Abstract: Partial discharge (PD) detection is an important
method to evaluate the insulation condition of metal-clad apparatus.
Non-intrusive sensors which are easy to install and have no
interruptions on operation are preferred in onsite PD detection.
However, it often lacks of accuracy due to the interferences in PD
signals. In this paper a novel PD extraction method that uses frequency
analysis and entropy based time-frequency (TF) analysis is introduced.
The repetitive pulses from convertor are first removed via frequency
analysis. Then, the relative entropy and relative peak-frequency of
each pulse (i.e. time-indexed vector TF spectrum) are calculated and
all pulses with similar parameters are grouped. According to the
characteristics of non-intrusive sensor and the frequency distribution
of PDs, the pulses of PD and interferences are separated. Finally the
PD signal and interferences are recovered via inverse TF transform.
The de-noised result of noisy PD data demonstrates that the
combination of frequency and time-frequency techniques can
discriminate PDs from interferences with various frequency
distributions.
Abstract: When cars are released from the factory, strut noises are very small and therefore it is difficult to perceive them. As the use time and travel distance increase, however, strut noises get larger so as to cause users much uneasiness. The noises generated at the field include engine noises and flow noises and therefore it is difficult to clearly discern the noises generated from struts. This study developed a test method which can reproduce field strut noises in the lab. Using the newly developed noise evaluation test, this study analyzed the effects that insulator performance degradation and failure can have on car noises. The study also confirmed that the insulator durability test by the simple back-and-forth motion cannot completely reflect the state of the parts failure in the field. Based on this, the study also confirmed that field noises can be reproduced through a durability test that considers heat aging.
Abstract: As the Internet continues to grow at a rapid pace as
the primary medium for communications and commerce and as
telecommunication networks and systems continue to expand their
global reach, digital information has become the most popular and
important information resource and our dependence upon the
underlying cyber infrastructure has been increasing significantly.
Unfortunately, as our dependency has grown, so has the threat to the
cyber infrastructure from spammers, attackers and criminal
enterprises. In this paper, we propose a new machine learning based
network intrusion detection framework for cyber security. The
detection process of the framework consists of two stages: model
construction and intrusion detection. In the model construction stage,
a semi-supervised machine learning algorithm is applied to a
collected set of network audit data to generate a profile of normal
network behavior and in the intrusion detection stage, input network
events are analyzed and compared with the patterns gathered in the
profile, and some of them are then flagged as anomalies should these
events are sufficiently far from the expected normal behavior. The
proposed framework is particularly applicable to the situations where
there is only a small amount of labeled network training data
available, which is very typical in real world network environments.
Abstract: In digital signal processing it is important to
approximate multi-dimensional data by the method called rank
reduction, in which we reduce the rank of multi-dimensional data from
higher to lower. For 2-dimennsional data, singular value
decomposition (SVD) is one of the most known rank reduction
techniques. Additional, outer product expansion expanded from SVD
was proposed and implemented for multi-dimensional data, which has
been widely applied to image processing and pattern recognition.
However, the multi-dimensional outer product expansion has behavior
of great computation complex and has not orthogonally between the
expansion terms. Therefore we have proposed an alterative method,
Third-order Orthogonal Tensor Product Expansion short for 3-OTPE.
3-OTPE uses the power method instead of nonlinear optimization
method for decreasing at computing time. At the same time the group
of B. D. Lathauwer proposed Higher-Order SVD (HOSVD) that is
also developed with SVD extensions for multi-dimensional data.
3-OTPE and HOSVD are similarly on the rank reduction of
multi-dimensional data. Using these two methods we can obtain
computation results respectively, some ones are the same while some
ones are slight different. In this paper, we compare 3-OTPE to
HOSVD in accuracy of calculation and computing time of resolution,
and clarify the difference between these two methods.
