Abstract: This paper presents a new approach for the protection
of Thyristor-Controlled Series Compensator (TCSC) line using
Support Vector Machine (SVM). One SVM is trained for fault
classification and another for section identification. This method use
three phase current measurement that results in better speed and
accuracy than other SVM based methods which used single phase
current measurement. This makes it suitable for real-time protection.
The method was tested on 10,000 data instances with a very wide
variation in system conditions such as compensation level, source
impedance, location of fault, fault inception angle, load angle at
source bus and fault resistance. The proposed method requires only
local current measurement.
Abstract: For the past thirty years the Malaysian economy has been said to contribute well to the progress of the nations. However, the intensification of global economy activity and the extensive use of Information Communication Technologies (ICTs) in recent years are challenging government-s effort to further develop Malaysian society. The competition posed by the low wage economies such as China and Vietnam have made the government realise the importance of engaging in high-skill and high technology industries. It is hoped this will be the basis of attracting more foreign direct investment (FDI) in order to help the country to compete in globalised world. Using Vision 2020 as it targeted vision, the government has decided to engage in the use of ICTs and introduce many policies pertaining to it. Mainly based on the secondary analysis approach, the findings show that policy pertaining to ICTs in Malaysia contributes to economic growth, but the consequences of this have resulted in greater division within society. Although some of the divisions such as gender and ethnicity are narrowing down, the gap in important areas such as regions and class differences is becoming wider. The widespread use of ICTs might contribute to the further establishment of democracy in Malaysia, but the increasing number of foreign entities such as FDI and foreign workers, cultural hybridisation and to some extent cultural domination are contributing to neocolonialism in Malaysia. This has obvious consequences for the government-s effort to create a Malaysian national identity. An important finding of this work is that there are contradictions within ICT policy between the effort to develop the economy and society.
Abstract: Ethanol has become more attractive in fuel industry
either as fuel itself or an additive that helps enhancing the octane
number and combustibility of gasoline. This research studied a
pressure swing adsorption using cassava-based adsorbent prepared
from mixture of cassava starch and cassava pulp for dehydration of
ethanol vapor. The apparatus used in the experiments consisted of
double adsorption columns, an evaporator, and a vacuum pump. The
feed solution contained 90-92 %wt of ethanol. Three process
variables: adsorption temperatures (110, 120 and 130°C), adsorption
pressures (1 and 2 bar gauge) and feed vapor flow rate (25, 50 and 75
% valve opening of the evaporator) were investigated. According to
the experimental results, the optimal operating condition for this
system was found to be at 2 bar gauge for adsorption pressure, 120°C
for adsorption temperature and 25% valve opening of the evaporator.
Production of 1.48 grams of ethanol with concentration higher than
99.5 wt% per gram of adsorbent was obtained. PSA with cassavabased
adsorbent reported in this study could be an alternative method
for production of nearly anhydrous ethanol. Dehydration of ethanol
vapor achieved in this study is due to an interaction between free
hydroxyl group on the glucose units of the starch and the water
molecules.
Abstract: We consider herein a concise view of discreet
programming models and methods. There has been conducted the
models and methods analysis. On the basis of discreet programming
models there has been elaborated and offered a new class of
problems, i.e. block-symmetry models and methods of applied tasks
statements and solutions.
Abstract: Ontology-based modelling of multi-formatted
software application content is a challenging area in content
management. When the number of software content unit is huge and
in continuous process of change, content change management is
important. The management of content in this context requires
targeted access and manipulation methods. We present a novel
approach to deal with model-driven content-centric information
systems and access to their content. At the core of our approach is an
ontology-based semantic annotation technique for diversely
formatted content that can improve the accuracy of access and
systems evolution. Domain ontologies represent domain-specific
concepts and conform to metamodels. Different ontologies - from
application domain ontologies to software ontologies - capture and
model the different properties and perspectives on a software content
unit. Interdependencies between domain ontologies, the artifacts and
the content are captured through a trace model. The annotation traces
are formalised and a graph-based system is selected for the
representation of the annotation traces.
