Abstract: This paper present a new method for design of power
system stabilizer (PSS) based on sliding mode control (SMC)
technique. The control objective is to enhance stability and improve
the dynamic response of the multi-machine power system. In order to
test effectiveness of the proposed scheme, simulation will be carried
out to analyze the small signal stability characteristics of the system
about the steady state operating condition following the change in
reference mechanical torque and also parameters uncertainties. For
comparison, simulation of a conventional control PSS (lead-lag
compensation type) will be carried out. The main approach is
focusing on the control performance which later proven to have the
degree of shorter reaching time and lower spike.
Abstract: Authentication of multimedia contents has gained much attention in recent times. In this paper, we propose a secure semi-fragile watermarking, with a choice of two watermarks to be embedded. This technique operates in integer wavelet domain and makes use of semi fragile watermarks for achieving better robustness. A self-recovering algorithm is employed, that hides the image digest into some Wavelet subbands to detect possible malevolent object manipulation undergone by the image (object replacing and/or deletion). The Semi-fragility makes the scheme tolerant for JPEG lossy compression as low as quality of 70%, and locate the tempered area accurately. In addition, the system ensures more security because the embedded watermarks are protected with private keys. The computational complexity is reduced using parameterized integer wavelet transform. Experimental results show that the proposed scheme guarantees the safety of watermark, image recovery and location of the tempered area accurately.
Abstract: This paper proposes a novel architecture for At-
Home medical care which enables senior citizens, patients
with chronic ailments and patients requiring post- operative
care to be remotely monitored in the comfort of their homes.
This architecture is implemented using sensors and wireless
networking for transmitting patient data to the hospitals,
health- care centers for monitoring by medical professionals.
Patients are equipped with sensors to measure their
physiological parameters, like blood pressure, pulse rate etc.
and a Wearable Data Acquisition Unit is used to transmit the
patient sensor data. Medical professionals can be alerted to
any abnormal variations in these values for diagnosis and
suitable treatment. Security threats and challenges inherent to
wireless communication and sensor network have been
discussed and a security mechanism to ensure data
confidentiality and source authentication has been proposed.
Symmetric key algorithm AES has been used for encrypting
the data and a patent-free, two-pass block cipher mode CCFB
has been used for implementing semantic security.
Abstract: In contrast to existing of calculation of temperature field of a profile part a blade with convective cooling which are not taking into account multi connective in a broad sense of this term, we develop mathematical models and highly effective combination (BIEM AND FDM) numerical methods from the point of view of a realization on the PC. The theoretical substantiation of these methods is proved by the appropriate theorems.
Abstract: The present work presents the extraction of copper(II)
from sulphuric acid solutions with Sodium diethyldithiocarbamate
(SDDT), and six different organic diluents: Dichloromethane,
Chloroform, Carbon tetrachloride, Toluene, xylene and Cyclohexane,
were tested. The pair SDDT/Chloroform showed to be the most
selective in removing the copper cations, and hence was considered
throughout the experimental study.
The effects of operating parameters such as the initial concentration
of the extracting agent, the agitation time, the agitation speed and the
acid concentration were considered.
For an initial concentration of Cu (II) of 63 ppm in a 0.5 M sulphuric
acid solution, both with a mass of the extracting agent of 20 mg, an
extraction percentage of about 97.8 % and a distribution coefficient
of 44.42 were obtained, respectively, confirming the performance
of the SDDT-Chloroform pair.
Abstract: Security is an interesting and significance issue for
popular virtual platforms, such as virtualization cluster and cloud
platforms. Virtualization is the powerful technology for cloud
computing services, there are a lot of benefits by using virtual machine
tools which be called hypervisors, such as it can quickly deploy all
kinds of virtual Operating Systems in single platform, able to control
all virtual system resources effectively, cost down for system platform
deployment, ability of customization, high elasticity and high
reliability. However, some important security problems need to take
care and resolved in virtual platforms that include terrible viruses, evil
programs, illegal operations and intrusion behavior. In this paper, we
present useful Intrusion Detection Mechanism (IDM) software that not
only can auto to analyze all system-s operations with the accounting
journal database, but also is able to monitor the system-s state for
virtual platforms.
Abstract: The impact of fixed speed squirrel cage type as well as
variable speed doubly fed induction generators (DFIG) on dynamic
performance of a multimachine power system has been investigated.
Detailed models of the various components have been presented and
the integration of asynchronous and synchronous generators has been
carried out through a rotor angle based transform. Simulation studies
carried out considering the conventional dynamic model of squirrel
cage asynchronous generators show that integration, as such, could
degrade to the AC system performance transiently. This article
proposes a frequency or power controller which can effectively
control the transients and restore normal operation of fixed speed
induction generator quickly. Comparison of simulation results
between classical cage and doubly-fed induction generators indicate
that the doubly fed induction machine is more adaptable to
multimachine AC system. Frequency controller installed in the DFIG
system can also improve its transient profile.
