Abstract: The electric power industry is currently undergoing an unprecedented reform. One of the most exciting and potentially profitable recent developments is increasing usage of artificial intelligence techniques. The intention of this paper is to give an overview of using neural network (NN) techniques in power systems. According to the growth rate of NNs application in some power system subjects, this paper introduce a brief overview in fault diagnosis, security assessment, load forecasting, economic dispatch and harmonic analyzing. Advantages and disadvantages of using NNs in above mentioned subjects and the main challenges in these fields have been explained, too.
Abstract: Personnel protection devices are cardinal in safety hazard applications. They are widely used in home, office and in industry environments to reduce the risk of lethal shock to human being and equipment safety. This paper briefly reviews various personnel protection devices also describes the basic working principle of conventional ground fault circuit interrupter (GFCI) or ground fault isolator (GFI), its disadvantages and ways to overcome the disadvantages with solid-state relay (SSR) based GFI with ultrafast response up on fault implemented in printed circuit board. This solid state GFI comprises discrete MOSFET based alternating current (AC) switches, linear optical amplifier, photovoltaic isolator and sense resistor. In conventional GFI, current transformer is employed as a sensing element to detect the difference in current flow between live and neutral conductor. If there is no fault in equipment powered through GFI, due to insulation failure of internal wires and windings of motors, both live and neutral currents will be equal in magnitude and opposite in phase.
Abstract: Software security testing is an important means to ensure software security and trustiness. This paper first mainly discusses the definition and classification of software security testing, and investigates methods and tools of software security testing widely. Then it analyzes and concludes the advantages and disadvantages of various methods and the scope of application, presents a taxonomy of security testing tools. Finally, the paper points out future focus and development directions of software security testing technology.
Abstract: One of the major disadvantages of the minimally
invasive surgery (MIS) is the lack of tactile feedback to the surgeon.
In order to identify and avoid any damage to the grasped complex
tissue by endoscopic graspers, it is important to measure the local
softness of tissue during MIS. One way to display the measured
softness to the surgeon is a graphical method. In this paper, a new
tactile sensor has been reported. The tactile sensor consists of an
array of four softness sensors, which are integrated into the jaws of a
modified commercial endoscopic grasper. Each individual softness
sensor consists of two piezoelectric polymer Polyvinylidene Fluoride
(PVDF) films, which are positioned below a rigid and a compliant
cylinder. The compliant cylinder is fabricated using a micro molding
technique. The combination of output voltages from PVDF films is
used to determine the softness of the grasped object. The theoretical
analysis of the sensor is also presented.
A method has been developed with the aim of reproducing the
tactile softness to the surgeon by using a graphical method. In this
approach, the proposed system, including the interfacing and the data
acquisition card, receives signals from the array of softness sensors.
After the signals are processed, the tactile information is displayed
by means of a color coding method. It is shown that the degrees of
softness of the grasped objects/tissues can be visually differentiated
and displayed on a monitor.
Abstract: S-Curves are commonly used in technology forecasting. They show the paths of product performance in relation to time or investment in R&D. It is a useful tool to describe the inflection points and the limit of improvement of a technology. Companies use this information to base their innovation strategies.
However inadequate use and some limitations of this technique lead
to problems in decision making. In this paper first technology
forecasting and its importance for company level strategies will be
discussed. Secondly the S-Curve and its place among other
forecasting techniques will be introduced. Thirdly its use in
technology forecasting will be discussed based on its advantages,
disadvantages and limitations. Finally an application of S-curve on
3D TV technology using patent data will also be presented and the
results will be discussed.
Abstract: Software-as-a-Service (SaaS) is a form of cloud
computing that relieves the user of the burden of hardware and
software installation and management. SaaS can be used at the course
level to enhance curricula and student experience. When cloud
computing and SaaS are included in educational literature, the focus
is typically on implementing administrative functions. Yet, SaaS can
make more immediate and substantial contributions to the technical
course content in educational offerings. This paper explores cloud
computing and SaaS, provides examples, reports on experiences
using SaaS to offer specialized software in courses, and analyzes the
advantages and disadvantages of using SaaS at the course level. The
paper contributes to the literature in higher education by analyzing
the major technical concepts, potential, and constraints for using
SaaS to deliver specialized software at the course level. Further it
may enable more educators and students to benefit from this
emerging technology.
Abstract: Low-carbon economy means the energy conservation and emission reduction. How to measure and evaluate the regional low-carbon economy is an important problem which should be solved immediately. This paper proposed the eco-efficiency ratio based on the ecological efficiency to evaluate the current situation of the low-carbon economy in Jiangsu province and to analyze the efficiency of the low-carbon economy in Jiangsu and other provinces, compared both advantages and disadvantages. And then this paper put forward some advices for the government to formulate the correct development policy of low-carbon economy, to improve the technology innovation capacity and the efficiency of resource allocation.
