Abstract: This paper presents a methodology using
Gravitational Search Algorithm for optimal placement of Phasor
Measurement Units (PMUs) in order to achieve complete
observability of the power system. The objective of proposed
algorithm is to minimize the total number of PMUs at the power
system buses, which in turn minimize installation cost of the PMUs.
In this algorithm, the searcher agents are collection of masses which
interact with each other using Newton’s laws of gravity and motion.
This new Gravitational Search Algorithm based method has been
applied to the IEEE 14-bus, IEEE 30-bus and IEEE 118-bus test
systems. Case studies reveal optimal number of PMUs with better
observability by proposed method.
Abstract: Nature is a great source of inspiration for solving
complex problems in networks. It helps to find the optimal solution.
Metaheuristic algorithm is one of the nature-inspired algorithm which
helps in solving routing problem in networks. The dynamic features,
changing of topology frequently and limited bandwidth make the
routing, challenging in MANET. Implementation of appropriate
routing algorithms leads to the efficient transmission of data in
mobile ad hoc networks. The algorithms that are inspired by the
principles of naturally-distributed/collective behavior of social
colonies have shown excellence in dealing with complex
optimization problems. Thus some of the bio-inspired metaheuristic
algorithms help to increase the efficiency of routing in ad hoc
networks. This survey work presents the overview of bio-inspired
metaheuristic algorithms which support the efficiency of routing in
mobile ad hoc networks.
Abstract: This paper discusses the undesirable charge transfer
through the parasitic capacitances of the input transistors in a
multi-inputs voltage sense amplifier. Its intrinsic rail-to-rail voltage
transitions at the output nodes inevitably disturb the input sides
through the capacitive coupling between the outputs and inputs. Then,
it can possible degrade the stabilities of the reference voltage levels.
Moreover, it becomes more serious in multi-channel systems by
altering them for other channels, and so degrades the linearity of the
overall systems. In order to alleviate the internal node voltage
transition, the internal node stabilization techniques are proposed. It
achieves 45% and 40% improvements for node stabilization and input
referred disturbance, respectively.
Abstract: Non-linear FEM calculations are indispensable when
important technical information like operating performance of a
rubber component is desired. For example rubber bumpers built into
air-spring structures may undergo large deformations under load,
which in itself shows non-linear behavior. The changing contact
range between the parts and the incompressibility of the rubber
increases this non-linear behavior further. The material
characterization of an elastomeric component is also a demanding
engineering task.
The shape optimization problem of rubber parts led to the study of
FEM based calculation processes. This type of problems was posed
and investigated by several authors. In this paper the time demand of
certain calculation methods are studied and the possibilities of time
reduction is presented.
Abstract: Various personality profile tests are used to identify
personality strengths and limits in individuals, helping both
individuals and managers to optimize work and team effort in
organizations. One such test, the Hartman’s personality profile,
emphasizes four driving "core motives" influenced or affected by
both strengths and limitations classified into four colors: Red -
motivated by power; Blue - discipline and loyalty; White - peace; and
Yellow – fun loving. Two shortcomings of Hartman’s personality test
are noted; 1) only one selection for every item / situation allowed and
2) selection of an item / option even if not applicable. A test taker
may be as much nurturing as he is opinionated but since
“opinionated” seems less attractive the individual would likely select
nurturing, causing a misidentification in personality strengths and
limits. Since few individuals have a “strong” personality, it is
difficult to assess their true personality strengths and limits allowing
only one choice or requiring unwanted choices, undermining the
potential of the test. We modified Hartman’s personality profile
allowing test takers to make either multiple choices for any item /
situation or leave them blank if applicable. Sixty-eight participants
(38 males and 30 females), 17 - 49 years old, from countries in Asia,
Europe, N. America, CIS, Africa, Latin America, and Oceania were
included. 58 participants (85.3%) reported the modified test, allowing
multiple / no choices better identified their personality strengths and
limits, while 10 participants (14.7%) expressed the original (one
choice version) was sufficient. The overall results show that our
modified test enhanced the identification and balance of core
personalities’ strengths and limits, aiding test takers, managers and
organizations to better assess individual characteristics, particularly
useful in making task-related, teamwork, and management decisions.
