Reliability Assessment of Bangladesh Power System Using Recursive Algorithm

An electric utility-s main concern is to plan, design, operate and maintain its power supply to provide an acceptable level of reliability to its users. This clearly requires that standards of reliability be specified and used in all three sectors of the power system, i.e., generation, transmission and distribution. That is why reliability of a power system is always a major concern to power system planners. This paper presents the reliability analysis of Bangladesh Power System (BPS). Reliability index, loss of load probability (LOLP) of BPS is evaluated using recursive algorithm and considering no de-rated states of generators. BPS has sixty one generators and a total installed capacity of 5275 MW. The maximum demand of BPS is about 5000 MW. The relevant data of the generators and hourly load profiles are collected from the National Load Dispatch Center (NLDC) of Bangladesh and reliability index 'LOLP' is assessed for the period of last ten years.

Testing Loaded Programs Using Fault Injection Technique

Fault tolerance is critical in many of today's large computer systems. This paper focuses on improving fault tolerance through testing. Moreover, it concentrates on the memory faults: how to access the editable part of a process memory space and how this part is affected. A special Software Fault Injection Technique (SFIT) is proposed for this purpose. This is done by sequentially scanning the memory of the target process, and trying to edit maximum number of bytes inside that memory. The technique was implemented and tested on a group of programs in software packages such as jet-audio, Notepad, Microsoft Word, Microsoft Excel, and Microsoft Outlook. The results from the test sample process indicate that the size of the scanned area depends on several factors. These factors are: process size, process type, and virtual memory size of the machine under test. The results show that increasing the process size will increase the scanned memory space. They also show that input-output processes have more scanned area size than other processes. Increasing the virtual memory size will also affect the size of the scanned area but to a certain limit.

Coordination for Synchronous Cooperative Systems Based on Fuzzy Causal Relations

Synchronous cooperative systems (SCS) bring together users that are geographically distributed and connected through a network to carry out a task. Examples of SCS include Tele- Immersion and Tele-Conferences. In SCS, the coordination is the core of the system, and it has been defined as the act of managing interdependencies between activities performed to achieve a goal. Some of the main problems that SCS present deal with the management of constraints between simultaneous activities and the execution ordering of these activities. In order to resolve these problems, orderings based on Lamport-s happened-before relation have been used, namely, causal, Δ-causal, and causal-total orderings. They mainly differ in the degree of asynchronous execution allowed. One of the most important orderings is the causal order, which establishes that the events must be seen in the cause-effect order as they occur in the system. In this paper we show that for certain SCS (e.g. videoconferences, tele-immersion) where some degradation of the system is allowed, ensuring the causal order is still rigid, which can render negative affects to the system. In this paper, we illustrate how a more relaxed ordering, which we call Fuzzy Causal Order (FCO), is useful for such kind of systems by allowing a more asynchronous execution than the causal order. The benefit of the FCO is illustrated by applying it to a particular scenario of intermedia synchronization of an audio-conference system.

Evaluation of Graph-based Analysis for Forest Fire Detections

Spatial outliers in remotely sensed imageries represent observed quantities showing unusual values compared to their neighbor pixel values. There have been various methods to detect the spatial outliers based on spatial autocorrelations in statistics and data mining. These methods may be applied in detecting forest fire pixels in the MODIS imageries from NASA-s AQUA satellite. This is because the forest fire detection can be referred to as finding spatial outliers using spatial variation of brightness temperature. This point is what distinguishes our approach from the traditional fire detection methods. In this paper, we propose a graph-based forest fire detection algorithm which is based on spatial outlier detection methods, and test the proposed algorithm to evaluate its applicability. For this the ordinary scatter plot and Moran-s scatter plot were used. In order to evaluate the proposed algorithm, the results were compared with the MODIS fire product provided by the NASA MODIS Science Team, which showed the possibility of the proposed algorithm in detecting the fire pixels.

The Effect of Repeated Reading on Student Fluency: Does Practice Always Make Perfect?

