Abstract: One of the key aspects of power quality improvement
in power system is the mitigation of voltage sags/swells and flicker.
Custom power devices have been known as the best tools for voltage
disturbances mitigation as well as reactive power compensation.
Dynamic Voltage Restorer (DVR) which is the most efficient and
effective modern custom power device can provide the most
commercial solution to solve several problems of power quality in
distribution networks. This paper deals with analysis and simulation
technique of DVR based on instantaneous power theory which is a
quick control to detect signals. The main purpose of this work is to
remove three important disturbances including voltage sags/swells
and flicker. Simulation of the proposed method was carried out on
two sample systems by using Matlab software environment and the
results of simulation show that the proposed method is able to
provide desirable power quality in the presence of wide range of
disturbances.
Abstract: High density electrical prospecting has been widely
used in groundwater investigation, civil engineering and
environmental survey. For efficient inversion, the forward modeling
routine, sensitivity calculation, and inversion algorithm must be
efficient. This paper attempts to provide a brief summary of the past
and ongoing developments of the method. It includes reviews of the
procedures used for data acquisition, processing and inversion of
electrical resistivity data based on compilation of academic literature.
In recent times there had been a significant evolution in field survey
designs and data inversion techniques for the resistivity method. In
general 2-D inversion for resistivity data is carried out using the
linearized least-square method with the local optimization technique
.Multi-electrode and multi-channel systems have made it possible to
conduct large 2-D, 3-D and even 4-D surveys efficiently to resolve
complex geological structures that were not possible with traditional
1-D surveys. 3-D surveys play an increasingly important role in very
complex areas where 2-D models suffer from artifacts due to off-line
structures. Continued developments in computation technology, as
well as fast data inversion techniques and software, have made it
possible to use optimization techniques to obtain model parameters to
a higher accuracy. A brief discussion on the limitations of the
electrical resistivity method has also been presented.
Abstract: This paper is aimed at proposing a rhombus shaped
wearable fractal antenna for wireless communication systems. The
geometrical descriptors of the antenna have been obtained using
bacterial foraging optimization (BFO) for wide band operation. The
method of moment based IE3D software has been used to simulate
the antenna and observed that miniaturization of 13.08% has been
achieved without degrading the resonating properties of the proposed
antenna. An analysis with different substrates has also been done in
order to evaluate the effectiveness of electrical permittivity on the
presented structure. The proposed antenna has low profile, light
weight and has successfully demonstrated wideband and multiband
characteristics for wearable electronic applications.
Abstract: This paper examines the system protection for cyber-physical
systems (CPS). CPS are particularly characterized by their
networking system components. This means they are able to adapt to
the needs of their users and its environment. With this ability, CPS
have new, specific requirements on the protection against anti-counterfeiting,
know-how loss and manipulation. They increase the
requirements on system protection because piracy attacks can be
more diverse, for example because of an increasing number of
interfaces or through the networking abilities. The new requirements
were identified and in a next step matched with existing protective
measures. Due to the found gap the development of new protection
measures has to be forced to close this gap. Moreover a comparison
of the effectiveness between selected measures was realized and the
first results are presented in this paper.
Abstract: Among various active filters, shunt active filter is a
viable solution for reactive power and harmonics compensation. In
this paper, the SRF plan is used to generate current reference for
compensation and conventional PI controllers were used as the
controller to compensate the reactive power. The design of the closed
loop controllers is reserved simple by modeling them as first order
systems. Computationally uncomplicated and efficient SVM system
is used in the present work for better utilization of dc bus voltage.
The rating of shunt active filter has been finalized based on the
reactive power demand of the selected reactive load. The proposed
control and SVM technique are validated by simulating in MATLAB
software.
Abstract: Nowadays, the rapid development of CAD systems’
programming environments results in the creation of multiple
downstream applications, which are developed and becoming
increasingly available. CAD based manufacturing simulations is
gradually following the same trend. Drilling is the most popular holemaking
process used in a variety of industries. A specially built piece
of software that deals with the drilling kinematics is presented. The
cutting forces are calculated based on the tool geometry, the cutting
conditions and the tool/work-piece materials. The results are verified
by experimental work. Finally, the response surface methodology
(RSM) is applied and mathematical models of the total thrust force
and the thrust force developed because of the main cutting edges are
proposed.