Abstract: In this paper, we propose an automatic verification
technology of software patches for user virtual environments on IaaS
Cloud to decrease verification costs of patches. In these days, IaaS
services have been spread and many users can customize virtual
machines on IaaS Cloud like their own private servers. Regarding to
software patches of OS or middleware installed on virtual machines,
users need to adopt and verify these patches by themselves. This task
increases operation costs of users. Our proposed method replicates
user virtual environments, extracts verification test cases for user
virtual environments from test case DB, distributes patches to virtual
machines on replicated environments and conducts those test cases
automatically on replicated environments. We have implemented the
proposed method on OpenStack using Jenkins and confirmed the
feasibility. Using the implementation, we confirmed the effectiveness
of test case creation efforts by our proposed idea of 2-tier abstraction
of software functions and test cases. We also evaluated the automatic
verification performance of environment replications, test cases
extractions and test cases conductions.
Abstract: The web’s increased popularity has included a huge
amount of information, due to which automated web page
classification systems are essential to improve search engines’
performance. Web pages have many features like HTML or XML
tags, hyperlinks, URLs and text contents which can be considered
during an automated classification process. It is known that Webpage
classification is enhanced by hyperlinks as it reflects Web page
linkages. The aim of this study is to reduce the number of features to
be used to improve the accuracy of the classification of web pages. In
this paper, a novel feature selection method using an improved
Particle Swarm Optimization (PSO) using principle of evolution is
proposed. The extracted features were tested on the WebKB dataset
using a parallel Neural Network to reduce the computational cost.
Abstract: Human motion capture has become one of the major
area of interest in the field of computer vision. Some of the major
application areas that have been rapidly evolving include the
advanced human interfaces, virtual reality and security/surveillance
systems. This study provides a brief overview of the techniques and
applications used for the markerless human motion capture, which
deals with analyzing the human motion in the form of mathematical
formulations. The major contribution of this research is that it
classifies the computer vision based techniques of human motion
capture based on the taxonomy, and then breaks its down into four
systematically different categories of tracking, initialization, pose
estimation and recognition. The detailed descriptions and the
relationships descriptions are given for the techniques of tracking and
pose estimation. The subcategories of each process are further
described. Various hypotheses have been used by the researchers in
this domain are surveyed and the evolution of these techniques have
been explained. It has been concluded in the survey that most
researchers have focused on using the mathematical body models for
the markerless motion capture.
Abstract: With increasingly more mobile health applications
appearing due to the popularity of smartphones, the possibility arises
that these data can be used to improve the medical diagnostic process,
as well as the overall quality of healthcare, while at the same time
lowering costs. However, as of yet there have been no reports of a
successful combination of patient-generated data from smartphones
with data from clinical routine. In this paper we describe how these
two types of data can be combined in a secure way without
modification to hospital information systems, and how they can
together be used in a medical expert system for automatic nutritional
classification and triage.
Abstract: In this paper, an analysis of some model order
reduction techniques is presented. A new hybrid algorithm for model
order reduction of linear time invariant systems is compared with the
conventional techniques namely Balanced Truncation, Hankel Norm
reduction and Dominant Pole Algorithm (DPA). The proposed hybrid
algorithm is known as Clustering Dominant Pole Algorithm (CDPA),
is able to compute the full set of dominant poles and its cluster center
efficiently. The dominant poles of a transfer function are specific
eigenvalues of the state space matrix of the corresponding dynamical
system. The effectiveness of this novel technique is shown through
the simulation results.
Abstract: Every machine plays roles of client and server
simultaneously in a peer-to-peer (P2P) network. Though a P2P
network has many advantages over traditional client-server models
regarding efficiency and fault-tolerance, it also faces additional
security threats. Users/IT administrators should be aware of risks
from malicious code propagation, downloaded content legality, and
P2P software’s vulnerabilities. Security and preventative measures
are a must to protect networks from potential sensitive information
leakage and security breaches. Bit Torrent is a popular and scalable
P2P file distribution mechanism which successfully distributes large
files quickly and efficiently without problems for origin server. Bit
Torrent achieved excellent upload utilization according to
measurement studies, but it also raised many questions as regards
utilization in settings, than those measuring, fairness, and Bit
Torrent’s mechanisms choice. This work proposed a block selection
technique using Fuzzy ACO with optimal rules selected using ACO.