Abstract: It is the living conditions in the cities that determine the future of our livelihood. “To change life, we must first change space"- Henri Lefebvre. Sustainable development is a utopian aspiration for South African cities (especially the case study of the Gauteng City Region), which are currently characterized by unplanned growth and increasing urban sprawl. While the reasons for poor environmental quality and living conditions are undoubtedly diverse and complex, having political, economical and social dimensions, it is argued that the prevailing approach to layout planning in South Africa is part of the problem. This article seeks a solution to the problem of sustainability, from a spatial planning perspective. The spatial planning tool, the urban development boundary, is introduced as the concept that will ensure empty talk being translated into a sustainable vision. The urban development boundary is a spatial planning tool that can be used and implemented to direct urban growth towards a more sustainable form. The urban development boundary aims to ensure planned urban areas, in contrast to the current unplanned areas characterized by urban sprawl and insufficient infrastructure. However, the success of the urban development boundary concept is subject to effective implementation measures, as well as adequate and efficient management. The concept of sustainable development can function as a driving force underlying societal change and transformation, but the interface between spatial planning and environmental management needs to be established (as this is the core aspects underlying sustainable development), and authorities needs to understand and implement this interface consecutively. This interface can, however, realize in terms of the objectives of the planning tool – the urban development boundary. The case study, the Gauteng City Region, is depicted as a site of economic growth and innovation, but there is a lack of good urban and regional governance, impacting on the design (layout) and function of urban areas and land use, as current authorities make uninformed decisions in terms of development applications, leading to unsustainable urban forms and unsustainable nodes. Place and space concepts are thus critical matters applicable to planning of the Gauteng City Region. The urban development boundary are thus explored as a planning tool to guide decision-making, and create a sustainable urban form, leading to better environmental and living conditions, and continuous sustainability.
Abstract: This paper quantifies the impact of providing a shortterm
excess active power support of a variable speed wind turbine
(VSWT) and effect of super magnetic energy storage (SMES) unit on
frequency control, particularly temporary minimum frequency (TMF)
term. To demonstrate the effect of these factors on the power system
frequency, a three-area power system is considered as a test system.
Abstract: Regression testing is a maintenance activity applied to
modified software to provide confidence that the changed parts are
correct and that the unchanged parts have not been adversely affected
by the modifications. Regression test selection techniques reduce the
cost of regression testing, by selecting a subset of an existing test
suite to use in retesting modified programs. This paper presents the
first general regression-test-selection technique, which based on code
and allows selecting test cases for any programs written in any
programming language. Then it handles incomplete program. We
also describe RTSDiff, a regression-test-selection system that
implements the proposed technique. The results of the empirical
studied that performed in four programming languages java, C#, Cµ
and Visual basic show that the efficiency and effective in reducing
the size of test suit.
Abstract: The introduction of mass-customization has enabled
new ways to treat patients within medicine. However, the
introduction of industrialized treatments has also meant new
obstacles. The purpose of this study was to introduce and
theoretically test a method for improving dental crown fit. The
optimization method allocates support points in order to check the
final variation for dental crowns. Three different types of geometries
were tested and compared. The three geometries were also divided
into three sub-geometries: Current method, Optimized method and
Feasible method. The Optimized method, using the whole surface for
support points, provided the best results. The results support the
objective of the study. It also seems that the support optimization
method can dramatically improve the robustness of dental crown
treatments.