Abstract: Both image steganography and image encryption have
advantages and disadvantages. Steganograhy allows us to hide a
desired image containing confidential information in a covered or
host image while image encryption is decomposing the desired image
to a non-readable, non-comprehended manner. The encryption
methods are usually much more robust than the steganographic ones.
However, they have a high visibility and would provoke the attackers
easily since it usually is obvious from an encrypted image that
something is hidden! The combination of steganography and
encryption will cover both of their weaknesses and therefore, it
increases the security. In this paper an image encryption method
based on sinc-convolution along with using an encryption key of 128
bit length is introduced. Then, the encrypted image is covered by a
host image using a modified version of JSteg steganography
algorithm. This method could be applied to almost all image formats
including TIF, BMP, GIF and JPEG. The experiment results show
that our method is able to hide a desired image with high security and
low visibility.
Abstract: This article deals with the conceptual modeling under uncertainty. First, the division of information systems with their definition will be described, focusing on those where the construction of a conceptual model is suitable for the design of future information system database. Furthermore, the disadvantages of the traditional approach in creating a conceptual model and database design will be analyzed. A comprehensive methodology for the creation of a conceptual model based on analysis of client requirements and the selection of a suitable domain model is proposed here. This article presents the expert system used for the construction of a conceptual model and is a suitable tool for database designers to create a conceptual model.
Abstract: Three-phase induction machines are today a standard
for industrial electrical drives. Cost, reliability, robustness and maintenance free operation are among the reasons these machines are
replacing dc drive systems. The development of power electronics
and signal processing systems has eliminated one of the greatest
disadvantages of such ac systems, which is the issue of control. With
modern techniques of field oriented vector control, the task of
variable speed control of induction machines is no longer a
disadvantage. The need to increase system performance, particularly
when facing limits on the power ratings of power supplies and
semiconductors, motivates the use of phase number other than three,
In this paper a novel scheme of connecting two, three phase
induction motors in parallel fed by two inverters; viz. VSI and CSI
and their vector control is presented.
Abstract: CEMTool is a command style design and analyzing
package for scientific and technological algorithm and a matrix based
computation language. In this paper, we present new 2D & 3D
finite element method (FEM) packages for CEMTool. We discuss
the detailed structures and the important features of pre-processor,
solver, and post-processor of CEMTool 2D & 3D FEM packages. In
contrast to the existing MATLAB PDE Toolbox, our proposed FEM
packages can deal with the combination of the reserved words. Also,
we can control the mesh in a very effective way. With the introduction
of new mesh generation algorithm and fast solving technique, our
FEM packages can guarantee the shorter computational time than
MATLAB PDE Toolbox. Consequently, with our new FEM packages,
we can overcome some disadvantages or limitations of the existing
MATLAB PDE Toolbox.
Abstract: This study aims to identify processes, current
situations, and issues of recycling systems for four home appliances,
namely, air conditioners, television receivers, refrigerators, and
washing machines, among e-wastes in China and Japan for
understanding and comparison of their characteristics. In accordance
with results of a literature search, review of information disclosed
online, and questionnaire survey conducted, conclusions of the study
boil down to:
(1)The results show that in Japan most of the home appliances
mentioned above have been collected through home appliance
recycling tickets, resulting in an issue of “requiring some effort" in
treatment and recycling stages, and most plants have contracted out
their e-waste recycling.
(2)It is found out that advantages of the recycling system in Japan
include easiness to monitor concrete data and thorough
environmental friendliness ensured while its disadvantages include
illegal dumping and export. It becomes apparent that advantages of
the recycling system in China include a high reuse rate, low
treatment cost, and fewer illegal dumping while its disadvantages
include less safe reused products, environmental pollution caused by
e-waste treatment, illegal import, and difficulty in obtaining data.
Abstract: Environmental investments, including ecological
projects, relating to the protection of atmosphere are today a need.
However, investing in the environment should be based on rational
management rules. This comes across a problem of selecting a
method to assess substances reduced during projects. Therefore, a
method allowing for the assessment of decision rationality has to be
found.
The purpose of this article is to present and systematise pollution
reduction assessment methods and illustrate theoretical analyses with
empirical data.
Empirical results confirm theoretical considerations, which proved
that the only method for judging pollution reduction, free of apparent
disadvantages, is the Eco 99-ratio method. To make decisions on
environmental projects, financing institutions should take into
account a rationality rule. Therefore the Eco 99-ratio method could
be applied to make decisions relating to environmental investments in
the area of air protection.
Abstract: The advancement in wireless technology with the wide
use of mobile devices have drawn the attention of the research and
technological communities towards wireless environments, such as
Wireless Local Area Networks (WLANs), Wireless Wide Area
Networks (WWANs), and mobile systems and ad-hoc networks.
