Abstract: An efficient transient flow simulation for gas
pipelines and networks is presented. The proposed transient flow
simulation is based on the transfer function models and MATLABSimulink.
The equivalent transfer functions of the nonlinear
governing equations are derived for different types of the boundary
conditions. Next, a MATLAB-Simulink library is developed and
proposed considering any boundary condition type. To verify the
accuracy and the computational efficiency of the proposed
simulation, the results obtained are compared with those of the
conventional finite difference schemes (such as TVD, method of
lines, and other finite difference implicit and explicit schemes). The
effects of the flow inertia and the pipeline inclination are
incorporated in this simulation. It is shown that the proposed
simulation has a sufficient accuracy and it is computationally more
efficient than the other methods.
Abstract: Most of the well known methods for generating
Gaussian variables require at least one standard uniform distributed
value, for each Gaussian variable generated. The length of the
random number generator therefore, limits the number of
independent Gaussian distributed variables that can be generated
meanwhile the statistical solution of complex systems requires a
large number of random numbers for their statistical analysis. We
propose an alternative simple method of generating almost infinite
number of Gaussian distributed variables using a limited number of
standard uniform distributed random numbers.
Abstract: Fault-proneness of a software module is the
probability that the module contains faults. To predict faultproneness
of modules different techniques have been proposed which
includes statistical methods, machine learning techniques, neural
network techniques and clustering techniques. The aim of proposed
study is to explore whether metrics available in the early lifecycle
(i.e. requirement metrics), metrics available in the late lifecycle (i.e.
code metrics) and metrics available in the early lifecycle (i.e.
requirement metrics) combined with metrics available in the late
lifecycle (i.e. code metrics) can be used to identify fault prone
modules using Genetic Algorithm technique. This approach has been
tested with real time defect C Programming language datasets of
NASA software projects. The results show that the fusion of
requirement and code metric is the best prediction model for
detecting the faults as compared with commonly used code based
model.
Abstract: This paper presents a practical scheme that can be used for allocating the transmission loss to generators and loads. In this scheme first the share of a generator or load on the current through a branch is determined using Z-bus modified matrix. Then the current components are decomposed and the branch loss allocation is obtained. A motivation of proposed scheme is to improve the results of Z-bus method and to reach more fair allocation. The proposed scheme has been implemented and tested on several networks. To achieve practical and applicable results, the proposed scheme is simulated and compared on the transmission network (400kv) of Khorasan region in Iran and the 14-bus standard IEEE network. The results show that the proposed scheme is comprehensive and fair to allocating the energy losses of a power market to its participants.
Abstract: In this work we present some matrix operators named
circulant operators and their action on square matrices. This study on
square matrices provides new insights into the structure of the space
of square matrices. Moreover it can be useful in various fields as in
agents networking on Grid or large-scale distributed self-organizing
grid systems.
Abstract: In this work, a radial basis function (RBF) neural network is developed for the identification of hyperbolic distributed parameter systems (DPSs). This empirical model is based only on process input-output data and used for the estimation of the controlled variables at specific locations, without the need of online solution of partial differential equations (PDEs). The nonlinear model that is obtained is suitably transformed to a nonlinear state space formulation that also takes into account the model mismatch. A stable robust control law is implemented for the attenuation of external disturbances. The proposed identification and control methodology is applied on a long duct, a common component of thermal systems, for a flow based control of temperature distribution. The closed loop performance is significantly improved in comparison to existing control methodologies.
Abstract: In this paper, by using Mawhin-s continuation theorem of coincidence degree and a method based on delay differential inequality, some sufficient conditions are obtained for the existence and global exponential stability of periodic solutions of cellular neural networks with distributed delays and impulses on time scales. The results of this paper generalized previously known results.
Abstract: A low cost Short Message System (SMS) based Home security system equipped with motion, smoke, temperature, humidity and light sensors has been studied and tested. The sensors are controlled by a microprocessor PIC 18F4520 through the SMS having password protection code for the secure operation. The user is able to switch light and the appliances and get instant feedback. Also in cases of emergencies such as fire or robbery the system will send alert message to occupant and relevant civil authorities. The operation of the home security has been tested on Vodafone- Fiji network and Digicel Fiji Network for emergency and feedback responses for 25 samples. The experiment showed that it takes about 8-10s for the security system to respond in case of emergency. It takes about 18-22s for the occupant to switch and monitor lights and appliances and then get feedback depending upon the network traffic.