Fluency is a skill that, unfortunately, many students lack. This deficiency causes students to be frustrated with, and overwhelmed by, the act of reading. However, research suggests that the repeated reading method may help students to improve their fluency. This study examines the effects of repeated readings on student fluency. The study-s overarching question is: What effect do increases in repeated reading have on reading fluency among middle school students from diverse backgrounds? More specifically, the authors examine whether repeated reading improves the fluency, reading speed, reading-oriented self-esteem, and confidence of students of diverse academic abilities, socio-economics statuses, and racial and ethnic backgrounds. To examine these questions the authors conducted a study using repeated reading strategies with a sample of students from an urban, middle school in the southeastern United States. We found that, on average, the use of repeated reading strategies increased students- fluency, words per minute (wpm) reading score, reading-oriented self-esteem, and confidence.

Analysis Fraction Flow of Water versus Cumulative Oil Recoveries Using Buckley Leverett Method

To derive the fractional flow equation oil displacement will be assumed to take place under the so-called diffusive flow condition. The constraints are that fluid saturations at any point in the linear displacement path are uniformly distributed with respect to thickness; this allows the displacement to be described mathematically in one dimension. The simultaneous flow of oil and water can be modeled using thickness averaged relative permeability, along the centerline of the reservoir. The condition for fluid potential equilibrium is simply that of hydrostatic equilibrium for which the saturation distribution can be determined as a function of capillary pressure and therefore, height. That is the fluids are distributed in accordance with capillary-gravity equilibrium. This paper focused on the fraction flow of water versus cumulative oil recoveries using Buckley Leverett method. Several field cases have been developed to aid in analysis. Producing watercut (at surface conditions) will be compared with the cumulative oil recovery at breakthrough for the flowing fluid.

Space Charge Distribution in 22 kV XLPE Insulated Cable by Using Pulse Electroacoustic Measurement Technique

This paper presents the experimental results on space charge distribution in cross-linked polyethylene (XLPE) insulating material for 22 kV power distribution system cable by using pulse electroacoustic measurement technique (PEA). Numbers of XLPE insulating material ribbon having thickness 60 μm taken from unused 22 kV high voltage cable were used as specimen in this study. DC electric field stress was applied to test specimen at room temperature (25°C). Four levels of electric field stress, 25 kV/mm, 50 kV/mm, 75 kV/mm and 100 kV/mm, were used. In order to investigate space charge distribution characteristic, space charge distribution characteristics were measured after applying electric field stress 15 min, 30 min and 60 min, respectively. The results show that applied time and magnitude of dc electric field stress play an important role to the formation of space charge.

A Multiple Inlet Swirler for Gas Turbine Combustors

The central recirculation zone (CRZ) in a swirl stabilized gas turbine combustor has a dominant effect on the fuel air mixing process and flame stability. Most of state of the art swirlers share one disadvantage; the fixed swirl number for the same swirler configuration. Thus, in a mathematical sense, Reynolds number becomes the sole parameter for controlling the flow characteristics inside the combustor. As a result, at low load operation, the generated swirl is more likely to become feeble affecting the flame stabilization and mixing process. This paper introduces a new swirler concept which overcomes the mentioned weakness of the modern configurations. The new swirler introduces air tangentially and axially to the combustor through tangential vanes and an axial vanes respectively. Therefore, it provides different swirl numbers for the same configuration by regulating the ratio between the axial and tangential flow momenta. The swirler aerodynamic performance was investigated using four CFD simulations in order to demonstrate the impact of tangential to axial flow rate ratio on the CRZ. It was found that the length of the CRZ is directly proportional to the tangential to axial air flow rate ratio.

Activities of Alkaline Phosphatase and Ca2+ATPase over the Molting Cycle of mud Crab (Scylla serrata)

The activities of alkaline phosphatase and Ca2+ATPase in mud crab (Scylla serrata) collected from a soft-shell crab farm in Chantaburi Province, Thailand, in several stages of molting cycle were observed. The results showed that the activity of alkaline phosphatase in gill after molting was highly significant (p

Improving Digital Image Edge Detection by Fuzzy Systems

Image Edge Detection is one of the most important parts of image processing. In this paper, by fuzzy technique, a new method is used to improve digital image edge detection. In this method, a 3x3 mask is employed to process each pixel by means of vicinity. Each pixel is considered a fuzzy input and by examining fuzzy rules in its vicinity, the edge pixel is specified and by utilizing calculation algorithms in image processing, edges are displayed more clearly. This method shows significant improvement compared to different edge detection methods (e.g. Sobel, Canny).