Abstract: The purpose of this research is to develop a security model for voice eavesdropping protection over digital networks. The proposed model provides an encryption scheme and a personal secret key exchange between communicating parties, a so-called voice data transformation system, resulting in a real-privacy conversation. The operation of this system comprises two main steps as follows: The first one is the personal secret key exchange for using the keys in the data encryption process during conversation. The key owner could freely make his/her choice in key selection, so it is recommended that one should exchange a different key for a different conversational party, and record the key for each case into the memory provided in the client device. The next step is to set and record another personal option of encryption, either taking all frames or just partial frames, so-called the figure of 1:M. Using different personal secret keys and different sets of 1:M to different parties without the intervention of the service operator, would result in posing quite a big problem for any eavesdroppers who attempt to discover the key used during the conversation, especially in a short period of time. Thus, it is quite safe and effective to protect the case of voice eavesdropping. The results of the implementation indicate that the system can perform its function accurately as designed. In this regard, the proposed system is suitable for effective use in voice eavesdropping protection over digital networks, without any requirements to change presently existing network systems, mobile phone network and VoIP, for instance.
Abstract: Nowadays Multilevel inverters are widely using in various applications. Modulation strategy at fundamental switching frequency like, SHEPWM is prominent technique to eliminate lower order of harmonics with less switching losses and better harmonic profile. The equations which are formed by SHE are highly nonlinear transcendental in nature, there may exist single, multiple or even no solutions for a particular MI. However, some loads such as electrical drives, it is required to operate in whole range of MI. In order to solve SHE equations for whole range of MI, intelligent techniques are well suited to solve equations so as to produce lest %THDV. Hence, this paper uses Continuous genetic algorithm for minimising harmonics. This paper also presents wavelet based analysis of harmonics. The developed algorithm is simulated and %THD from FFT analysis and Wavelet analysis are compared. MATLAB programming environment and SIMULINK models are used whenever necessary.
Abstract: It is estimated that the total cost of abnormal
conditions to US process industries is around $20 billion dollars in
annual losses. The hydrotreatment (HDT) of diesel fuel in petroleum
refineries is a conversion process that leads to high profitable
economical returns. However, this is a difficult process to control
because it is operated continuously, with high hydrogen pressures
and it is also subject to disturbances in feed properties and catalyst
performance. So, the automatic detection of fault and diagnosis plays
an important role in this context. In this work, a hybrid approach
based on neural networks together with a pos-processing
classification algorithm is used to detect faults in a simulated HDT
unit. Nine classes (8 faults and the normal operation) were correctly
classified using the proposed approach in a maximum time of 5
minutes, based on on-line data process measurements.
Abstract: Mobile banking services present a unique growth
opportunity for mobile operators in emerging markets, and have
already made good progress in bringing financial services to the
previously unbanked populations of many developing countries. The
potential is amazing, but what about the risks? In the complex
process of establishing a mobile banking business model, many kinds
of risks and factors need to be monitored and well-managed. Risk
identification is the first stage of risk management. Correct risk
identification ensures risk management effectiveness. Keeping the
risks low makes it possible to use the full potential of mobile banking
and carry out the planned business strategy. The focus should be on
adoption of consumers which is the main risk factor of mobile
banking services.
Abstract: Introduction applicability of high-speed cutting stock problem (CSP) is presented in this paper. Due to the orders continued coming in from various on-line ways for a professional cutting company, to stay competitive, such a business has to focus on sustained production at high levels. In others words, operators have to keep the machine running to stay ahead of the pack. Therefore, the continuous stock cutting problem with setup is proposed to minimize the cutting time and pattern changing time to meet the on-line given demand. In this paper, a novel method is proposed to solve the problem directly by using cutting patterns directly. A major advantage of the proposed method in series on-line production is that the system can adjust the cutting plan according to the floating orders. Examples with multiple items are demonstrated. The results show considerable efficiency and reliability in high-speed cutting of CSP.
Abstract: Optical burst switching(OBS) is considered as one of
preferable network technologies for the next generation Internet. The
Internet has two traffic classes, i.e. real-time bursts and reliable bursts.
It is an important subject for OBS to achieve cooperated operation of
real-time bursts and reliable bursts. In this paper, we proposes a new
effective traffic control method named Separate TB+LB (Token
Bucket + Leaky Bucket : TB+LB) method. The proposed method
presents a new Token Bucket scheme for real-time bursts called as
RBO-TB (Real-time Bursts Oriented Token Bucket). The method also
applies the LB method to reliable bursts for obtaining better
performance. This paper verifies the effectiveness of the Separate
TB+LB method through the performance evaluation.