Abstract: This paper attempts to explore a new method to
improve the teaching of algorithmic for beginners. It is well known
that algorithmic is a difficult field to teach for teacher and complex to
assimilate for learner. These difficulties are due to intrinsic
characteristics of this field and to the manner that teachers (the
majority) apprehend its bases. However, in a Technology Enhanced
Learning environment (TEL), assessment, which is important and
indispensable, is the most delicate phase to implement, for all
problems that generate (noise...). Our objective registers in the
confluence of these two axes. For this purpose, EASEL focused
essentially to elaborate an assessment approach of algorithmic
competences in a TEL environment. This approach consists in
modeling an algorithmic solution according to basic and elementary
operations which let learner draw his/her own step with all autonomy
and independently to any programming language. This approach
assures a trilateral assessment: summative, formative and diagnostic
assessment.
Abstract: Assessment for image quality traditionally needs its
original image as a reference. The conventional method for assessment
like Mean Square Error (MSE) or Peak Signal to Noise Ratio (PSNR)
is invalid when there is no reference. In this paper, we present a new
No-Reference (NR) assessment of image quality using blur and noise.
The recent camera applications provide high quality images by help of
digital Image Signal Processor (ISP). Since the images taken by the
high performance of digital camera have few blocking and ringing
artifacts, we only focus on the blur and noise for predicting the
objective image quality. The experimental results show that the
proposed assessment method gives high correlation with subjective
Difference Mean Opinion Score (DMOS). Furthermore, the proposed
method provides very low computational load in spatial domain and
similar extraction of characteristics to human perceptional assessment.
Abstract: In the traditional buckling analysis of rectangular
plates the classical thin plate theory is generally applied, so
neglecting the plating shear deformation. It seems quite clear that this
method is not totally appropriate for the analysis of thick plates, so
that in the following the two variable refined plate theory proposed
by Shimpi (2006), that permits to take into account the transverse
shear effects, is applied for the buckling analysis of simply supported
isotropic rectangular plates, compressed in one and two orthogonal
directions.
The relevant results are compared with the classical ones and, for
rectangular plates under uniaxial compression, a new direct
expression, similar to the classical Bryan-s formula, is proposed for
the Euler buckling stress.
As the buckling analysis is a widely diffused topic for a variety of
structures, such as ship ones, some applications for plates uniformly
compressed in one and two orthogonal directions are presented and
the relevant theoretical results are compared with those ones obtained
by a FEM analysis, carried out by ANSYS, to show the feasibility of
the presented method.
Abstract: Supplier appraisal fosters energy in Supply Chain
Management and helps in best optimization of viable business
partners for a company. Many Decision Making techniques have
already been proposed by researchers for supplier-s appraisal.
However, Analytic Hierarchy Process (AHP) is assumed to be the
most structured technique to attain near-best solution of the problem.
This paper focuses at implementation of AHP in the procurement
processes. It also suggests that on what factors a Public Sector
Enterprises must focus while dealing with their suppliers and what
should the suppliers do to synchronize their activities with the
strategic objectives of Organization. It also highlights the weak areas
in supplier appraisal process with a view to suggest viable
recommendations.
Abstract: Image watermarking has become an important tool for
intellectual property protection and authentication. In this paper a
watermarking technique is suggested that incorporates two
watermarks in a host image for improved protection and robustness.
A watermark, in form of a PN sequence (will be called the secondary
watermark), is embedded in the wavelet domain of a primary
watermark before being embedded in the host image. The technique
has been tested using Lena image as a host and the camera man as
the primary watermark. The embedded PN sequence was detectable
through correlation among other five sequences where a PSNR of
44.1065 dB was measured. Furthermore, to test the robustness of the
technique, the watermarked image was exposed to four types of
attacks, namely compression, low pass filtering, salt and pepper noise
and luminance change. In all cases the secondary watermark was
easy to detect even when the primary one is severely distorted.
Abstract: This paper compares the recent transformerless ACDC
power converter architectures and provides an assessment of
each. A prototype of one of the transformerless AC-DC converter
architecture is also presented depicting the feasibility of a small form
factor, power supply design. In this paper component selection
guidelines to achieve high efficiency AC-DC power conversion are
also discussed.