Abstract: Agriculture is the backbone of economy of Pakistan
and cotton is the major agricultural export and supreme source of raw
fiber for our textile industry. To combat severe problems of insect
and weed, combination of three genes namely Cry1Ac, Cry2A and
EPSPS genes was transferred in locally cultivated cotton variety
MNH-786 with the use of Agrobacterium mediated genetic
transformation. The present study focused on the molecular screening
of transgenic cotton plants at T3 generation in order to confirm
integration and expression of all three genes (Cry1Ac, Cry2A and
EPSP synthase) into the cotton genome. Initially, glyphosate spray
assay was used for screening of transgenic cotton plants containing
EPSP synthase gene at T3 generation. Transgenic cotton plants which
were healthy and showed no damage on leaves were selected after 07
days of spray. For molecular analysis of transgenic cotton plants in
the laboratory, the genomic DNA of these transgenic cotton plants
were isolated and subjected to amplification of the three genes. Thus,
seventeen out of twenty (Cry1Ac gene), ten out of twenty (Cry2A
gene) and all twenty (EPSP synthase gene) were produced positive
amplification. On the base of PCR amplification, ten transgenic plant
samples were subjected to protein expression analysis through
ELISA. The results showed that eight out of ten plants were actively
expressing the three transgenes. Real-time PCR was also done to
quantify the mRNA expression levels of Cry1Ac and EPSP synthase
gene. Finally, eight plants were confirmed for the presence and active
expression of all three genes at T3 generation.
Abstract: Collection of storm water runoff and forcing it into the
groundwater is the need of the hour to sustain the ground water table.
However, the runoff entraps various types of sediments and other
floating objects whose removal are essential to avoid pollution of
ground water and blocking of pores of aquifer. However, it requires
regular cleaning and maintenance due to problem of clogging. To
evaluate the performance of filter system consisting of coarse sand
(CS), gravel (G) and pebble (P) layers, a laboratory experiment was
conducted in a rectangular column. The effect of variable thickness
of CS, G and P layers of the filtration unit of the recharge shaft on the
recharge rate and the sediment concentration of effluent water were
evaluated.
Medium sand (MS) of three particle sizes, viz. 0.150–0.300 mm
(T1), 0.300–0.425 mm (T2) and 0.425–0.600 mm of thickness 25 cm,
30 cm and 35 cm respectively in the top layer of the filter system and
having seven influent sediment concentrations of 250–3,000 mg/l
were used for experimental study. The performance was evaluated in
terms of recharge rates and clogging time. The results indicated that
100 % suspended solids were entrapped in the upper 10 cm layer of
MS, the recharge rates declined sharply for influent concentrations of
more than 1,000 mg/l. All treatments with higher thickness of MS
media indicated recharge rate slightly more than that of all treatment
with lower thickness of MS media respectively. The performance of
storm water infiltration systems was highly dependent on the
formation of a clogging layer at the filter. An empirical relationship
has been derived between recharge rates, inflow sediment load, size
of MS and thickness of MS with using MLR.
Abstract: This paper presents an efficient fusion algorithm for
iris images to generate stable feature for recognition in unconstrained
environment. Recently, iris recognition systems are focused on real
scenarios in our daily life without the subject’s cooperation. Under
large variation in the environment, the objective of this paper is to
combine information from multiple images of the same iris. The
result of image fusion is a new image which is more stable for further
iris recognition than each original noise iris image. A wavelet-based
approach for multi-resolution image fusion is applied in the fusion
process. The detection of the iris image is based on Adaboost
algorithm and then local binary pattern (LBP) histogram is then
applied to texture classification with the weighting scheme.
Experiment showed that the generated features from the proposed
fusion algorithm can improve the performance for verification system
through iris recognition.
Abstract: This paper examines how “Zakat” provides fair
income redistribution and aids the struggle against poverty. Providing
fair income redistribution and combating poverty constitutes some of
the fundamental tasks performed by countries all over the world.
