Abstract: This paper describes a simple way to control the speed
of PMBLDC motor using Fuzzy logic control method. In the
conventional PI controller the performance of the motor system is
simulated and the speed is regulated by using PI controller. These
methods used to improve the performance of PMSM drives, but in
some cases at different operating conditions when the dynamics of
the system also vary over time and it can change the reference speed,
parameter variations and the load disturbance. The simulation is
powered with the MATLAB program to get a reliable and flexible
simulation. In order to highlight the effectiveness of the speed control
method the FLC method is used. The proposed method targeted in
achieving the improved dynamic performance and avoids the
variations of the motor drive. This drive has high accuracy, robust
operation from near zero to high speed. The effectiveness and
flexibility of the individual techniques of the speed control method
will be thoroughly discussed for merits and demerits and finally
verified through simulation and experimental results for comparative
analysis.
Abstract: Wireless networks are built upon the open shared
medium which makes easy for attackers to conduct malicious
activities. Jamming is one of the most serious security threats to
information economy and it must be dealt efficiently. Jammer
prevents legitimate data to reach the receiver side and also it
seriously degrades the network performance. The objective of this
paper is to provide a general overview of jamming in wireless
network. It covers relevant works, different jamming techniques,
various types of jammers and typical prevention techniques.
Challenges associated with comparing several anti-jamming
techniques are also highlighted.
Abstract: Cloud Computing refers to applications delivered as
services over the internet, and the datacenters that provide those
services with hardware and systems software. These were earlier
referred to as Software as a Service (SaaS). Scheduling is justified by
job components (called tasks), lack of information. In fact, in a large
fraction of jobs from machine learning, bio-computing, and image
processing domains, it is possible to estimate the maximum time
required for a task in the job. This study focuses on Trust based
scheduling to improve cloud security by modifying Heterogeneous
Earliest Finish Time (HEFT) algorithm. It also proposes TR-HEFT
(Trust Reputation HEFT) which is then compared to Dynamic Load
Scheduling.
Abstract: Web mining is to discover and extract useful
Information. Different users may have different search goals when
they search by giving queries and submitting it to a search engine.
The inference and analysis of user search goals can be very useful for
providing an experience result for a user search query. In this project,
we propose a novel approach to infer user search goals by analyzing
search web logs. First, we propose a novel approach to infer user
search goals by analyzing search engine query logs, the feedback
sessions are constructed from user click-through logs and it
efficiently reflect the information needed for users. Second we
propose a preprocessing technique to clean the unnecessary data’s
from web log file (feedback session). Third we propose a technique
to generate pseudo-documents to representation of feedback sessions
for clustering. Finally we implement k-medoids clustering algorithm
to discover different user search goals and to provide a more optimal
result for a search query based on feedback sessions for the user.
Abstract: Communicating users' needs, goals and problems help
designers and developers overcome challenges faced by end users.
Personas are used to represent end users’ needs. In our research,
creating personas allowed the following questions to be answered:
Who are the potential user groups? What do they want to achieve by
using the service? What are the problems that users face? What
should the service provide to them? To develop realistic personas, we
conducted a focus group discussion with undergraduate and graduate
students and also interviewed a university librarian. The personas
were created to help evaluating the Institutional Repository that is
based on the DSpace system. The profiles helped to communicate
users' needs, abilities, tasks, and problems, and the task scenarios
used in the heuristic evaluation were based on these personas. Four
personas resulted of a focus group discussion with undergraduate and
graduate students and from interviewing a university librarian. We
then used these personas to create focused task-scenarios for a
heuristic evaluation on the system interface to ensure that it met
users' needs, goals, problems and desires. In this paper, we present
the process that we used to create the personas that led to devise the
task scenarios used in the heuristic evaluation as a follow up study of
the DSpace university repository.
