Abstract: Reliable water level forecasts are particularly
important for warning against dangerous flood and inundation. The
current study aims at investigating the suitability of the adaptive
network based fuzzy inference system for continuous water level
modeling. A hybrid learning algorithm, which combines the least
square method and the back propagation algorithm, is used to
identify the parameters of the network. For this study, water levels
data are available for a hydrological year of 2002 with a sampling
interval of 1-hour. The number of antecedent water level that should
be included in the input variables is determined by two statistical
methods, i.e. autocorrelation function and partial autocorrelation
function between the variables. Forecasting was done for 1-hour until
12-hour ahead in order to compare the models generalization at
higher horizons. The results demonstrate that the adaptive networkbased
fuzzy inference system model can be applied successfully and
provide high accuracy and reliability for river water level estimation.
In general, the adaptive network-based fuzzy inference system
provides accurate and reliable water level prediction for 1-hour ahead
where the MAPE=1.15% and correlation=0.98 was achieved. Up to
12-hour ahead prediction, the model still shows relatively good
performance where the error of prediction resulted was less than
9.65%. The information gathered from the preliminary results
provide a useful guidance or reference for flood early warning
system design in which the magnitude and the timing of a potential
extreme flood are indicated.
Abstract: Decentralized Tuple Space (DTS) implements tuple
space model among a series of decentralized hosts and provides the
logical global shared tuple repository. Replication has been introduced
to promote performance problem incurred by remote tuple access. In
this paper, we propose a replication approach of DTS allowing
replication policies self-adapting. The accesses from users or other
nodes are monitored and collected to contribute the decision making.
The replication policy may be changed if the better performance is
expected. The experiments show that this approach suitably adjusts the
replication policies, which brings negligible overhead.
Abstract: A packet analyzer is a tool for debugging sensor
network systems and is convenient for developers. In this paper, we
introduce a new packet analyzer based on an embedded system. The
proposed packet analyzer is compatible with IEEE 802.15.4, which is
suitable for the wireless communication standard for sensor networks,
and is available for remote control by adopting a server-client scheme
based on the Ethernet interface. To confirm the operations of the
packet analyzer, we have developed two types of sensor nodes based
on PIC4620 and ATmega128L microprocessors and tested the
functions of the proposed packet analyzer by obtaining the packets
from the sensor nodes.
Abstract: Keys to high-quality face-to-face education are ensuring flexibility in the way lectures are given, and providing care and responsiveness to learners. This paper describes a face-to-face education support system that is designed to raise the satisfaction of learners and reduce the workload on instructors. This system consists of a lecture adaptation assistance part, which assists instructors in adapting teaching content and strategy, and a Q&A assistance part, which provides learners with answers to their questions. The core component of the former part is a “learning achievement map", which is composed of a Bayesian network (BN). From learners- performance in exercises on relevant past lectures, the lecture adaptation assistance part obtains information required to adapt appropriately the presentation of the next lecture. The core component of the Q&A assistance part is a case base, which accumulates cases consisting of questions expected from learners and answers to them. The Q&A assistance part is a case-based search system equipped with a search index which performs probabilistic inference. A prototype face-to-face education support system has been built, which is intended for the teaching of Java programming, and this approach was evaluated using this system. The expected degree of understanding of each learner for a future lecture was derived from his or her performance in exercises on past lectures, and this expected degree of understanding was used to select one of three adaptation levels. A model for determining the adaptation level most suitable for the individual learner has been identified. An experimental case base was built to examine the search performance of the Q&A assistance part, and it was found that the rate of successfully finding an appropriate case was 56%.
Abstract: Assassination of politicians, school mass murders, purported suicides, aircraft crash, mass shootings by police, sinking of sea ferries, mysterious car accidents, mass fire deaths and horrificterror attacks are some of the cases that bring forth scientific and legal conflicts. Questions about truth, justice and human rights are raised by both victims and perpetrators/offenders as they seek to understand why and how it happened to them. This kind of questioning manifests itself in medical-criminological-legalpsychological and scientific realms. An agreement towards truthinvestigations for possible legal-political-psychological transitory issues such as prosecution, victim-offender mediation, healing, reconciliation, amnesty, reparation, restitution, and policy formulations is seen as one way of transforming these conflicts. Forensic scientists and pathologists in particular have formed professional groups where the complexities between legal truth and scientific truth are dramatized and elucidated within the anatomy of courtrooms. This paper focuses on how pathological truth and legal truth interact with each other in Kenya’s criminal justice system.