Space Vector Pulse Width Modulation Technique Based Design and Simulation of a Three-Phase Voltage Source Converter Systems

A Space Vector based Pulse Width Modulation control technique for the three-phase PWM converter is proposed in this paper. The proposed control scheme is based on a synchronous reference frame model. High performance and efficiency is obtained with regards to the DC bus voltage and the power factor considerations of the PWM rectifier thus leading to low losses. MATLAB/SIMULINK are used as a platform for the simulations and a SIMULINK model is presented in the paper. The results show that the proposed model demonstrates better performance and properties compared to the traditional SPWM method and the method improves the dynamic performance of the closed loop drastically. For the Space Vector based Pulse Width Modulation, Sine signal is the reference waveform and triangle waveform is the carrier waveform. When the value sine signal is large than triangle signal, the pulse will start produce to high. And then when the triangular signals higher than sine signal, the pulse will come to low. SPWM output will changed by changing the value of the modulation index and frequency used in this system to produce more pulse width. The more pulse width produced, the output voltage will have lower harmonics contents and the resolution increase.

Approach to Implementation of Power Management with Load Prioritizations in Modern Civil Aircraft

Any use of energy in industrial productive activities is combined with various environment impacts. Withintransportation, this fact was not only found among land transport, railways and maritime transport, but also in the air transport industry. An effective climate protection requires strategies and measures for reducing all greenhouses gas emissions, in particular carbon dioxide, and must take into account the economic, ecologic and social aspects. It seem simperative now to develop and manufacture environmentally friendly products and systems, to reduce consumption and use less resource, and to save energy and power. Today-sproducts could better serve these requirements taking into account the integration of a power management system into the electrical power system.This paper gives an overview of an approach ofpower management with load prioritization in modernaircraft. Load dimensioning and load management strategies on current civil aircraft will be presented and used as a basis for the proposed approach.

A Comparative Cross-sectional Study of Religious Behavior in High School and University Students

The purpose of this study was to investigate the religious behavior of students in high school and universality in Lamerd , a town in the south of Iran, with respect to increase in their level of education and age. The participants were 450 high school and university students in all levels from first year of junior high school to the senior university students who were chosen through multistage cluster sampling method and their religious behavior was studied. Through the revised questionnaire by Nezar Alany from the University of Bahrain (r = 0/797), the religious behavior of the subjects were analyzed. Results showed that students in high school in religious behavior were superior to the students of university (003/0>p) and there was a decline of religious behavior in junior high school third year students to second students of the same school (042/0>p). More important is that the decrease in religious behavior was associated with increase in educational levels (017/0>p) and age (043/0>p).

An UML Statechart Diagram-Based MM-Path Generation Approach for Object-Oriented Integration Testing

MM-Path, an acronym for Method/Message Path, describes the dynamic interactions between methods in object-oriented systems. This paper discusses the classifications of MM-Path, based on the characteristics of object-oriented software. We categorize it according to the generation reasons, the effect scope and the composition of MM-Path. A formalized representation of MM-Path is also proposed, which has considered the influence of state on response method sequences of messages. .Moreover, an automatic MM-Path generation approach based on UML Statechart diagram has been presented, and the difficulties in identifying and generating MM-Path can be solved. . As a result, it provides a solid foundation for further research on test cases generation based on MM-Path.

Fuzzy Logic Control for a Speed Control of Induction Motor using Space Vector Pulse Width Modulation

This paper presents design and implements a voltage source inverter type space vector pulse width modulation (SVPWM) for control a speed of induction motor. This scheme leads to be able to adjust the speed of the motor by control the frequency and amplitude of the stator voltage, the ratio of stator voltage to frequency should be kept constant. The fuzzy logic controller is also introduced to the system for keeping the motor speed to be constant when the load varies. The experimental results in testing the 0.22 kW induction motor from no-load condition to rated condition show the effectiveness of the proposed control scheme.

Exploiting Self-Adaptive Replication Management on Decentralized Tuple Space

Decentralized Tuple Space (DTS) implements tuple space model among a series of decentralized hosts and provides the logical global shared tuple repository. Replication has been introduced to promote performance problem incurred by remote tuple access. In this paper, we propose a replication approach of DTS allowing replication policies self-adapting. The accesses from users or other nodes are monitored and collected to contribute the decision making. The replication policy may be changed if the better performance is expected. The experiments show that this approach suitably adjusts the replication policies, which brings negligible overhead.