Unfortunately, wired and wireless networks are expressively different
in terms of link reliability, bandwidth, and time of propagation delay
and by adapting new solutions for these enhanced
telecommunications, superior quality, efficiency, and opportunities
will be provided where wireless communications were otherwise
unfeasible. Some researchers define 4G as a significant improvement
of 3G, where current cellular network’s issues will be solved and data
transfer will play a more significant role. For others, 4G unifies
cellular and wireless local area networks, and introduces new routing
techniques, efficient solutions for sharing dedicated frequency bands,
and an increased mobility and bandwidth capacity. This paper
discusses the possible solutions and enhancements probabilities that
proposed to improve the performance of Transmission Control
Protocol (TCP) over different wireless networks and also the paper
investigated each approach in term of advantages and disadvantages.
Abstract: Multivariate quality control charts show some advantages to monitor several variables in comparison with the simultaneous use of univariate charts, nevertheless, there are some disadvantages. The main problem is how to interpret the out-ofcontrol signal of a multivariate chart. For example, in the case of control charts designed to monitor the mean vector, the chart signals showing that it must be accepted that there is a shift in the vector, but no indication is given about the variables that have produced this shift. The MEWMA quality control chart is a very powerful scheme to detect small shifts in the mean vector. There are no previous specific works about the interpretation of the out-of-control signal of this chart. In this paper neural networks are designed to interpret the out-of-control signal of the MEWMA chart, and the percentage of correct classifications is studied for different cases.
Abstract: Current research on semantic web aims at making intelligent web pages meaningful for machines. In this way, ontology plays a primary role. We believe that logic can help ontology languages (such as OWL) to be more fluent and efficient. In this paper we try to combine logic with OWL to reduce some disadvantages of this language. Therefore we extend OWL by logic and also show how logic can satisfy our future expectations of an ontology language.
Abstract: Cloud Computing is a new technology that helps us to
use the Cloud for compliance our computation needs. Cloud refers to a scalable network of computers that work together like Internet. An
important element in Cloud Computing is that we shift processing, managing, storing and implementing our data from, locality into the
Cloud; So it helps us to improve the efficiency. Because of it is new
technology, it has both advantages and disadvantages that are
scrutinized in this article. Then some vanguards of this technology
are studied. Afterwards we find out that Cloud Computing will have
important roles in our tomorrow life!
Abstract: Fecal coliform bacteria are widely used as indicators of
sewage contamination in surface water. However, there are some
disadvantages in these microbial techniques including time consuming
(18-48h) and inability in discriminating between human and animal
fecal material sources. Therefore, it is necessary to seek a more
specific indicator of human sanitary waste. In this study, the feasibility
was investigated to apply caffeine and human pharmaceutical
compounds to identify the human-source contamination. The
correlation between caffeine and fecal coliform was also explored.
Surface water samples were collected from upstream, middle-stream
and downstream points respectively, along Rochor Canal, as well as 8
locations of Marina Bay. Results indicate that caffeine is a suitable
chemical tracer in Singapore because of its easy detection (in the range
of 0.30-2.0 ng/mL), compared with other chemicals monitored.
Relative low concentrations of human pharmaceutical compounds (<
0.07 ng/mL) in Rochor Canal and Marina Bay water samples make
them hard to be detected and difficult to be chemical tracer. However,
their existence can help to validate sewage contamination. In addition,
it was discovered the high correlation exists between caffeine
concentration and fecal coliform density in the Rochor Canal water
samples, demonstrating that caffeine is highly related to the
human-source contamination.
Abstract: Solutions are proposed for the central problem of estimating the reaction rate coefficients in homogeneous kinetics. The first is based upon the fact that the right hand side of a kinetic differential equation is linear in the rate constants, whereas the second one uses the technique of neural networks. This second one is discussed deeply and its advantages, disadvantages and conditions of applicability are analyzed in the mirror of the first one. Numerical analysis carried out on practical models using simulated data, and our programs written in Mathematica.
Abstract: This article is an extension and a practical application
approach of Wheeler-s NEBIC theory (Net Enabled Business
Innovation Cycle). NEBIC theory is a new approach in IS research
and can be used for dynamic environment related to new technology.
Firms can follow the market changes rapidly with support of the IT
resources. Flexible firms adapt their market strategies, and respond
more quickly to customers changing behaviors. When every leading
firm in an industry has access to the same IT resources, the way that
these IT resources are managed will determine the competitive
advantages or disadvantages of firm. From Dynamic Capabilities
Perspective and from newly introduced NEBIC theory by Wheeler,
we know that only IT resources cannot deliver customer value but
good configuration of those resources can guarantee customer value
by choosing the right emerging technology, grasping the right
economic opportunities through business innovation and growth. We
found evidences in literature that SOA (Service Oriented
Architecture) is a promising emerging technology which can deliver
the desired economic opportunity through modularity, flexibility and
loose-coupling. SOA can also help firms to connect in network which
can open a new window of opportunity to collaborate in innovation
and right kind of outsourcing. There are many articles and research
reports indicates that failure rate in outsourcing is very high but at the
same time research indicates that successful outsourcing projects
adds tangible and intangible benefits to the service consumer.
Business executives and policy makers in the west should not afraid
of outsourcing but they should choose the right strategy through the
use of emerging technology to significantly reduce the failure rate in
outsourcing.