Abstract: Security can be defined as the degree of resistance to, or protection from harm. It applies to any vulnerable and valuable assets, such as persons, dwellings, communities, nations or organizations. Cybercrime is any crime committed or facilitated via the Internet. It is any criminal activity involving computers and networks. It can range from fraud to unsolicited emails (spam). It includes the distant theft of government or corporate secrets through criminal trespass into remote systems around the globe. Nigeria like any other nations of the world is currently having her own share of the menace that has been used even as tools by terrorists. This paper is an attempt at presenting cyber security as an issue that requires a coordinated national response. It also acknowledges and advocates the key roles to be played by stakeholders and the importance of forging strong partnerships to prevent and tackle cybercrime in Nigeria.
Abstract: Rapidly changing factors that affect daily life also affect operational environment and the way military leaders fulfill their missions. With the help of technological developments, traditional linearity of conflict and war has started to fade away. Furthermore, mission domain has broadened to include traditional threats, hybrid threats and new challenges of cyber and space. Considering the future operational environment, future military leaders need to adapt themselves to the new challenges of the future battlefield. But how to decide what kind of features of leadership are required to operate and accomplish mission in the new complex battlefield? In this article, the main aim is to provide answers to this question. To be able to find right answers, first leadership and leadership components are defined, and then characteristics of future operational environment are analyzed. Finally, leadership features that are required to be successful in redefined battlefield are explained.
Abstract: Electrohydraulic servo system have been used in industry in a wide number of applications. Its dynamics are highly nonlinear and also have large extent of model uncertainties and external disturbances. In this paper, a robust back-stepping control (RBSC) scheme is proposed to overcome the problem of disturbances and system uncertainties effectively and to improve the tracking performance of EHS systems. In order to implement the proposed control scheme, the system uncertainties in EHS systems are considered as total leakage coefficient and effective oil volume. In addition, in order to obtain the virtual controls for stabilizing system, the update rule for the system uncertainty term is induced by the Lyapunov control function (LCF). To verify the performance and robustness of the proposed control system, computer simulation of the proposed control system using Matlab/Simulink Software is executed. From the computer simulation, it was found that the RBSC system produces the desired tracking performance and has robustness to the disturbances and system uncertainties of EHS systems.
Abstract: This paper presents an application of a “Systematic
Soft Domain Driven Design Framework” as a soft systems approach
to domain-driven design of information systems development. The
framework use SSM as a guiding methodology within which we have
embedded a sequence of design tasks based on the UML leading to
the implementation of a software system using the Naked Objects
framework. This framework have been used in action research
projects that have involved the investigation and modelling of
business processes using object-oriented domain models and the
implementation of software systems based on those domain models.
Within this framework, Soft Systems Methodology (SSM) is used as
a guiding methodology to explore the problem situation and to
develop the domain model using UML for the given business
domain. The framework is proposed and evaluated in our previous
works, and a real case study “Information Retrieval System for
academic research” is used, in this paper, to show further practice and
evaluation of the framework in different business domain. We argue
that there are advantages from combining and using techniques from
different methodologies in this way for business domain modelling.
The framework is overviewed and justified as multimethodology
using Mingers multimethodology ideas.
Abstract: Cyberspace has become a more viable arena for
budding artists to share musical acts through digital forms. The
increasing relevance of online communities has attracted scholars
from various fields demonstrating its influence on social capital. This
paper extends this understanding of social capital among Filipino
music artists belonging to the SoundCloud Philippines Facebook
Group.
The study makes use of various qualitative data obtained from
key-informant interviews and participant observation of online and
physical encounters, analyzed using the case study approach.
Soundcloud Philippines has over seven-hundred members and is
composed of Filipino singers, instrumentalists, composers, arrangers,
producers, multimedia artists and event managers. Group interactions
are a mix of online encounters based on Facebook and SoundCloud
and physical encounters through meet-ups and events. Benefits
reaped from the community are informational, technical,
instrumental, promotional, motivational and social support. Under the
guidance of online group administrators, collaborative activities such
as music productions, concerts and events transpire. Most conflicts
and problems arising are resolved peacefully. Social capital in
SoundCloud Philippines is mobilized through recognition, respect
and reciprocity.