Abstract: In deregulated operating regime power system security is an issue that needs due thoughtfulness from researchers in the horizon of unbundling of generation and transmission. Electric power systems are exposed to various contingencies. Network contingencies often contribute to overloading of branches, violation of voltages and also leading to problems of security/stability. To maintain the security of the systems, it is desirable to estimate the effect of contingencies and pertinent control measurement can be taken on to improve the system security. This paper presents the application of particle swarm optimization algorithm to find the optimal location of multi type FACTS devices in a power system in order to eliminate or alleviate the line over loads. The optimizations are performed on the parameters, namely the location of the devices, their types, their settings and installation cost of FACTS devices for single and multiple contingencies. TCSC, SVC and UPFC are considered and modeled for steady state analysis. The selection of UPFC and TCSC suitable location uses the criteria on the basis of improved system security. The effectiveness of the proposed method is tested for IEEE 6 bus and IEEE 30 bus test systems.
Abstract: This study aims to assess the potential of solar energy technology for improving access to water and hence the livelihood strategies of rural communities in Baja California Sur, Mexico. It focuses on livestock ranches and photovoltaic water-pumptechnology as well as other water extraction methods. The methodology used are the Sustainable Livelihoods and the Appropriate Technology approaches. A household survey was applied in June of 2006 to 32 ranches in the municipality, of which 22 used PV pumps; and semi-structured interviews were conducted. Findings indicate that solar pumps have in fact helped people improve their quality of life by allowing them to pursue a different livelihood strategy and that improved access to water -not necessarily as more water but as less effort to extract and collect it- does not automatically imply overexploitation of the resource; consumption is based on basic needs as well as on storage and pumping capacity. Justification for such systems lies in the avoidance of logistical problems associated to fossil fuels, PV pumps proved to be the most beneficial when substituting gasoline or diesel equipment but of dubious advantage if intended to replace wind or gravity systems. Solar water pumping technology-s main obstacle to dissemination are high investment and repairs costs and it is therefore not suitable for all cases even when insolation rates and water availability are adequate. In cases where affordability is not an obstacle it has become an important asset that contributes –by means of reduced expenses, less effort and saved time- to the improvement of livestock, the main livelihood provider for these ranches.
Abstract: In all industries which are related to heat, suitable
thermal ranges are defined for each device to operate well.
Consideration of these limits requires a thermal control unit beside
the main system. The Satellite Thermal Control Unit exploits from
different methods and facilities individually or mixed. For enhancing
heat transfer between primary surface and the environment,
utilization of radiating extended surfaces are common. Especially for
large temperature differences; variable thermal conductivity has a
strong effect on performance of such a surface .In most literatures,
thermo-physical properties, such as thermal conductivity, are
assumed as constant. However, in some recent researches the
variation of these parameters is considered. This may be helpful for
the evaluation of fin-s temperature distribution in relatively large
temperature differences. A new method is introduced to evaluate
temperature-dependent thermal conductivity values. The finite
volume method is employed to simulate numerically the temperature
distribution in a space radiating fin. The present modeling is carried
out for Aluminum as fin material and compared with previous
method. The present results are also compared with those of two
other analytical methods and good agreement is shown.
Abstract: Realistic systems generally are systems with various
inputs and outputs also known as Multiple Input Multiple Output
(MIMO). Such systems usually prove to be complex and difficult to
model and control purposes. Therefore, decomposition was used to
separate individual inputs and outputs. A PID is assigned to each
individual pair to regulate desired settling time. Suitable parameters
of PIDs obtained from Genetic Algorithm (GA), using Mean of
Squared Error (MSE) objective function.