Abstract: Here, a new idea to speed up the operation of
complex valued time delay neural networks is presented. The whole
data are collected together in a long vector and then tested as a one
input pattern. The proposed fast complex valued time delay neural
networks uses cross correlation in the frequency domain between the
tested data and the input weights of neural networks. It is proved
mathematically that the number of computation steps required for
the presented fast complex valued time delay neural networks is less
than that needed by classical time delay neural networks. Simulation
results using MATLAB confirm the theoretical computations.
Abstract: The efficient operation of any biological treatment
process requires pre-treatment of incompatible pollutants such as
acids, bases, oil, toxic substances, etc. which hamper the treatment
of other major components which are otherwise degradable. The
pre-treatment of alkaline waste-waters, generated from various
industries like textile, paper & pulp, potato-processing industries,
etc., having a pH of 10 or higher, is essential. The pre-treatment,
i.e., neutralization of such alkaline waste-waters can be achieved by
chemical as well as biological means. However, the biological pretreatment
offers better package over the chemical means by being
safe and economical. The biological pre-treatment can be
accomplished by using a blend of microorganisms able to withstand
such harsh alkaline conditions. In the present study, for the proper
pre-treatment of alkaline waste-waters, a package of alkalophilic
bacteria is formulated to neutralise the alkaline pH of the industrial
waste-waters. The developed microbial package is cost-effective as
well as environmental friendly.
Abstract: This paper presents a tested research concept that
implements a complex evolutionary algorithm, genetic algorithm
(GA), in a multi-microcontroller environment. Parallel Distributed
Genetic Algorithm (PDGA) is employed in adaptive beam forming
technique to reduce power usage of adaptive antenna at WCDMA
base station. Adaptive antenna has dynamic beam that requires more
advanced beam forming algorithm such as genetic algorithm which
requires heavy computation and memory space. Microcontrollers are
low resource platforms that are normally not associated with GAs,
which are typically resource intensive. The aim of this project was to
design a cooperative multiprocessor system by expanding the role of
small scale PIC microcontrollers to optimize WCDMA base station
transmitter power. Implementation results have shown that PDGA
multi-microcontroller system returned optimal transmitted power
compared to conventional GA.
Abstract: This study defines a methodology to compute unitary costs for freight transportation modes. The main objective was to gather relevant costs data to support the formulation and evaluation of railway, road, pipelines and port projects. This article will concentrate on the following steps: Compilation and analysis of relevant modal cost studies, Methodological adjustments to make cost figures comparable between studies, Definition of typology and scope of transportation modes, Analysis and validation of cost values for relevant freight transportation modes in Chile. In order to define the comparison methodology for the costs between the different transportation modes, it was necessary to consider that the relevant cost depends on who performs the comparison. Thus, for the transportation user (e.g. exporter) the pertinent costs are the mode tariffs, whereas from the operators perspective (e.g. rail manager), the pertinent costs are the operating costs of each mode.
Abstract: This paper reports on the results of experimental investigations on the performance of a jet pump operated under selected primary flows to optimize the related parameters. For this purpose a two-phase flow jet pump was used employing various profiles of nozzles as the primary device which was designed, fabricated and used along with the combination of mixing tube and diffuser. The profiles employed were circular, conical, and elliptical. The diameter of the nozzle used was 4 mm. The area ratio of the jet pump was 0.16. The test facility created for this purpose was an open loop continuous circulation system. Performance of the jet pump was obtained as iso-efficiency curves on characteristic curves drawn for various water flow rates. To perform the suction capability, evacuation test was conducted at best efficiency point for all the profiles.
Abstract: Recently, majors of doctors are divided into terribly lots of detailed areas. However, it is actually not a rare case that a doctor has a patient who is not in his/her major. He/She must judge an assessment and make a medical treatment plan for this patient. According to our investigation, conventional approaches such as image diagnosis cooperation are insufficient. This paper proposes an 'Assessment / Medical Treatment Plan Consulting System'. We have implemented a pilot system based on our proposition. Its effectiveness is clarified by an evaluation.
Abstract: An important step in studying the statistics of
fingerprint minutia features is to reliably extract minutia features from
the fingerprint images. A new reliable method of computation for
minutiae feature extraction from fingerprint images is presented. A
fingerprint image is treated as a textured image. An orientation flow
field of the ridges is computed for the fingerprint image. To
accurately locate ridges, a new ridge orientation based computation
method is proposed. After ridge segmentation a new method of
computation is proposed for smoothing the ridges. The ridge skeleton
image is obtained and then smoothed using morphological operators
to detect the features. A post processing stage eliminates a large
number of false features from the detected set of minutiae features.
The detected features are observed to be reliable and accurate.