Abstract: Waste Load Allocation (WLA) strategies usually
intend to find economic policies for water resource management.
Water quality trading (WQT) is an approach that uses discharge
permit market to reduce total environmental protection costs. This
primarily requires assigning discharge limits known as total
maximum daily loads (TMDLs). These are determined by monitoring
organizations with respect to the receiving water quality and
remediation capabilities. The purpose of this study is to compare two
approaches of TMDL assignment for WQT policy in small catchment
area of Haraz River, in north of Iran. At first, TMDLs are assigned
uniformly for the whole point sources to keep the concentrations of
BOD and dissolved oxygen (DO) at the standard level at checkpoint
(terminus point). This was simply simulated and controlled by
Qual2kw software. In the second scenario, TMDLs are assigned
using multi objective particle swarm optimization (MOPSO) method
in which the environmental violation at river basin and total treatment
costs are minimized simultaneously. In both scenarios, the equity
index and the WLA based on trading discharge permits (TDP) are
calculated. The comparative results showed that using economically
optimized TMDLs (2nd scenario) has slightly more cost savings rather
than uniform TMDL approach (1st scenario). The former annually
costs about 1 M$ while the latter is 1.15 M$. WQT can decrease
these annual costs to 0.9 and 1.1 M$, respectively. In other word,
these approaches may save 35 and 45% economically in comparison
with command and control policy. It means that using multi objective
decision support systems (DSS) may find more economical WLA,
however its outcome is not necessarily significant in comparison with
uniform TMDLs. This may be due to the similar impact factors of
dischargers in small catchments. Conversely, using uniform TMDLs
for WQT brings more equity that makes stakeholders not feel that
much envious of difference between TMDL and WQT allocation. In
addition, for this case, determination of TMDLs uniformly would be
much easier for monitoring. Consequently, uniform TMDL for TDP
market is recommended as a sustainable approach. However,
economical TMDLs can be used for larger watersheds.
Abstract: Cyber exercises used to assess the preparedness of a
community against cyber crises, technology failures and Critical
Information Infrastructure (CII) incidents. The cyber exercises also
called cyber crisis exercise or cyber drill, involved partnerships or
collaboration of public and private agencies from several sectors.
This study investigates Organisation Cyber Resilience (OCR) of
participation sectors in cyber exercise called X Maya in Malaysia.
This study used a principal based cyber resilience survey called CSuite
Executive checklist developed by World Economic Forum in
2012. To ensure suitability of the survey to investigate the OCR, the
reliability test was conducted on C-Suite Executive checklist items.
The research further investigates the differences of OCR in ten
Critical National Infrastructure Information (CNII) sectors
participated in the cyber exercise. The One Way ANOVA test result
showed a statistically significant difference of OCR among ten CNII
sectors participated in the cyber exercise.
Abstract: The use of Flexible AC Transmission System
(FACTS) devices in a power system can potentially overcome
limitations of the present mechanically controlled transmission
system. Also, the advance of technology makes possible to include
new energy storage devices in the electrical power system. The
integration of Superconducting Magnetic Energy Storage (SMES)
into Static Synchronous Compensator (STATCOM) can lead to
increase their flexibility in improvement of power system dynamic
behaviour by exchanging both active and reactive powers with power
grids. This paper describes structure and behaviour of SMES,
specifications and performance principles of the STATCOM/SMES
compensator. Moreover, the benefits and effectiveness of integrated
SMES with STATCOM in power systems is presented. Also, the
performance of the STATCOM/SMES compensator is evaluated
using an IEEE 3-bus system through the dynamic simulation by
PSCAD/EMTDC software.
Abstract: The teaching of computer programming for beginners
has been generally considered as a difficult and challenging task.