Abstract: In this paper, we propose a new method for threedimensional
object indexing based on D.A.M.C-S.H.C descriptor
(Direct and Analytical Method for Calculating the Spherical
Harmonics Coefficients). For this end, we propose a direct
calculation of the coefficients of spherical harmonics with perfect
precision. The aims of the method are to minimize, the processing
time on the 3D objects database and the searching time of similar
objects to a request object.
Firstly we start by defining the new descriptor using a new
division of 3-D object in a sphere. Then we define a new distance
which will be tested and prove his efficiency in the search for similar
objects in the database in which we have objects with very various
and important size.
Abstract: Designing cost-efficient, secure network protocols for
Wireless Sensor Networks (WSNs) is a challenging problem because
sensors are resource-limited wireless devices. Security services such
as authentication and improved pairwise key establishment are
critical to high efficient networks with sensor nodes. For sensor
nodes to correspond securely with each other efficiently, usage of
cryptographic techniques is necessary. In this paper, two key
predistribution schemes that enable a mobile sink to establish a
secure data-communication link, on the fly, with any sensor nodes.
The intermediate nodes along the path to the sink are able to verify
the authenticity and integrity of the incoming packets using a
predicted value of the key generated by the sender’s essential power.
The proposed schemes are based on the pairwise key with the mobile
sink, our analytical results clearly show that our schemes perform
better in terms of network resilience to node capture than existing
schemes if used in wireless sensor networks with mobile sinks.
Abstract: In this paper, we are interested in the problem of
finding similar images in a large database. For this purpose we
propose a new algorithm based on a combination of the 2-D
histogram intersection in the HSV space and statistical moments. The
proposed histogram is based on a 3x3 window and not only on the
intensity of the pixel. This approach overcome the drawback of the
conventional 1-D histogram which is ignoring the spatial distribution
of pixels in the image, while the statistical moments are used to
escape the effects of the discretisation of the color space which is
intrinsic to the use of histograms. We compare the performance of
our new algorithm to various methods of the state of the art and we
show that it has several advantages. It is fast, consumes little memory
and requires no learning. To validate our results, we apply this
algorithm to search for similar images in different image databases.
Abstract: When neck pain is associated with pain, numbness, or
weakness in the arm, shoulder, or hand, further investigation is
needed as these are symptoms indicating pressure on one or more
nerve roots. Evaluation necessitates a neurologic examination and
imaging using an MRI/CT scan. A degenerating disc loses some
thickness and is less flexible, causing inter-vertebrae space to narrow.
A radiologist diagnoses an Intervertebral Disc Degeneration (IDD) by
localizing every inter-vertebral disc and identifying the pathology in
a disc based on its geometry and appearance. Accurate localizing is
necessary to diagnose IDD pathology. But, the underlying image
signal is ambiguous: a disc’s intensity overlaps the spinal nerve
fibres. Even the structure changes from case to case, with possible
spinal column bending (scoliosis). The inter-vertebral disc
pathology’s quantitative assessment needs accurate localization of the
cervical region discs. In this work, the efficacy of multilevel set
segmentation model, to segment cervical discs is investigated. The
segmented images are annotated using a simple distance matrix.
Abstract: The system for analyzing and eliciting public
grievances serves its main purpose to receive and process all sorts of
complaints from the public and respond to users. Due to the more
number of complaint data becomes big data which is difficult to store
and process. The proposed system uses HDFS to store the big data
and uses MapReduce to process the big data. The concept of cache
was applied in the system to provide immediate response and timely
action using big data analytics. Cache enabled big data increases the
response time of the system. The unstructured data provided by the
users are efficiently handled through map reduce algorithm. The
processing of complaints takes place in the order of the hierarchy of
the authority. The drawbacks of the traditional database system used
in the existing system are set forth by our system by using Cache
enabled Hadoop Distributed File System. MapReduce framework
codes have the possible to leak the sensitive data through
computation process. We propose a system that add noise to the
output of the reduce phase to avoid signaling the presence of
sensitive data. If the complaints are not processed in the ample time,
then automatically it is forwarded to the higher authority. Hence it
ensures assurance in processing. A copy of the filed complaint is sent
as a digitally signed PDF document to the user mail id which serves
as a proof. The system report serves to be an essential data while
making important decisions based on legislation.
