrolled students. The initial
qualitative TPB investigation revealed that perceived self-efficacy,
improved time-management, and lecturer-student relationship
building were the major factors in shaping an overall favorable
student attitude to online feedback, whilst some students expressed
valid concerns with perceived control limitations identified within the
online feedback protocols. The subsequent quantitative TPB
investigation then confirmed that attitude towards usage, subjective
norms surrounding usage, and perceived behavioral control of usage
were all significant in shaping student intention to use the online
feedback protocol, with these three variables explaining 63 percent of
the variance in the behavioral intention to use the online feedback
protocol. The identification in this research of perceived behavioral
control as a significant determinant in student usage of a specific
technology component within a virtual learning environment (VLE)
suggests that VLEs could now be viewed not as a single, atomic
entity, but as a spectrum of technology offerings ranging from the
mature and simple (e.g., email, Web downloads) to the cutting-edge
and challenging (e.g., Web conferencing and real-time document
exchange). That is, that all VLEs should not be considered the same.
The results of this research suggest that tertiary students have the
technological sophistication to assess a VLE in this more selective
manner.
Abstract: Iran has several potential for using renewable
energies, so use them could significantly contribute to energy supply.
The purpose of this paper is to identify the potential of the country
and select the appropriate DG technologies with consideration the
potential and primary energy resources in the regions. In this context,
hybrid energy systems proportionate with the potential of different
regions will be determined based on technical, economic, and
environmental aspect. In the following the proposed structure will be
optimized in terms of size and cost. DG technologies used in this
project include photovoltaic system, wind turbine, diesel generator
and battery bank. The HOMER software is applied for choosing the
appropriate structure and the optimization of system sizing. The
results have been analyzed in terms of technical and economic. The
performance and the cost of each project demonstrate the appropriate
structure of hybrid energy system in that region.
Abstract: It is important to take security measures to protect
your computer information, reduce identify theft, and prevent from
malicious cyber-attacks. With cyber-attacks on the continuous rise,
people need to understand and learn ways to prevent from these
attacks. Cyber-attack is an important factor to be considered if one is
to be able to protect oneself from malicious attacks. Without proper
security measures, most computer technology would hinder home
users more than such technologies would help. Knowledge of how
cyber-attacks operate and protective steps that can be taken to reduce
chances of its occurrence are key to increasing these security
measures. The purpose of this paper is to inform home users on the
importance of identifying and taking preventive steps to avoid cyberattacks.
Throughout this paper, many aspects of cyber-attacks will be
discuss: what a cyber-attack is, the affects of cyber-attack for home
users, different types of cyber-attacks, methodology to prevent such
attacks; home users can take to fortify security of their computer.
Abstract: Applications of the Hausdorff space and its mappings
into tangent spaces are outlined, including their fractal dimensions
and self-similarities. The paper details this theory set up and further
describes virtualizations and atomization of manufacturing processes.
It demonstrates novel concurrency principles that will guide
manufacturing processes and resources configurations. Moreover,
varying levels of details may be produced by up folding and breaking
down of newly introduced generic models. This choice of layered
generic models for units and systems aspects along specific aspects
allows research work in parallel to other disciplines with the same
focus on all levels of detail. More credit and easier access are granted
to outside disciplines for enriching manufacturing grounds. Specific
mappings and the layers give hints for chances for interdisciplinary
outcomes and may highlight more details for interoperability
standards, as already worked on the international level. The new rules
are described, which require additional properties concerning all
involved entities for defining distributed decision cycles, again on the
base of self-similarity. All properties are further detailed and assigned
to a maturity scale, eventually displaying the smartness maturity of a
total shopfloor or a factory. The paper contributes to the intensive
ongoing discussion in the field of intelligent distributed
manufacturing and promotes solid concepts for implementations of
Cyber Physical Systems and the Internet of Things into
manufacturing industry, like industry 4.0, as discussed in German-speaking
countries.
Abstract: In this study, polycaprolactone (PCL) was dissolved
in chloroform:ethanol solvent system at a concentration of 18 w/v %.
1, 2, 4, and 6 droplets of formic acid were added to the prepared 10ml
PCL-chloroform:ethanol solutions separately. Fibrous webs were
produced by electrospinning technique based on the horizontal
working principle. Morphology of the webs was investigated by
using scanning electron microscopy (SEM) whereas fiber diameters
were measured by Image J Software System. The effect of formic
acid addition to the mostly used chloroform solvent on fiber
morphology was examined.
Results indicate that there is a distinct fall in fiber diameter with
the addition of formic acid drops. The average fiber diameter was
measured as 2.22μm in PCL /chloroform:ethanol solution system. On
the other hand, 328nm and 256 nm average fiber diameters were
measured for the samples of 4 drops and 6 drops formic acid added.
This study offers alternative solvent systems to produce nanoscaled,
nontoxic PCL fibrous webs by electrospinning technique.
Abstract: Flexible AC Transmission Systems (FACTS) is
granting a new group of advanced power electronic devices emerging
for enhancement of the power system performance. Unified Power
Flow Controller (UPFC) is a recent version of FACTS devices for
power system applications. The back-up energy supply system
incorporated with UPFC is providing a complete control of real and
reactive power at the same time and hence is competent to improve
the performance of an electrical power system. In this article, backup
energy supply unit such as superconducting magnetic energy storage
(SMES) is integrated with UPFC. In addition, comparative
exploration of UPFC–battery, UPFC–UC and UPFC–SMES
performance is evaluated through the vibrant simulation by using
MATLAB/Simulink software.
Abstract: All the software engineering researches and best
industry practices aim at providing software products with high
degree of quality and functionality at low cost and less time. These
requirements are addressed by the Component Based Software
Engineering (CBSE) as well. CBSE, which deals with the software
construction by components’ assembly, is a revolutionary extension
of Software Engineering. CBSE must define and describe processes
to assure timely completion of high quality software systems that are
composed of a variety of pre built software components. Though
these features provide distinct and visible benefits in software design
and programming, they also raise some challenging problems. The
aim of this work is to summarize the pertinent issues and
considerations in CBSE to make an understanding in forms of
concepts and observations that may lead to development of newer
ways of dealing with the problems and challenges in CBSE.