Abstract: This research work proposes a model of network security systems aiming to prevent production system in a data center from being attacked by intrusions. Conceptually, we introduce a decoy system as a part of the security system for luring intrusions, and apply network intrusion detection (NIDS), coupled with the decoy system to perform intrusion prevention. When NIDS detects an activity of intrusions, it will signal a redirection module to redirect all malicious traffics to attack the decoy system instead, and hence the production system is protected and safe. However, in a normal situation, traffic will be simply forwarded to the production system as usual. Furthermore, we assess the performance of the model with various bandwidths, packet sizes and inter-attack intervals (attacking frequencies).
Abstract: A considerable progress has been achieved in transient
stability analysis (TSA) with various FACTS controllers. But, all
these controllers are associated with single transmission line. This
paper is intended to discuss a new approach i.e. a multi-line FACTS
controller which is interline power flow controller (IPFC) for TSA of
a multi-machine power system network. A mathematical model of
IPFC, termed as power injection model (PIM) presented and this
model is incorporated in Newton-Raphson (NR) power flow
algorithm. Then, the reduced admittance matrix of a multi-machine
power system network for a three phase fault without and with IPFC
is obtained which is required to draw the machine swing curves. A
general approach based on L-index has also been discussed to find
the best location of IPFC to reduce the proximity to instability of a
power system. Numerical results are carried out on two test systems
namely, 6-bus and 11-bus systems. A program in MATLAB has
been written to plot the variation of generator rotor angle and speed
difference curves without and with IPFC for TSA and also a simple
approach has been presented to evaluate critical clearing time for test
systems. The results obtained without and with IPFC are compared
and discussed.
Abstract: Cognitive radio devices have been considered as a key technology for next-generation of wireless communication. These devices in the context of IEEE 802.11 standards and IEEE 802.16 standards, can opportunistically utilize the wireless spectrum to achieve better user performance and improve the overall spectrumutilization efficiency, mainly in the unlicensed 5 GHz bands. However, opportunistic use of wireless spectrum creates news problems such as peaceful coexistence with other wireless technologies, such as the radiolocation systems, as well as understanding the influence of interference that each of these networks can create. In this paper, we suggest a dynamic access model that considerably reduces this interference and allows efficiency and fairness use of the wireless spectrum.
Abstract: Innovation is more important in any companies.
However, it is not easy to measure the innovation performance
correctly. Patent is one of measuring index nowadays. This paper
wants to purpose an approach for valuing patents based on market
reaction to patent infringement litigations. The interesting
phenomenon is found from collection of patent infringement litigation
events. That is if any patent litigation event occurs the stock value will
follow changing. The plaintiffs- stock value raises some percentage.
According to this interesting phenomenon, the relationship between
patent litigation and stock value is tested and verified. And then, the
stock value variation is used to deduce the infringed patents- value.
The purpose of this study is providing another concept model to
evaluate the infringed patents. This study can provide a decision assist
system to help drafting patent litigation strategy and determine the
technology value
Abstract: A topologically oriented neural network is very
efficient for real-time path planning for a mobile robot in changing
environments. When using a recurrent neural network for this
purpose and with the combination of the partial differential equation
of heat transfer and the distributed potential concept of the network,
the problem of obstacle avoidance of trajectory planning for a
moving robot can be efficiently solved. The related dimensional
network represents the state variables and the topology of the robot's
working space. In this paper two approaches to problem solution are
proposed. The first approach relies on the potential distribution of
attraction distributed around the moving target, acting as a unique
local extreme in the net, with the gradient of the state variables
directing the current flow toward the source of the potential heat. The
second approach considers two attractive and repulsive potential
sources to decrease the time of potential distribution. Computer
simulations have been carried out to interrogate the performance of
the proposed approaches.
Abstract: In order to accommodate various multimedia
services, next generation wireless networks are characterized
by very high transmission bit rates. Thus, in such systems and
networks, the received signal is not only limited by noise but -
especially with increasing symbols rate often more
significantly by the intersymbol interference (ISI) caused by
the time dispersive radio channels such as those are used in
this work. This paper deals with the study of the performance
of detector for high bit rate transmission on some worst case
models of frequency selective fading channels for outdoor
mobile radio environments. This paper deals with a number of
different wireless channels with different power profiles and
different number of resolvable paths. All the radio channels
generated in this paper are for outdoor vehicular environments
with Doppler spread of 100 Hz. A carrier frequency of 1800
MHz is used and all the channels used in this work are such
that they are useful for next generation wireless systems.
Schemes for mitigation of ISI with adaptive equalizers of
different types have been investigated and their performances
have been investigated in terms of BER measured as a function
of SNR.