Abstract: In this research article of modeling Underwater
Wireless Sensor Network Simulators, we provide a comprehensive
overview of the various currently available simulators used in UWSN
modeling. In this work, we compare their working environment,
software platform, simulation language, key features, limitations and
corresponding applications. Based on extensive experimentation and
performance analysis, we provide their efficiency for specific
applications. We have also provided guidelines for developing
protocols in different layers of the protocol stack, and finally these
parameters are also compared and tabulated. This analysis is
significant for researchers and designers to find the right simulator
for their research activities.
Abstract: The growth in the volume of text data such as books
and articles in libraries for centuries has imposed to establish
effective mechanisms to locate them. Early techniques such as
abstraction, indexing and the use of classification categories have
marked the birth of a new field of research called "Information
Retrieval". Information Retrieval (IR) can be defined as the task of
defining models and systems whose purpose is to facilitate access to
a set of documents in electronic form (corpus) to allow a user to find
the relevant ones for him, that is to say, the contents which matches
with the information needs of the user. This paper presents a new
semantic indexing approach of a documentary corpus. The indexing
process starts first by a term weighting phase to determine the
importance of these terms in the documents. Then the use of a
thesaurus like Wordnet allows moving to the conceptual level.
Each candidate concept is evaluated by determining its level of
representation of the document, that is to say, the importance of the
concept in relation to other concepts of the document. Finally, the
semantic index is constructed by attaching to each concept of the
ontology, the documents of the corpus in which these concepts are
found.
Abstract: This paper presents an optimal broadcast algorithm
for the hypercube networks. The main focus of the paper is the
effectiveness of the algorithm in the presence of many node faults.
For the optimal solution, our algorithm builds with spanning tree
connecting the all nodes of the networks, through which messages
are propagated from source node to remaining nodes. At any given
time, maximum n − 1 nodes may fail due to crashing. We show
that the hypercube networks are strongly fault-tolerant. Simulation
results analyze to accomplish algorithm characteristics under many
node faults. We have compared our simulation results between our
proposed method and the Fu’s method. Fu’s approach cannot tolerate
n − 1 faulty nodes in the worst case, but our approach can tolerate
n − 1 faulty nodes.
Abstract: The advent of social networking technologies has been
met with mixed reactions in academic and corporate circles around
the world. This study explored the influence of social network in
current era, the relation being maintained between the Social
networking site and its user by the extent of use, benefits and latest
technologies. The study followed a descriptive research design
wherein a questionnaire was used as the main research tool. The data
collected was analyzed using SPSS 16. Data was gathered from 1205
users and analyzed in accordance with the objectives of the study.
The analysis of the results seem to suggest that the majority of users
were mainly using Facebook, despite of concerns raised about the
disclosure of personal information on social network sites, users
continue to disclose huge quantity of personal information, they find
that reading privacy policy is time consuming and changes made can
result into improper settings.
Abstract: Recently, there is a lot of interest in the field of under
water optical wireless communication for short range because of
its high bandwidth. But in most of the previous works line of
sight propagation or single scattering of photons only considered.
In practical case this is not applicable because of beam blockage in
underwater and multiple scattering also occurred during the photons
propagation through water. In this paper we consider a non-line
of sight underwater wireless optical communication system with
multiple scattering and examine the performance of the system using
monte carlo simulation. The distribution scattering angle of photons
are modeled by Henyey-Greenstein method. The average bit error
rate is calculated using on-off keying modulation for different water
types.