Encryption Efficiency Analysis and Security Evaluation of RC6 Block Cipher for Digital Images

This paper investigates the encryption efficiency of RC6 block cipher application to digital images, providing a new mathematical measure for encryption efficiency, which we will call the encryption quality instead of visual inspection, The encryption quality of RC6 block cipher is investigated among its several design parameters such as word size, number of rounds, and secret key length and the optimal choices for the best values of such design parameters are given. Also, the security analysis of RC6 block cipher for digital images is investigated from strict cryptographic viewpoint. The security estimations of RC6 block cipher for digital images against brute-force, statistical, and differential attacks are explored. Experiments are made to test the security of RC6 block cipher for digital images against all aforementioned types of attacks. Experiments and results verify and prove that RC6 block cipher is highly secure for real-time image encryption from cryptographic viewpoint. Thorough experimental tests are carried out with detailed analysis, demonstrating the high security of RC6 block cipher algorithm. So, RC6 block cipher can be considered to be a real-time secure symmetric encryption for digital images.

Location of Vortex Formation Threshold at Suction Inlets near Ground Planes – Ascending and Descending Conditions

Vortices can develop in intakes of turbojet and turbo fan aero engines during high power operation in the vicinity of solid surfaces. These vortices can cause catastrophic damage to the engine. The factors determining the formation of the vortex include both geometric dimensions as well as flow parameters. It was shown that the threshold at which the vortex forms or disappears is also dependent on the initial flow condition (i.e. whether a vortex forms after stabilised non vortex flow or vice-versa). A computational fluid dynamics study was conducted to determine the difference in thresholds between the two conditions. This is the first reported numerical investigation of the “memory effect". The numerical results reproduce the phenomenon reported in previous experimental studies and additional factors, which had not been previously studied, were investigated. They are the rate at which ambient velocity changes and the initial value of ambient velocity. The former was found to cause a shift in the threshold but not the later. It was also found that the varying condition thresholds are not symmetrical about the neutral threshold. The vortex to no vortex threshold lie slightly further away from the neutral threshold compared to the no vortex to vortex threshold. The results suggests that experimental investigation of vortex formation threshold performed either in vortex to no vortex conditions, or vice versa, solely may introduce mis-predictions greater than 10%.

Finite Element Modelling of Ground Vibrations Due to Tunnelling Activities

This paper presents the use of three-dimensional finite elements coupled with infinite elements to investigate the ground vibrations at the surface in terms of the peak particle velocity (PPV) due to construction of the first bore of the Dublin Port Tunnel. This situation is analysed using a commercially available general-purpose finite element package ABAQUS. A series of parametric studies is carried out to examine the sensitivity of the predicted vibrations to variations in the various input parameters required by finite element method, including the stiffness and the damping of ground. The results of this study show that stiffness has a more significant effect on the PPV rather than the damping of the ground.

High Efficiency, Selectivity against Cancer Cell Line of Purified L-Asparaginase from Pathogenic Escherichia coli

L-asparaginase was extracted from pathogenic Escherichia coli which was isolated from urinary tract infection patients. L-asparaginase was purified 96-fold by ultrafiltration, ion exchange and gel filtration giving 39.19% yield with final specific activity of 178.57 IU/mg. L-asparaginase showed 138,356±1,000 Dalton molecular weight with 31024±100 Dalton molecular mass. Kinetic properties of enzyme resulting 1.25×10-5 mM Km and 2.5×10-3 M/min Vmax. L-asparaginase showed a maximum activity at pH 7.5 when incubated at 37 ºC for 30 min and illustrated its full activity (100%) after 15 min incubation at 20-37 ºC, while 70% of its activity was lost when incubated at 60 ºC. L-asparaginase showed cytotoxicity to U937 cell line with IC50 0.5±0.19 IU/ml, and selectivity index (SI=7.6) about 8 time higher selectivity over the lymphocyte cells. Therefore, the local pathogenic E. coli strains may be used as a source of high yield of L-asparaginase to produce anti cancer agent with high selectivity.