Abstract: QoS Routing aims to find paths between senders and
receivers satisfying the QoS requirements of the application which
efficiently using the network resources and underlying routing
algorithm to be able to find low-cost paths that satisfy given QoS
constraints. The problem of finding least-cost routing is known to be
NP-hard or complete and some algorithms have been proposed to
find a near optimal solution. But these heuristics or algorithms either
impose relationships among the link metrics to reduce the complexity
of the problem which may limit the general applicability of the
heuristic, or are too costly in terms of execution time to be applicable
to large networks. In this paper, we concentrate an algorithm that
finds a near-optimal solution fast and we named this algorithm as
optimized Delay Constrained Routing (ODCR), which uses an
adaptive path weight function together with an additional constraint
imposed on the path cost, to restrict search space and hence ODCR
finds near optimal solution in much quicker time.
Abstract: Over the past few years, a number of efforts have
been exerted to build parallel processing systems that utilize the idle
power of LAN-s and PC-s available in many homes and corporations.
The main advantage of these approaches is that they provide cheap
parallel processing environments for those who cannot afford the
expenses of supercomputers and parallel processing hardware.
However, most of the solutions provided are not very flexible in the
use of available resources and very difficult to install and setup.
In this paper, a multi-level web-based parallel processing system
(MWPS) is designed (appendix). MWPS is based on the idea of
volunteer computing, very flexible, easy to setup and easy to use.
MWPS allows three types of subscribers: simple volunteers (single
computers), super volunteers (full networks) and end users. All of
these entities are coordinated transparently through a secure web site.
Volunteer nodes provide the required processing power needed by
the system end users. There is no limit on the number of volunteer
nodes, and accordingly the system can grow indefinitely. Both
volunteer and system users must register and subscribe. Once, they
subscribe, each entity is provided with the appropriate MWPS
components. These components are very easy to install.
Super volunteer nodes are provided with special components that
make it possible to delegate some of the load to their inner nodes.
These inner nodes may also delegate some of the load to some other
lower level inner nodes .... and so on. It is the responsibility of the
parent super nodes to coordinate the delegation process and deliver
the results back to the user.
MWPS uses a simple behavior-based scheduler that takes into
consideration the current load and previous behavior of processing
nodes. Nodes that fulfill their contracts within the expected time get a
high degree of trust. Nodes that fail to satisfy their contract get a
lower degree of trust.
MWPS is based on the .NET framework and provides the minimal
level of security expected in distributed processing environments.
Users and processing nodes are fully authenticated. Communications
and messages between nodes are very secure. The system has been
implemented using C#.
MWPS may be used by any group of people or companies to
establish a parallel processing or grid environment.
Abstract: In general fuzzy sets are used to analyze the fuzzy
system reliability. Here intuitionistic fuzzy set theory for analyzing
the fuzzy system reliability has been used. To analyze the fuzzy
system reliability, the reliability of each component of the system as
a triangular intuitionistic fuzzy number is considered. Triangular
intuitionistic fuzzy number and their arithmetic operations are
introduced. Expressions for computing the fuzzy reliability of a
series system and a parallel system following triangular intuitionistic
fuzzy numbers have been described. Here an imprecise reliability
model of an electric network model of dark room is taken. To
compute the imprecise reliability of the above said system, reliability
of each component of the systems is represented by triangular
intuitionistic fuzzy numbers. Respective numerical example is
presented.
Abstract: There are many expand of Wi-Fi zones provided
mobile careers and usage of wireless access point at home as increase
of usage of wireless internet caused by the use of smart phone. This
paper shows wireless local area network status, security threats of
WLAN and functionality of major wireless access point in Korea. We
propose security countermeasures concerned with life cycle of access
point from manufacturing to installation, using and finally disposal.
There needed to releasing with configured secure at access point.
Because, it is most cost effective resolution than stage of installation or
other life cycle of access point.
Abstract: Water pipe network is installed underground and once equipped, it is difficult to recognize the state of pipes when the leak or burst happens. Accordingly, post management is often delayed
after the fault occurs. Therefore, the systematic fault management system of water pipe network is required to prevent the accident and
minimize the loss. In this work, we develop online fault detection system of water pipe network using data of pipes such as flow rate
or pressure. The transient model describing water flow in pipelines
is presented and simulated using MATLAB. The fault situations such
as the leak or burst can be also simulated and flow rate or pressure data when the fault happens are collected. Faults are detected using
statistical methods of fast Fourier transform and discrete wavelet transform, and they are compared to find which method shows the
better fault detection performance.
Abstract: Optical 1x12 fused-taper-twisted polymer optical fiber (POF) couplers has been fabricated by a perform technique. Characterization of the coupler which proposed to be used in passive night vision application to tracking a blind sport area was reported. During the development process of fused-taper-twisted POF couplers was carried out, red LED fully utilized to be injected into the couplers to test the quality of fabricated couplers. Some characterization parameters, such as optical output power, POFs attenuation characteristics and power losses on the network were observed. The maximum output power efficiency of the coupler is about 40%, but it can be improved gradually through experience and practice.