Abstract: Grid is an environment with millions of resources
which are dynamic and heterogeneous in nature. A computational
grid is one in which the resources are computing nodes and is meant
for applications that involves larger computations. A scheduling
algorithm is said to be efficient if and only if it performs better
resource allocation even in case of resource failure. Resource
allocation is a tedious issue since it has to consider several
requirements such as system load, processing cost and time, user’s
deadline and resource failure. This work attempts in designing a
resource allocation algorithm which is cost-effective and also targets
at load balancing, fault tolerance and user satisfaction by considering
the above requirements. The proposed Budget Constrained Load
Balancing Fault Tolerant algorithm with user satisfaction (BLBFT)
reduces the schedule makespan, schedule cost and task failure rate
and improves resource utilization. Evaluation of the proposed
BLBFT algorithm is done using Gridsim toolkit and the results are
compared with the algorithms which separately concentrates on all
these factors. The comparison results ensure that the proposed
algorithm works better than its counterparts.
Abstract: This paper presents dynamic models of distributed
generators (DG) and investigates dynamic behavior of the DG units
in the micro grid system. The DG units include photovoltaic and fuel
cell sources. The voltage source inverter is adopted since the
electronic interface which can be equipped with its controller to keep
stability of the micro grid during small signal dynamics. This paper
also introduces power management strategies and implements the DG
load sharing concept to keep the micro grid operation in gridconnected
and islanding modes of operation. The results demonstrate
the operation and performance of the photovoltaic and fuel cell as
distributed generators in a micro grid. The entire control system in
the micro grid is developed by combining the benefits of the power
control and the voltage control strategies. Simulation results are all
reported, confirming the validity of the proposed control technique.
Abstract: This paper presents a novel integrated hybrid
approach for fault diagnosis (FD) of nonlinear systems. Unlike most
FD techniques, the proposed solution simultaneously accomplishes
fault detection, isolation, and identification (FDII) within a unified
diagnostic module. At the core of this solution is a bank of adaptive
neural parameter estimators (NPE) associated with a set of singleparameter
fault models. The NPEs continuously estimate unknown
fault parameters (FP) that are indicators of faults in the system. Two
NPE structures including series-parallel and parallel are developed
with their exclusive set of desirable attributes. The parallel scheme is
extremely robust to measurement noise and possesses a simpler, yet
more solid, fault isolation logic. On the contrary, the series-parallel
scheme displays short FD delays and is robust to closed-loop system
transients due to changes in control commands. Finally, a fault
tolerant observer (FTO) is designed to extend the capability of the
NPEs to systems with partial-state measurement.
Abstract: Flexible AC Transmission Systems (FACTS) is
granting a new group of advanced power electronic devices emerging
for enhancement of the power system performance. Unified Power
Flow Controller (UPFC) is a recent version of FACTS devices for
power system applications. The back-up energy supply system
incorporated with UPFC is providing a complete control of real and
reactive power at the same time and hence is competent to improve
the performance of an electrical power system. In this article, backup
energy supply unit such as superconducting magnetic energy storage
(SMES) is integrated with UPFC. In addition, comparative
exploration of UPFC–battery, UPFC–UC and UPFC–SMES
performance is evaluated through the vibrant simulation by using
MATLAB/Simulink software.
Abstract: In this paper, a direct power control (DPC)
strategies have been investigated in order to control a high
power AC/DC converter with time variable load. This converter
is composed of a three level three phase neutral point clamped
(NPC) converter as rectifier and an H-bridge four quadrant
current control converter. In the high power application,
controller not only must adjust the desire outputs but also
decrease the level of distortions which are injected to the network
from the converter. Regarding to this reason and nonlinearity
of the power electronic converter, the conventional controllers
cannot achieve appropriate responses. In this research, the
precise mathematical analysis has been employed to design the
appropriate controller in order to control the time variable
load. A DPC controller has been proposed and simulated using
Matlab/ Simulink. In order to verify the simulation result, a real
time simulator- OPAL-RT- has been employed. In this paper,
the dynamic response and stability of the high power NPC
with variable load has been investigated and compared with
conventional types using a real time simulator. The results proved
that the DPC controller is more stable and has more precise
outputs in comparison with conventional controller.