Abstract: Recently, Genetic Algorithms (GA) and Differential
Evolution (DE) algorithm technique have attracted considerable
attention among various modern heuristic optimization techniques.
Since the two approaches are supposed to find a solution to a given
objective function but employ different strategies and computational
effort, it is appropriate to compare their performance. This paper
presents the application and performance comparison of DE and GA
optimization techniques, for flexible ac transmission system
(FACTS)-based controller design. The design objective is to enhance
the power system stability. The design problem of the FACTS-based
controller is formulated as an optimization problem and both the PSO
and GA optimization techniques are employed to search for optimal
controller parameters. The performance of both optimization
techniques has been compared. Further, the optimized controllers are
tested on a weekly connected power system subjected to different
disturbances, and their performance is compared with the
conventional power system stabilizer (CPSS). The eigenvalue
analysis and non-linear simulation results are presented and
compared to show the effectiveness of both the techniques in
designing a FACTS-based controller, to enhance power system
stability.
Abstract: As the development of digital technology is increasing,
Digital cinema is getting more spread.
However, content copy and attack against the digital cinema becomes
a serious problem. To solve the above security problem, we propose
“Additional Watermarking" for digital cinema delivery system. With
this proposed “Additional watermarking" method, we protect content
copyrights at encoder and user side information at decoder. It realizes
the traceability of the watermark embedded at encoder.
The watermark is embedded into the random-selected frames using
Hash function. Using it, the embedding position is distributed by Hash
Function so that third parties do not break off the watermarking
algorithm.
Finally, our experimental results show that proposed method is much
better than the convenient watermarking techniques in terms of
robustness, image quality and its simple but unbreakable algorithm.
Abstract: Environmental performance of the U.S. States is investigated for the period of 1990 – 2007 using Stochastic Frontier Analysis (SFA). The SFA accounts for both efficiency measure and stochastic noise affecting a frontier. The frontier is formed using indicators of GDP, energy consumption, population, and CO2 emissions. For comparability, all indicators are expressed as ratios to total. Statistical information of the Energy Information Agency of the United States is used. Obtained results reveal the bell - shaped dynamics of environmental efficiency scores. The average efficiency scores rise from 97.6% in 1990 to 99.6% in 1999, and then fall to 98.4% in 2007. The main factor is insufficient decrease in the rate of growth of CO2 emissions with regards to the growth of GDP, population and energy consumption. Data for 2008 following the research period allow for an assumption that the environmental performance of the U.S. States has improved in the last years.
Abstract: This paper outlines the research conducted to propose na framework of 'Knowledge Society' (KS) in the Malaysian context.
It is important to highlight that the emergence of KS is a result of the rapid growth in knowledge and information. However, the discussion
of KS should not only be limited to the importance of knowledge, but a holistic KS is also determined by other imperative dimensions. This
article discusses the results of a study conducted previously in Malaysia in order to identify the essential dimensions of KS, and
consequently propose a KS framework in the Malaysian context.
Two methods were employed, namely the Delphi technique and semi-structured interviews. The modified Delphi involved five
rounds with ten experts, while the interviews were conducted with two prominent figures in Malaysia. The results support the proposed
framework which contains seven major dimensions in order for Malaysia to become a KS in the future. The dimensions which are
crucial for a holistic Malaysian KS are human capital, spirituality, economy, social, institutional, sustainability, and driven by the ICT.
Abstract: Local Linear Neuro-Fuzzy Models (LLNFM) like other neuro- fuzzy systems are adaptive networks and provide robust learning capabilities and are widely utilized in various applications such as pattern recognition, system identification, image processing and prediction. Local linear model tree (LOLIMOT) is a type of Takagi-Sugeno-Kang neuro fuzzy algorithm which has proven its efficiency compared with other neuro fuzzy networks in learning the nonlinear systems and pattern recognition. In this paper, a dedicated reconfigurable and parallel processing hardware for LOLIMOT algorithm and its applications are presented. This hardware realizes on-chip learning which gives it the capability to work as a standalone device in a system. The synthesis results on FPGA platforms show its potential to improve the speed at least 250 of times faster than software implemented algorithms.
