Abstract: Individually Network reconfiguration or Capacitor control
perform well in minimizing power loss and improving voltage
profile of the distribution system. But for heavy reactive power loads
network reconfiguration and for heavy active power loads capacitor
placement can not effectively reduce power loss and enhance
voltage profiles in the system. In this paper, an hybrid approach
that combine network reconfiguration and capacitor placement using
Harmony Search Algorithm (HSA) is proposed to minimize power
loss reduction and improve voltage profile. The proposed approach
is tested on standard IEEE 33 and 16 bus systems. Computational
results show that the proposed hybrid approach can minimize losses
more efficiently than Network reconfiguration or Capacitor control.
The results of proposed method are also compared with results
obtained by Simulated Annealing (SA). The proposed method has
outperformed in terms of the quality of solution compared to SA.
Abstract: This paper proposes a novel system for monitoring the
health of underground pipelines. Some of these pipelines transport
dangerous contents and any damage incurred might have catastrophic
consequences. However, most of these damage are unintentional and
usually a result of surrounding construction activities. In order to
prevent these potential damages, monitoring systems are
indispensable. This paper focuses on acoustically recognizing road
cutters since they prelude most construction activities in modern
cities. Acoustic recognition can be easily achieved by installing a
distributed computing sensor network along the pipelines and using
smart sensors to “listen" for potential threat; if there is a real threat,
raise some form of alarm. For efficient pipeline monitoring, a novel
monitoring approach is proposed. Principal Component Analysis
(PCA) was studied and applied. Eigenvalues were regarded as the
special signature that could characterize a sound sample, and were
thus used for the feature vector for sound recognition. The denoising
ability of PCA could make it robust to noise interference. One class
SVM was used for classifier. On-site experiment results show that the
proposed PCA and SVM based acoustic recognition system will be
very effective with a low tendency for raising false alarms.
Abstract: This paper describes the development of a control
system model using a graphical software tool. This control system is
part of an operator training simulator developed for the National
Training Center for Operators of Ixtapantongo (CNCAOI, acronym
according to its name in Spanish language) of the Mexico-s Federal
Commission of Electricity, CFE). The Department of Simulation of
the Electrical Research Institute (IIE) developed this simulator using
as reference the Unit I of the Combined Cycle Power Plant El Sauz,
located at the centre of Mexico. The first step in the project was the
developing of the Gas Turbine System and its control system
simulator. The Turbo Gas simulator was finished and delivered to
CNCAOI in March 2007 for commercial operation. This simulator is
a high-fidelity real time dynamic simulator built and tested for
accurate operation over the entire load range. The simulator was used
primarily for operator training although it has been used for
procedure development and evaluation of plant transients.
Abstract: This paper proposes a methodology for mitigating the occurrence of cascading failure in stressed power systems. The methodology is essentially based on predicting voltage instability in the power system using a voltage stability index and then devising a corrective action in order to increase the voltage stability margin. The paper starts with a brief description of the cascading failure mechanism which is probable root cause of severe blackouts. Then, the voltage instability indices are introduced in order to evaluate stability limit. The aim of the analysis is to assure that the coordination of protection, by adopting load shedding scheme, capable of enhancing performance of the system after the major location of instability is determined. Finally, the proposed method to generate instability prediction is introduced.
Abstract: Flight management system (FMS) is a specialized
computer system that automates a wide variety of in-flight tasks,
reducing the workload on the flight crew to the point that modern
aircraft no longer carry flight engineers or navigators. The primary
function of FMS is to perform the in-flight management of the flight
plan using various sensors (such as GPS and INS often backed up by
radio navigation) to determine the aircraft's position. From the
cockpit FMS is normally controlled through a Control Display Unit
(CDU) which incorporates a small screen and keyboard or touch
screen. This paper investigates the performance of GPS/ INS
integration techniques in which the data fusion process is done using
Kalman filtering. This will include the importance of sensors
calibration as well as the alignment of the strap down inertial
navigation system. The limitations of the inertial navigation systems
are investigated in order to understand why INS sometimes is
integrated with other navigation aids and not just operating in standalone
mode. Finally, both the loosely coupled and tightly coupled
configurations are analyzed for several types of situations and
operational conditions.
Abstract: This paper discusses a design of nonlinear observer by
a formal linearization method using an application of Chebyshev Interpolation
in order to facilitate processes for synthesizing a nonlinear
observer and to improve the precision of linearization.
A dynamic nonlinear system is linearized with respect to a linearization
function, and a measurement equation is transformed into
an augmented linear one by the formal linearization method which is
based on Chebyshev interpolation. To the linearized system, a linear
estimation theory is applied and a nonlinear observer is derived. To
show effectiveness of the observer design, numerical experiments
are illustrated and they indicate that the design shows remarkable
performances for nonlinear systems.