Abstract: Rotor Flux based Model Reference Adaptive System
(RF-MRAS) is the most popularly used conventional speed
estimation scheme for sensor-less IM drives. In this scheme, the
voltage model equations are used for the reference model. This
encounters major drawbacks at low frequencies/speed which leads to
the poor performance of RF-MRAS. Replacing the reference model
using Neural Network (NN) based flux estimator provides an
alternate solution and addresses such drawbacks. This paper
identifies an NN based flux estimator using Single Neuron Cascaded
(SNC) Architecture. The proposed SNC-NN model replaces the
conventional voltage model in RF-MRAS to form a novel MRAS
scheme named as SNC-NN-MRAS. Through simulation the proposed
SNC-NN-MRAS is shown to be promising in terms of all major
issues and robustness to parameter variation. The suitability of the
proposed SNC-NN-MRAS based speed estimator and its advantages
over RF-MRAS for sensor-less induction motor drives is
comprehensively presented through extensive simulations.
Abstract: A new sythetic gene coding for a Human
Elastin-Like Polypeptide was constructed and expressed. The
recombinant product was tested as coating agent to realize a
surface suitable for cell growth. Coatings showed peculiar
features and different human cell lines were seeded and
cultured. All cell lines tested showed to adhere and proliferate
on this substrate that has been shown also to exert a specific
effect on cells, depending on cell type.
Abstract: The aim of this paper is to present a new
three-dimensional proportional-pursuit coupled (PP) guidance law to
track highly maneuverable aircraft. Utilizing a 3-D polar coordinate frame, the PP guidance law is formed by collecting proportional
navigation guidance in Z-R plane and pursuit guidance in X-Y plane.
Feedback linearization control method to solve the guidance
accelerations is used to implement PP guidance. In order to
compensate the actuator time delay, the time delay compensated
version of PP guidance law (CPP) was derived and proved the
effectiveness of modifying the problem of high acceleration in the final
phase of pursuit guidance and improving the weak robustness of
proportional navigation. The simulation results for intercepting Max G
turn situation show that the proposed proportional-pursuit coupled
guidance law guidance law with actuator delay compensation (CPP)
possesses satisfactory robustness and performance.
Abstract: Finding suitable non-supersingular elliptic curves for
pairing-based cryptosystems becomes an important issue for the
modern public-key cryptography after the proposition of id-based
encryption scheme and short signature scheme. In previous work
different algorithms have been proposed for finding such elliptic
curves when embedding degree k ∈ {3, 4, 6} and cofactor h ∈ {1, 2, 3,
4, 5}. In this paper a new method is presented to find more
non-supersingular elliptic curves for pairing-based cryptosystems with
general embedding degree k and large values of cofactor h. In
addition, some effective parameters of these non-supersingular elliptic
curves are provided in this paper.
Abstract: Turbulence of the incoming wind field is of paramount
importance to the dynamic response of civil engineering structures. Hence reliable stochastic models of the turbulence should be available from which time series can be generated for dynamic response and
structural safety analysis. In the paper an empirical cross spectral
density function for the along-wind turbulence component over the wind field area is taken as the starting point. The spectrum is spatially
discretized in terms of a Hermitian cross-spectral density matrix for the turbulence state vector which turns out not to be positive
definite. Since the succeeding state space and ARMA modelling of
the turbulence rely on the positive definiteness of the cross-spectral
density matrix, the problem with the non-positive definiteness of such
matrices is at first addressed and suitable treatments regarding it are proposed. From the adjusted positive definite cross-spectral density
matrix a frequency response matrix is constructed which determines the turbulence vector as a linear filtration of Gaussian white noise.
Finally, an accurate state space modelling method is proposed which allows selection of an appropriate model order, and estimation of a state space model for the vector turbulence process incorporating its phase spectrum in one stage, and its results are compared with a conventional ARMA modelling method.