Each country seeks a solution for these problems according to their
political, economic and administrative styles through applying
various economic and financial policies. The same situation can be
handled via “zakat” association in Islam. Nowadays, we observe
different versions of “zakat” in developed countries. Applications
such as negative income tax denote merely a different form of
“zakat” that is being applied almost in the same way but under
changed names. However, the minimum values to donate under zakat
(e.g. 85 gr. gold and 40 animals) get altered and various amounts are
put into practice. It might be named as negative income tax instead of
zakat, nonetheless, these applications are based on the Holy Koran
and the hadith released 1400 years ago. Besides, considering the
savage and slavery in the world at those times, we might easily
recognize the true value of the zakat being applied for the first time
then in the Islamic system. Through zakat, governments are able to
transfer incomes to the poor as a means of enabling them achieve the
minimum standard of living required. With regards to who benefits
from the Zakat, an objective and fair criteria was used to determine
who benefits from the zakat contrary to the notion that it was based
on peoples’ own choices. Since the zakat is obligatory, the transfers
do not get forwarded directly but via the government and get
distributed, which requires vast governmental organizations. Through
the application of Zakat, reduced levels of poverty can be achieved
and also ensure the fair income redistribution.
Abstract: The restrained construction zoning, an important part
in the urban master plan, is a necessary planning tool to control the city
sprawl, to guarantee the reservation implementation of the various
types of protective elements, and to realize the storage of the essential
urban spatial resources. Simultaneously, owing to the diverse
constitutes of restrained construction area and the various stakeholders
involved in, its planning requires an overall consideration of all
elements from the perspective of coordination+, balance and
practicability to deal with the problems and conflicts in this process.
Taking Yangzijin Ecological Restrained Construction Area in
Yangzhou as an example, this study analyzes all the potential actors,
agencies and stakeholders in this restrained construction area, as well
as the relevant conflicts between each other. Besides, this study tries to
build up a planning procedure based on the framework of governance
theory, and proposes a possible planning method that combines
"rigidity" and "flexibility" to protect the ecological limitation
boundary, to take every interest into account, and to promote economic
development in a harmonious society.
Abstract: Load modeling is one of the central functions in
power systems operations. Electricity cannot be stored, which means
that for electric utility, the estimate of the future demand is necessary
in managing the production and purchasing in an economically
reasonable way. A majority of the recently reported approaches are
based on neural network. The attraction of the methods lies in the
assumption that neural networks are able to learn properties of the
load. However, the development of the methods is not finished, and
the lack of comparative results on different model variations is a
problem. This paper presents a new approach in order to predict the
Tunisia daily peak load. The proposed method employs a
computational intelligence scheme based on the Fuzzy neural
network (FNN) and support vector regression (SVR). Experimental
results obtained indicate that our proposed FNN-SVR technique gives
significantly good prediction accuracy compared to some classical
techniques.
Abstract: Social Media (SM) is websites increasingly popular
and built to allow people to express themselves and to interact
socially with others. Most SMT are dominated by youth particularly
College students. The proliferation of popular social media tools,
which can accessed from any communication devices has become
pervasive in the lives of today’s student life. Connecting traditional
education to social media tools are a relatively new era and any
collaborative tool could be used for learning activities. This study
focuses (i) how the social media tools are useful for the learning
activities of the students of faculty of medicine in King Khalid
University (ii) whether the social media affects the collaborative
learning with interaction among students, among course instructor,
their engagement, perceived ease of use and perceived ease of
usefulness (TAM) (iii) overall, the students satisfy with this
collaborative learning through Social media.
Abstract: Graphical User Interface (GUI) is essential to
programming, as is any other characteristic or feature, due to the fact
that GUI components provide the fundamental interaction between
the user and the program. Thus, we must give more interest to GUI
during building and development of systems. Also, we must give a
greater attention to the user who is the basic corner in the dealing
with the GUI. This paper introduces an approach for designing GUI
from one of the models of business workflows which describe the
workflow behavior of a system, specifically through Activity
Diagrams (AD).
Abstract: As the use of geothermal energy grows internationally
more effort is required to monitor and protect areas with rare and
important geothermal surface features. A number of approaches are
presented for developing and calibrating numerical geothermal
reservoir models that are capable of accurately representing
geothermal surface features. The approaches are discussed in the
context of cases studies of the Rotorua geothermal system and the
Orakei-korako geothermal system, both of which contain important
surface features. The results show that models are able to match the
available field data accurately and hence can be used as valuable
tools for predicting the future response of the systems to changes in
use.