Abstract: The empirical mode decomposition (EMD) represents any time series into a finite set of basis functions. The bases are termed as intrinsic mode functions (IMFs) which are mutually orthogonal containing minimum amount of cross-information. The EMD successively extracts the IMFs with the highest local frequencies in a recursive way, which yields effectively a set low-pass filters based entirely on the properties exhibited by the data. In this paper, EMD is applied to explore the properties of the multi-year air temperature and to observe its effects on climate change under global warming. This method decomposes the original time-series into intrinsic time scale. It is capable of analyzing nonlinear, non-stationary climatic time series that cause problems to many linear statistical methods and their users. The analysis results show that the mode of EMD presents seasonal variability. The most of the IMFs have normal distribution and the energy density distribution of the IMFs satisfies Chi-square distribution. The IMFs are more effective in isolating physical processes of various time-scales and also statistically significant. The analysis results also show that the EMD method provides a good job to find many characteristics on inter annual climate. The results suggest that climate fluctuations of every single element such as temperature are the results of variations in the global atmospheric circulation.
Abstract: This is an applied research to propose the method for
price quotation for a contract electronics manufacturer. It has had a
precise price quoting method but such method could not quickly
provide a result as the customer required. This reduces the ability of
company to compete in this kind of business. In this case, the cause
of long time quotation process was analyzed. A lot of product
features have been demanded by customer. By checking routine
processes, it was found that high fraction of quoting time was used
for production time estimating which has effected to the
manufacturing or production cost. Then the historical data of
products including types, number of components, assembling
method, and their assembling time were used to analyze the key
components affecting to production time. The price quoting model
then was proposed. The implementation of proposed model was able
to remarkably reduce quoting time with an acceptable required
precision.
Abstract: In this work, we incorporated a quartic bond potential
into a coarse-grained bead-spring model to study lubricant adsorption
on a solid surface as well as depletion instability. The surface tension
density and the number density profiles were examined to verify the
solid-liquid and liquid-vapor interfaces during heat treatment. It was
found that both the liquid-vapor interfacial thickness and the
solid-vapor separation increase with the temperatureT* when T*is
below the phase transition temperature Tc
*. At high temperatures
(T*>Tc
*), the solid-vapor separation decreases gradually as the
temperature increases. In addition, we evaluated the lubricant weight
and bond loss profiles at different temperatures. It was observed that
the lubricant desorption is favored over decomposition and is the main
cause of the lubricant failure at the head disk interface in our
simulations.
Abstract: A self-evolution algorithm for optimizing neural networks using a combination of PSO and JPSO is proposed. The algorithm optimizes both the network topology and parameters simultaneously with the aim of achieving desired accuracy with less complicated networks. The performance of the proposed approach is compared with conventional back-propagation networks using several synthetic functions, with better results in the case of the former. The proposed algorithm is also implemented on slope stability problem to estimate the critical factor of safety. Based on the results obtained, the proposed self evolving network produced a better estimate of critical safety factor in comparison to conventional BPN network.
Abstract: A suspension bridge is the most suitable type of structure for a long-span bridge due to rational use of structural materials. Increased deformability, which is conditioned by appearance of the elastic and kinematic displacements, is the major disadvantage of suspension bridges. The problem of increased kinematic displacements under the action of non-symmetrical load can be solved by prestressing. The prestressed suspension bridge with the span of 200 m was considered as an object of investigations. The cable truss with the cross web was considered as the main load carrying structure of the prestressed suspension bridge. The considered cable truss was optimized by 47 variable factors using Genetic algorithm and FEM program ANSYS. It was stated, that the maximum total displacements are reduced up to 29.9% by using of the cable truss with the rational characteristics instead of the single cable in the case of the worst situated load.
Abstract: Engineered nanoparticles’ usage rapidly increased in
various applications in the last decade due to their unusual properties.