Several methodologies and research tools have been developed,
however, the difficulty of teaching still remains. Our work integrates
the state of the art in teaching programming with game software and
further provides metrics for the evaluation of student performance in
a collaborative activity of playing games. This paper aims to present a
multi-agent system architecture to be incorporated to the educational
collaborative game software for teaching programming that monitors,
evaluates and encourages collaboration by the participants. A
literature review has been made on the concepts of Collaborative
Learning, Multi-agents systems, collaborative games and techniques
to teach programming using these concepts simultaneously.
Abstract: Electrohydraulic servo system have been used in
industry in a wide number of applications. Its dynamics are highly
nonlinear and also have large extent of model uncertainties and
external disturbances. In this paper, a robust back-stepping control
(RBSC) scheme is proposed to overcome the problem of disturbances
and system uncertainties effectively and to improve the tracking
performance of EHS systems. In order to implement the proposed
control scheme, the system uncertainties in EHS systems are
considered as total leakage coefficient and effective oil volume. In
addition, in order to obtain the virtual controls for stabilizing system,
the update rule for the system uncertainty term is induced by
the Lyapunov control function (LCF). To verify the performance and
robustness of the proposed control system, computer simulation of
the proposed control system using Matlab/Simulink Software
is executed. From the computer simulation, it was found that the
RBSC system produces the desired tracking performance and has
robustness to the disturbances and system uncertainties of EHS
systems.
Abstract: The current tools for real time management of sewer
systems are based on two software tools: the software of weather
forecast and the software of hydraulic simulation. The use of the first
ones is an important cause of imprecision and uncertainty, the use of
the second requires temporal important steps of decision because of
their need in times of calculation. This way of proceeding fact that
the obtained results are generally different from those waited. The major idea of this project is to change the basic paradigm by
approaching the problem by the "automatic" face rather than by that
"hydrology". The objective is to make possible the realization of a
large number of simulations at very short times (a few seconds)
allowing to take place weather forecasts by using directly the real
time meditative pluviometric data. The aim is to reach a system
where the decision-making is realized from reliable data and where
the correction of the error is permanent. A first model of control laws was realized and tested with different
return-period rainfalls. The gains obtained in rejecting volume vary
from 19 to 100 %. The development of a new algorithm was then
used to optimize calculation time and thus to overcome the
subsequent combinatorial problem in our first approach. Finally, this
new algorithm was tested with 16- year-rainfall series. The obtained
gains are 40 % of total volume rejected to the natural environment
and of 65 % in the number of discharges.
Abstract: E-retailing is the sale of goods online that takes place
over the Internet. The Internet has shrunk the entire World. World eretailing
is growing at an exponential rate in the Americas, Europe
and Asia. However, e-retailing costs require expensive investment,
such as hardware, software, and security systems. Cloud computing
technology is internet-based computing for the management and
delivery of applications and services. Cloud-based e-retailing
application models allow enterprises to lower their costs with their
effective implementation of e-retailing activities. In this paper, we
describe the concept of cloud computing and present the architecture
of cloud computing, combining the features of e-retailing. In
addition, we propose a strategy for implementing cloud computing
with e-retailing. Finally, we explain the benefits from the
architecture.
Abstract: This paper presents the interface ConductHome which
controls home automation systems with a Leap Motion using
“invariant gesture protocols”. This interface is meant to simplify the
interaction of the user with its environment. A hardware part allows
the Leap Motion to be carried around the house. A software part
interacts with the home automation box and displays the useful
information for the user. An objective of this work is the
development of a natural/invariant/simple gesture control interface to
help elder people/people with disabilities.
Abstract: Cloud Computing refers to applications delivered as
services over the internet, and the datacenters that provide those
services with hardware and systems software. These were earlier
referred to as Software as a Service (SaaS). Scheduling is justified by
job components (called tasks), lack of information. In fact, in a large
fraction of jobs from machine learning, bio-computing, and image
processing domains, it is possible to estimate the maximum time
required for a task in the job. This study focuses on Trust based
scheduling to improve cloud security by modifying Heterogeneous
Earliest Finish Time (HEFT) algorithm. It also proposes TR-HEFT
(Trust Reputation HEFT) which is then compared to Dynamic Load
Scheduling.