Abstract: Recently global concerns for the energy security have
steadily been on the increase and are expected to become a major
issue over the next few decades. Energy security refers to a resilient
energy system. This resilient system would be capable of
withstanding threats through a combination of active, direct security
measures and passive or more indirect measures such as redundancy,
duplication of critical equipment, diversity in fuel, other sources of
energy, and reliance on less vulnerable infrastructure. Threats and
disruptions (disturbances) to one part of the energy system affect
another. The paper presents methodology in theoretical background
about energy system as an interconnected network and energy supply
disturbances impact to the network. The proposed methodology uses
a network flow approach to develop mathematical model of the
energy system network as the system of nodes and arcs with energy
flowing from node to node along paths in the network.
Abstract: Nowadays wireless technology plays an important
role in public and personal communication. However, the growth of
wireless networking has confused the traditional boundaries between
trusted and untrusted networks. Wireless networks are subject to a
variety of threats and attacks at present. An attacker has the ability to
listen to all network traffic which becoming a potential intrusion.
Intrusion of any kind may lead to a chaotic condition. In addition,
improperly configured access points also contribute the risk to
wireless network. To overcome this issue, a security solution that
includes an intrusion detection and prevention system need to be
implemented. In this paper, first the security drawbacks of wireless
network will be analyzed then investigate the characteristics and also
the limitations on current wireless intrusion detection and prevention
system. Finally, the requirement of next wireless intrusion prevention
system will be identified including some key issues which should be
focused on in the future to overcomes those limitations.
Abstract: Dual motor drives fed by single inverter is
purposely designed to reduced size and cost with respect to
single motor drives fed by single inverter. Previous researches
on dual motor drives only focus on the modulation and the
averaging techniques. Only a few of them, study the
performance of the drives based on different speed controller
other than Proportional and Integrator (PI) controller. This
paper presents a detailed comparative study on fuzzy rule-base
in Fuzzy Logic speed Controller (FLC) for Dual Permanent
Magnet Synchronous Motor (PMSM) drives. Two fuzzy speed
controllers which are standard and simplified fuzzy speed
controllers are designed and the results are compared and
evaluated. The standard fuzzy controller consists of 49 rules
while the proposed controller consists of 9 rules determined by
selecting the most dominant rules only. Both designs are
compared for wide range of speed and the robustness of both
controllers over load disturbance changes is tested to
demonstrate the effectiveness of the simplified/reduced rulebase.
Abstract: In this paper, a multi-agent robot system is presented. The system consists of four robots. The developed robots are able to automatically enter and patrol a harmful environment, such as the building infected with virus or the factory with leaking hazardous gas. Further, every robot is able to perform obstacle avoidance and search for the victims. Several operation modes are designed: remote control, obstacle avoidance, automatic searching, and so on.
Abstract: Images of human iris contain specular highlights due
to the reflective properties of the cornea. This corneal reflection
causes many errors not only in iris and pupil center estimation but
also to locate iris and pupil boundaries especially for methods that
use active contour. Each iris recognition system has four steps:
Segmentation, Normalization, Encoding and Matching. In order to
address the corneal reflection, a novel reflection removal method is
proposed in this paper. Comparative experiments of two existing
methods for reflection removal method are evaluated on CASIA iris
image databases V3. The experimental results reveal that the
proposed algorithm provides higher performance in reflection
removal.
Abstract: The energy consumption of home femto base stations
(BSs) can be reduced, by turning off the Wi-Fi radio interface when
there is no mobile station (MS) under the coverage of the BSs or
MSs do not transmit or receive data packet for long time, especially
in late night. In the energy-efficient home femto BSs, if MSs have
any data packet to transmit and the Wi-Fi radio interface in off
state, MSs wake up the Wi-Fi radio interface of home femto BSs
by using additional low power radio interface. In this paper, the
performance of the energy-efficient home femto BSs from the aspect
of energy consumption and cumulative average delay, and show the
effect of various parameters on energy consumption and cumulative
average delay. From the results, the tradeoff relationship between
energy consumption and cumulative average delay is shown and thus,
appropriate operation should be needed to balance the tradeoff.
Abstract: A wireless Ad-hoc network consists of wireless nodes
communicating without the need for a centralized administration, in
which all nodes potentially contribute to the routing process.In this
paper, we report the simulation results of four different scenarios for
wireless ad hoc networks having thirty nodes. The performances of
proposed networks are evaluated in terms of number of hops per
route, delay and throughput with the help of OPNET simulator.
Channel speed 1 Mbps and simulation time 600 sim-seconds were
taken for all scenarios. For the above analysis DSR routing protocols
has been used. The throughput obtained from the above analysis
(four scenario) are compared as shown in Figure 3. The average
media access delay at node_20 for two routes and at node_20 for four
different scenario are compared as shown in Figures 4 and 5. It is
observed that the throughput will degrade when it will follow
different hops for same source to destination (i.e. it has dropped from
1.55 Mbps to 1.43 Mbps which is around 9.7%, and then dropped to
0.48Mbps which is around 35%).