However, there is an ever increasing concern to understand their
toxicological effect in human health. Particularly, metal and metal
oxide nanoparticles have been used in various sectors including
biomedical, food and agriculture. But their impact on human health is
yet to be fully understood. In this present investigation, we assessed
the toxic effect of engineered nanoparticles (ENPs) including Ag,
MgO and Co3O4 nanoparticles (NPs) on human mesenchymal stem
cells (hMSC) adopting cell viability and cellular morphological
changes as tools The results suggested that silver NPs are more toxic
than MgO and Co3O4NPs. The ENPs induced cytotoxicity and
nuclear morphological changes in hMSC depending on dose. The cell
viability decreases with increase in concentration of ENPs. The
cellular morphology studies revealed that ENPs damaged the cells.
These preliminary findings have implications for the use of these
nanoparticles in food industry with systematic regulations.
Abstract: In this paper, a two factor scheme is proposed to
generate cryptographic keys directly from biometric data, which
unlike passwords, are strongly bound to the user. Hash value of the
reference iris code is used as a cryptographic key and its length
depends only on the hash function, being independent of any other
parameter. The entropy of such keys is 94 bits, which is much higher
than any other comparable system. The most important and distinct
feature of this scheme is that it regenerates the reference iris code by
providing a genuine iris sample and the correct user password. Since
iris codes obtained from two images of the same eye are not exactly
the same, error correcting codes (Hadamard code and Reed-Solomon
code) are used to deal with the variability. The scheme proposed here
can be used to provide keys for a cryptographic system and/or for
user authentication. The performance of this system is evaluated on
two publicly available databases for iris biometrics namely CBS and
ICE databases. The operating point of the system (values of False
Acceptance Rate (FAR) and False Rejection Rate (FRR)) can be set
by properly selecting the error correction capacity (ts) of the Reed-
Solomon codes, e.g., on the ICE database, at ts = 15, FAR is 0.096%
and FRR is 0.76%.
Abstract: In contrast to existing methods which do not take into account multiconnectivity in a broad sense of this term, we develop mathematical models and highly effective combination (BIEM and FDM) numerical methods of calculation of stationary and quasi-stationary temperature field of a profile part of a blade with convective cooling (from the point of view of realization on PC). The theoretical substantiation of these methods is proved by appropriate theorems. For it, converging quadrature processes have been developed and the estimations of errors in the terms of A.Ziqmound continuity modules have been received. For visualization of profiles are used: the method of the least squares with automatic conjecture, device spline, smooth replenishment and neural nets. Boundary conditions of heat exchange are determined from the solution of the corresponding integral equations and empirical relationships. The reliability of designed methods is proved by calculation and experimental investigations heat and hydraulic characteristics of the gas turbine first stage nozzle blade.
Abstract: Until recently, energy security and climate change
were considered separate issues to be dealt with by policymakers.
The two issues are now converging, challenging the security and
climate communities to develop a better understanding of how to deal
with both issues simultaneously. Although Egypt is not a major
contributor to the world's total GHG emissions, it is particularly
vulnerable to the potential effects of global climate change such as
rising sea levels and changed patterns of rainfall in the Nile Basin.
Climate change is a major threat to sustainable growth and
development in Egypt, and the achievement of the Millennium
Development Goals. Egypt-s capacity to respond to the challenges of
climate instability will be expanded by improving overall resilience,
integrating climate change goals into sustainable development
strategies, increasing the use of modern energy systems with reduced
carbon intensity, and strengthening international initiatives. This
study seeks to establish a framework for considering the complex and
evolving links between energy security and climate change,
applicable to Egypt.
Abstract: Cybercrime is now becoming a big challenge in Nigeria apart from the traditional crime. Inability to identify perpetrators is one of the reasons for the growing menace. This paper proposes a design for monitoring internet users’ activities in order to curbing cybercrime. It requires redefining the operations of Internet Service Providers (ISPs) which will now mandate users to be authenticated before accessing the internet. In implementing this work which can be adapted to a larger scale, a virtual router application is developed and configured to mimic a real router device. A sign-up portal is developed to allow users to register with the ISP. The portal asks for identification information which will include bio-data and government issued identification data like National Identity Card number, et cetera. A unique username and password are chosen by the user to enable access to the internet which will be used to reference him to an Internet Protocol Address (IP Address) of any system he uses on the internet and thereby associating him to any criminal act related to that IP address at that particular time. Questions such as “What happen when another user knows the password and uses it to commit crime?” and other pertinent issues are addressed.