Abstract: This research focuses on micro-enterprise of
Malaysian Malays that are involved in very small-scaled business
activities. Among them include food stall and burger stall operators,
night market hawkers, grocery store operators as well as construction
and small service activities works. The study seeks to explore why
some micro-entrepreneurs still lag in entrepreneurship and what
needs to be rectified. This quantitative study is conducted on 173
Malay micro-enterprise owners (MEOs) and 58 Malay failed microenterprise
owners (FMEOs) involved in all range of businesses
throughout the state of Perak, Malaysia. The main aims are to
identify the gaps between the failed micro-enterprise owners
(FMEOs) and existing micro-enterprise owners (MEOs) and the
problems faced among FMEOs. The results reveal that the MEOs had
strong motivations and better marketing approaches as compared to
FMEOs. Furthermore, the FMEOs failed in the business ventures
mainly due to lack of management, sales and marketing skills and
poor competitive abilities to keep up with rivals.
Abstract: In multi hop wireless systems, such as ad hoc and
sensor networks, mobile ad hoc network applications are deployed,
security emerges as a central requirement. A particularly devastating
attack is known as the wormhole attack, where two or more malicious
colluding nodes create a higher level virtual tunnel in the network,
which is employed to transport packets between the tunnel end points.
These tunnels emulate shorter links in the network. In which
adversary records transmitted packets at one location in the network,
tunnels them to another location, and retransmits them into the
network. The wormhole attack is possible even if the attacker has not
compromised any hosts and even if all communication provides
authenticity and confidentiality. In this paper, we analyze wormhole
attack nature in ad hoc and sensor networks and existing methods of
the defending mechanism to detect wormhole attacks without require
any specialized hardware. This analysis able to provide in
establishing a method to reduce the rate of refresh time and the
response time to become more faster.
Abstract: With the demand of mobility by users, wireless
technologies have become the hotspot developing arena. Internet
Engineering Task Force (IETF) working group has developed Mobile
IP to support node mobility. The concept of node mobility indicates
that in spite of the movement of the node, it is still connected to the
internet and all the data transactions are preserved. It provides
location-independent access to Internet. After the incorporation of
host mobility, network mobility has undergone intense research.
There are several intricacies faced in the real world implementation
of network mobility significantly the problem of nested networks and
their consequences. This article is concerned regarding a problem of
nested network called pinball route problem and proposes a solution
to eliminate the above problem. The proposed mechanism is
implemented using NS2 simulation tool and it is found that the
proposed mechanism efficiently reduces the overload caused by the
pinball route problem.
Abstract: This paper describes a novel method for automatic
estimation of the contours of weld defect in radiography images.
Generally, the contour detection is the first operation which we apply
in the visual recognition system. Our approach can be described as a
region based maximum likelihood formulation of parametric
deformable contours. This formulation provides robustness against
the poor image quality, and allows simultaneous estimation of the
contour parameters together with other parameters of the model.
Implementation is performed by a deterministic iterative algorithm
with minimal user intervention. Results testify for the very good
performance of the approach especially in synthetic weld defect
images.
Abstract: Staphylococcus aureus, one of the microflora in a
human external auditory canal (EAC) is frequently exposed to highfrequency
electromagnetic field (HF-EMF) generated by mobile
phones. It is normally non-pathogenic but in certain circumstances, it
can cause infections. This study investigates the changes in the
physiology of S. aureus when exposed to HF-EMF of a mobile
phone. Exponentially grown S. aureus were exposed to two
conditions of EMF irradiation (standby-mode and on-call mode) at
four durations; 15, 30, 45 and 60 min. Changes in the viability and
biofilm production of the S. aureus were compared between the two
conditions of exposure. EMF from the standby-mode has enhanced
the growth of S. aureus but during on-call, the growth was
suppressed. No significant difference in the amount of biofilm
produced in both modes of exposure was observed. Thus, HF-EMF
of mobile phone affects the viability of S. aureus but not its ability to
produce biofilm.