Abstract: Tufting carpet is a very suitable substrate for growing
microorganism such as pathogenic microbes, due to the direct touch
with human body, long washing periods and laying on the floor; in
fact there are 3 major problems: To risk human health, Prepare bad
odors and Destruction of the products.. In the presented research, for
investigation of presence most common microbes on polyester
tufting, first goods laid in a public place (in the corridor fair) for 30
days and the existence of some microbes were investigate on it with
two methods of enrichment in nutrient environments such as
thioglycolate and noutrunt brath, and shake the dust off the polyester
tufting onto cultivation mediums such as blood agar and noutrunt
agar. After the microorganism colonics are grown, the colonies were
separated and six microbial tests such as cataloes and sitrat were
carried out in five phases on the colonics for identifying the varieties
of bacteria. As a result of tests, 5 type of bacteria, such as
Escherichia coli, staphylococcus saprophytic as were identified. Each
of the mentioned bacteria can be seriously harmful for the heath of
human.
Abstract: This paper proposes a model of adding relations between
members of the same level in a pyramid organization structure
which is a complete K-ary tree such that the communication of
information between every member in the organization becomes the
most efficient. When edges between one node and every other node
with the same depth N in a complete K-ary tree of height H are
added, an optimal depth N* = H is obtained by minimizing the total
path length which is the sum of lengths of shortest paths between
every pair of all nodes.
Abstract: Current advancements in nanotechnology are dependent
on the capabilities that can enable nano-scientists to extend their eyes
and hands into the nano-world. For this purpose, a haptics (devices
capable of recreating tactile or force sensations) based system for
AFM (Atomic Force Microscope) is proposed. The system enables
the nano-scientists to touch and feel the sample surfaces, viewed
through AFM, in order to provide them with better understanding of
the physical properties of the surface, such as roughness, stiffness and
shape of molecular architecture. At this stage, the proposed work uses
of ine images produced using AFM and perform image analysis to
create virtual surfaces suitable for haptics force analysis. The research
work is in the process of extension from of ine to online process
where interaction will be done directly on the material surface for
realistic analysis.
Abstract: This paper describes a rapid prototyping (RP)
technology for forming a hydroxyapatite (HA) bone scaffold model.
The HA powder and a silica sol are mixed into bioceramic slurry form
under a suitable viscosity. The HA particles are embedded in the
solidified silica matrix to form green parts via a wide range of process
parameters after processing by selective laser sintering (SLS). The
results indicate that the proposed process was possible to fabricate
multilayers and hollow shell structure with brittle property but
sufficient integrity for handling prior to post-processing. The
fabricated bone scaffold models had a surface finish of 25
Abstract: Wireless Sensor and Actor Networks (WSANs) constitute an emerging and pervasive technology that is attracting increasing interest in the research community for a wide range of applications. WSANs have two important requirements: coordination interactions and real-time communication to perform correct and timely actions. This paper introduces a methodology to facilitate the task of the application programmer focusing on the coordination and real-time requirements of WSANs. The methodology proposed in this model uses a real-time component model, UM-RTCOM, which will help us to achieve the design and implementation of applications in WSAN by using the component oriented paradigm. This will help us to develop software components which offer some very interesting features, such as reusability and adaptability which are very suitable for WSANs as they are very dynamic environments with rapidly changing conditions. In addition, a high-level coordination model based on tuple channels (TC-WSAN) is integrated into the methodology by providing a component-based specification of this model in UM-RTCOM; this will allow us to satisfy both sensor-actor and actor-actor coordination requirements in WSANs. Finally, we present in this paper the design and implementation of an application which will help us to show how the methodology can be easily used in order to achieve the development of WSANs applications.
Abstract: Nowadays, keyless entry systems are widely adopted
for vehicle immobilizer systems due to both advantages of security and
convenience. Keyless entry systems could overcome brute-force key
guessing attack, statistics attack and masquerade attack, however,
they can't prevent from thieves stealing behavior. In this paper, we
proposed a new architecture try to improve the existent flaws. The
integration of the keyless entry system and the fingerprint
identification technology is more suitable to implement on the
portable transponder to achieve higher security needs. We also adopt
and modify AES security protocol for life expectancy and security of
the portable transponder. In addition, the identification of a driver's
fingerprint makes the service of automatic reinstatement of a driver's
preferences become possible. Our design can satisfy not only the three
kinds of previous illegal attacks, but also the stealing situation.
Furthermore, many practical factors, such as costs, life expectancy and
performance, have been well considered in the design of portable
transponder.