Abstract: Nowadays wireless technology plays an important
role in public and personal communication. However, the growth of
wireless networking has confused the traditional boundaries between
trusted and untrusted networks. Wireless networks are subject to a
variety of threats and attacks at present. An attacker has the ability to
listen to all network traffic which becoming a potential intrusion.
Intrusion of any kind may lead to a chaotic condition. In addition,
improperly configured access points also contribute the risk to
wireless network. To overcome this issue, a security solution that
includes an intrusion detection and prevention system need to be
implemented. In this paper, first the security drawbacks of wireless
network will be analyzed then investigate the characteristics and also
the limitations on current wireless intrusion detection and prevention
system. Finally, the requirement of next wireless intrusion prevention
system will be identified including some key issues which should be
focused on in the future to overcomes those limitations.
Abstract: A stage-structured predator-prey system with two time delays is considered. By analyzing the corresponding characteristic equation, the local stability of a positive equilibrium is investigated and the existence of Hopf bifurcations is established. Formulae are derived to determine the direction of bifurcations and the stability of bifurcating periodic solutions by using the normal form theory and center manifold theorem. Numerical simulations are carried out to illustrate the theoretical results. Based on the global Hopf bifurcation theorem for general functional differential equations, the global existence of periodic solutions is established.
Abstract: To solve the quick and accurate level-adjusting
problem in the process of spacecraft precise mating, automatic leveling
and equalizing hoist device for spacecraft is developed. Based on
lifting point adjustment by utilizing XY-workbench, the leveling and
equalizing controller by a self-adaptive control algorithm is proposed.
By simulation analysis and lifting test using engineering prototype,
validity and reliability of the hoist device is verified, which can meet
the precision mating requirements of practical applications for
spacecraft.
Abstract: Mobile devices, which are progressively surrounded
in our everyday life, have created a new paradigm where they
interconnect, interact and collaborate with each other. This network
can be used for flexible and secure coordinated sharing. On the other
hand Grid computing provides dependable, consistent, pervasive, and
inexpensive access to high-end computational capabilities. In this
paper, efforts are made to map the concepts of Grid on Ad-Hoc
networks because both exhibit similar kind of characteristics like
Scalability, Dynamism and Heterogeneity. In this context we
propose “Mobile Ad-Hoc Services Grid – MASGRID".
Abstract: Vehicle which are turning or maneuvering at high speeds
are susceptible to sliding and subsequently deviate from desired path. In
this paper the dynamics governing the Yaw/Roll behavior of a vehicle
has been simulated. Two different simulations have been used one for
the real vehicle, for which a fuzzy controller is designed to increase its
directional stability property. The other simulation is for a hypothetical
vehicle with much higher tire cornering stiffness which is capable of
developing the required lateral forces at the tire-ground patch contact to
attain the desired lateral acceleration for the vehicle to follow the
desired path without slippage. This simulation model is our reference
model.
The logic for keeping the vehicle on the desired track in the cornering
or maneuvering state is to have some braking forces on the inner or
outer tires based on the direction of vehicle deviation from the desired
path. The inputs to our vehicle simulation model is steer angle δ and
vehicle velocity V , and the outputs can be any kinematical parameters
like yaw rate, yaw acceleration, side slip angle, rate of side slip angle
and so on. The proposed fuzzy controller is a feed forward controller.
This controller has two inputs which are steer angle δ and vehicle
velocity V, and the output of the controller is the correcting moment M,
which guides the vehicle back to the desired track. To develop the
membership functions for the controller inputs and output and the fuzzy
rules, the vehicle simulation has been run for 1000 times and the
correcting moment have been determined by trial and error. Results of
the vehicle simulation with fuzzy controller are very promising
and show the vehicle performance is enhanced greatly over the
vehicle without the controller. In fact the vehicle performance
with the controller is very near the performance of the reference
ideal model.