Abstract: Activity-Based Costing (ABC) represents an
alternative paradigm to traditional cost accounting system and
it often provides more accurate cost information for decision
making such as product pricing, product mix, and make-orbuy
decisions. ABC models the causal relationships between
products and the resources used in their production and traces
the cost of products according to the activities through the use
of appropriate cost drivers. In this paper, the implementation
of the ABC in a manufacturing system is analyzed and a
comparison with the traditional cost based system in terms of
the effects on the product costs are carried out to highlight the
difference between two costing methodologies. By using this
methodology, a valuable insight into the factors that cause the
cost is provided, helping to better manage the activities of the
company.
Abstract: Automatic Extraction of Event information from
social text stream (emails, social network sites, blogs etc) is a vital
requirement for many applications like Event Planning and
Management systems and security applications. The key information
components needed from Event related text are Event title, location,
participants, date and time. Emails have very unique distinctions over
other social text streams from the perspective of layout and format
and conversation style and are the most commonly used
communication channel for broadcasting and planning events.
Therefore we have chosen emails as our dataset. In our work, we
have employed two statistical NLP methods, named as Finite State
Machines (FSM) and Hidden Markov Model (HMM) for the
extraction of event related contextual information. An application
has been developed providing a comparison among the two methods
over the event extraction task. It comprises of two modules, one for
each method, and works for both bulk as well as direct user input.
The results are evaluated using Precision, Recall and F-Score.
Experiments show that both methods produce high performance and
accuracy, however HMM was good enough over Title extraction and
FSM proved to be better for Venue, Date, and time.
Abstract: What influences microsystems (MEMS) and nanosystems (NEMS) innovation teams apart from technology complexity? Based on in-depth interviews with innovators, this research explores the key influences on innovation teams in the early phases of MEMS/NEMS. Projects are rare and may last from 5 to 10 years or more from idea to concept. As fundamental technology development in MEMS/NEMS is highly complex and interdisciplinary by involving expertise from different basic and engineering disciplines, R&D is rather a 'testing of ideas' with many uncertainties than a clearly structured process. The purpose of this study is to explore the innovation teams- environment and give specific insights for future management practices. The findings are grouped into three major areas: people, know-how and experience, and market. The results highlight the importance and differences of innovation teams- composition, transdisciplinary knowledge, project evaluation and management compared to the counterparts from new product development teams.
Abstract: This paper deals with an on-line identification method
of continuous-time Hammerstein systems by using the radial basis
function (RBF) networks and immune algorithm (IA). An unknown
nonlinear static part to be estimated is approximately represented
by the RBF network. The IA is efficiently combined with the
recursive least-squares (RLS) method. The objective function for the
identification is regarded as the antigen. The candidates of the RBF
parameters such as the centers and widths are coded into binary bit
strings as the antibodies and searched by the IA. On the other hand,
the candidates of both the weighting parameters of the RBF network
and the system parameters of the linear dynamic part are updated
by the RLS method. Simulation results are shown to illustrate the
proposed method.
Abstract: Unified Modeling Language (UML) extensions for real time embedded systems (RTES) co-design, are taking a growing interest by a great number of industrial and research communities. The extension mechanism is provided by UML profiles for RTES. It aims at improving an easily-understood method of system design for non-experts. On the other hand, one of the key items of the co- design methods is the Hardware/Software partitioning and scheduling tasks. Indeed, it is mandatory to define where and when tasks are implemented and run. Unfortunately the main goals of co-design are not included in the usual practice of UML profiles. So, there exists a need for mapping used models to an execution platform for both schedulability test and HW/SW partitioning. In the present work, test schedulability and design space exploration are performed at an early stage. The proposed approach adopts Model Driven Engineering MDE. It starts from UML specification annotated with the recent profile for the Modeling and Analysis of Real Time Embedded systems MARTE. Following refinement strategy, transformation rules allow to find a feasible schedule that satisfies timing constraints and to define where tasks will be implemented. The overall approach is experimented for the design of a football player robot application.
Abstract: In the paper the study of synthetic transmit aperture
method applying the Golay coded transmission for medical
ultrasound imaging is presented. Longer coded excitation allows to
increase the total energy of the transmitted signal without increasing
the peak pressure. Moreover signal-to-noise ratio and penetration
depth are improved while maintaining high ultrasound image
resolution. In the work the 128-element linear transducer array with
0.3 mm inter-element spacing excited by one cycle and the 8 and 16-
bit Golay coded sequences at nominal frequency 4 MHz was used. To
generate a spherical wave covering the full image region a single
element transmission aperture was used and all the elements received
the echo signals. The comparison of 2D ultrasound images of the
tissue mimicking phantom and in vitro measurements of the beef liver
is presented to illustrate the benefits of the coded transmission. The
results were obtained using the synthetic aperture algorithm with
transmit and receive signals correction based on a single element
directivity function.
Abstract: This paper includes a positive analysis to quantitatively grasp the relationship among vulnerability, information security incidents, and the countermeasures by using data based on a 2007 questionnaire survey for Japanese ISPs (Internet Service Providers). To grasp the relationships, logistic regression analysis is used. The results clarify that there are relationships between information security incidents and the countermeasures. Concretely, there is a positive relationship between information security incidents and the number of information security systems introduced as well as a negative relationship between information security incidents and information security education. It is also pointed out that (especially, local) ISPs do not execute efficient information security countermeasures/ investment concerned with systems, and it is suggested that they should positively execute information security education. In addition, to further heighten the information security level of Japanese telecommunication infrastructure, the necessity and importance of the government to implement policy to support the countermeasures of ISPs is insisted.
Abstract: In this paper we investigate how wide-ranging
organizational support and the more specific form of support,
namely management support, may influence on tourism workers
satisfaction with a cash transaction system. The IS continuance
theory, proposed by Bhattacherjee in 2001, is utilized as a
theoretical framework. This implies that both perceived usefulness
and ease of use is included in the research model, in addition to
organizational and management support. The sample consists of
500 workers from 10 cruise and tourist ferries in Scandinavia that
use a cash transaction system to perform their work tasks. Using
structural equation modelling, results indicate that organizational
support and ease of use perceptions is critical for the users- level of
satisfaction with the cash transaction system.The findings have
implications for business managers and IS practitioners that want
to increase the quality of IT-based business processes within the
tourism industry.
Abstract: The existing information system (IS) developments
methods are not met the requirements to resolve the security related
IS problems and they fail to provide a successful integration of
security and systems engineering during all development process
stages. Hence, the security should be considered during the whole
software development process and identified with the requirements
specification. This paper aims to propose an integrated security and
IS engineering approach in all software development process stages
by using i* language. This proposed framework categorizes into three
separate parts: modelling business environment part, modelling
information technology system part and modelling IS security part.
The results show that considering security IS goals in the whole
system development process can have a positive influence on system
implementation and better meet business expectations.
Abstract: Timing driven physical design, synthesis, and
optimization tools need efficient closed-form delay models for
estimating the delay associated with each net in an integrated circuit
(IC) design. The total number of nets in a modern IC design has
increased dramatically and exceeded millions. Therefore efficient
modeling of interconnection is needed for high speed IC-s. This
paper presents closed–form expressions for RC and RLC
interconnection trees in current mode signaling, which can be
implemented in VLSI design tool. These analytical model
expressions can be used for accurate calculation of delay after the
design clock tree has been laid out and the design is fully routed.
Evaluation of these analytical models is several orders of magnitude
faster than simulation using SPICE.
Abstract: In high powered dense wavelength division
multiplexed (WDM) systems with low chromatic dispersion,
four-wave mixing (FWM) can prove to be a major source of noise.
The MultiCanonical Monte Carlo Method (MCMC) and the Split
Step Fourier Method (SSFM) are combined to accurately evaluate the
probability density function of the decision variable of a receiver,
limited by FWM. The combination of the two methods leads to more
accurate results, and offers the possibility of adding other optical
noises such as the Amplified Spontaneous Emission (ASE) noise.
Abstract: The recent development in learning technologies leads
to emerge many learning management systems (LMS). In this study,
we concentrate on the specifications and characteristics of LMSs.
Furthermore, this paper emphasizes on the feature of e-learning
management systems. The features take on the account main
indicators to assist and evaluate the quality of e-learning systems.
The proposed indicators based of ten dimensions.
Abstract: SQL injection on web applications is a very popular
kind of attack. There are mechanisms such as intrusion detection
systems in order to detect this attack. These strategies often rely on
techniques implemented at high layers of the application but do not
consider the low level of system calls. The problem of only
considering the high level perspective is that an attacker can
circumvent the detection tools using certain techniques such as URL
encoding. One technique currently used for detecting low-level
attacks on privileged processes is the tracing of system calls. System
calls act as a single gate to the Operating System (OS) kernel; they
allow catching the critical data at an appropriate level of detail. Our
basic assumption is that any type of application, be it a system
service, utility program or Web application, “speaks” the language of
system calls when having a conversation with the OS kernel. At this
level we can see the actual attack while it is happening. We conduct
an experiment in order to demonstrate the suitability of system call
analysis for detecting SQL injection. We are able to detect the attack.
Therefore we conclude that system calls are not only powerful in
detecting low-level attacks but that they also enable us to detect highlevel
attacks such as SQL injection.
Abstract: The work reported in this paper is motivated by the fact that there is a need to apply autonomic computing concepts to parallel computing systems. Advancing on prior work based on intelligent cores [36], a swarm-array computing approach, this paper focuses on 'Intelligent agents' another swarm-array computing approach in which the task to be executed on a parallel computing core is considered as a swarm of autonomous agents. A task is carried to a computing core by carrier agents and is seamlessly transferred between cores in the event of a predicted failure, thereby achieving self-ware objectives of autonomic computing. The feasibility of the proposed swarm-array computing approach is validated on a multi-agent simulator.