Abstract: We demonstrate single-photon interference over 10 km using a plug and play system for quantum key distribution. The quality of the interferometer is measured by using the interferometer
visibility. The coding of the signal is based on the phase coding and the value of visibility is based on the interference effect, which result a number of count. The setup gives full control of polarization inside
the interferometer. The quality measurement of the interferometer is based on number of count per second and the system produces 94 % visibility in one of the detectors.
Abstract: The third phase of web means semantic web requires many web pages which are annotated with metadata. Thus, a crucial question is where to acquire these metadata. In this paper we propose our approach, a semi-automatic method to annotate the texts of documents and web pages and employs with a quite comprehensive knowledge base to categorize instances with regard to ontology. The approach is evaluated against the manual annotations and one of the most popular annotation tools which works the same as our tool. The approach is implemented in .net framework and uses the WordNet for knowledge base, an annotation tool for the Semantic Web.
Abstract: The creation of a sustainable future depends on the knowledge and involvement of the people, as well as an understanding of the consequences of individual actions. Construction industry has long been associated with the detrimental effects to our mother earth. In Malaysia, the government, professional bodies and private companies are beginning to take heed in the necessity to reduce this environmental problem without restraining the need for development. This paper focuses on the actions undertaken by the Malaysian government, non-government organizations and construction players in promoting sustainability in construction. To ensure that those concerted efforts are not only skin deep in its impact, a survey was conducted to investigate the awareness of the developers regarding this issue and whether those developers has absorb the concept of sustainable construction in their current practices. The survey revealed that although the developers are aware of the rising issues on sustainability, little efforts are generated from them in implementing it. More effort is necessary to boost this application and further stimulate actions and strategies towards a sustainable built environment.
Abstract: XML has become a popular standard for information exchange via web. Each XML document can be presented as a rooted, ordered, labeled tree. The Node label shows the exact position of a node in the original document. Region and Dewey encoding are two famous methods of labeling trees. In this paper, we propose a new insert friendly labeling method named IFDewey based on recently proposed scheme, called Extended Dewey. In Extended Dewey many labels must be modified when a new node is inserted into the XML tree. Our method eliminates this problem by reserving even numbers for future insertion. Numbers generated by Extended Dewey may be even or odd. IFDewey modifies Extended Dewey so that only odd numbers are generated and even numbers can then be used for a much easier insertion of nodes.
Abstract: We present a simplified equalization technique for a
π/4 differential quadrature phase shift keying ( π/4 -DQPSK) modulated
signal in a multipath fading environment. The proposed equalizer is
realized as a fractionally spaced adaptive decision feedback equalizer
(FS-ADFE), employing exponential step-size least mean square
(LMS) algorithm as the adaptation technique. The main advantage of
the scheme stems from the usage of exponential step-size LMS algorithm
in the equalizer, which achieves similar convergence behavior
as that of a recursive least squares (RLS) algorithm with significantly
reduced computational complexity. To investigate the finite-precision
performance of the proposed equalizer along with the π/4 -DQPSK
modem, the entire system is evaluated on a 16-bit fixed point digital
signal processor (DSP) environment. The proposed scheme is found
to be attractive even for those cases where equalization is to be
performed within a restricted number of training samples.
Abstract: The use of machine vision to inspect the outcome of
surgical tasks is investigated, with the aim of incorporating this
approach in robotic surgery systems. Machine vision is a non-contact
form of inspection i.e. no part of the vision system is in direct contact
with the patient, and is therefore well suited for surgery where
sterility is an important consideration,. As a proof-of-concept, three
primary surgical tasks for a common neurosurgical procedure were
inspected using machine vision. Experiments were performed on
cadaveric pig heads to simulate the two possible outcomes i.e.
satisfactory or unsatisfactory, for tasks involved in making a burr
hole, namely incision, retraction, and drilling. We identify low level
image features to distinguish the two outcomes, as well as report on
results that validate our proposed approach. The potential of using
machine vision in a surgical environment, and the challenges that
must be addressed, are identified and discussed.
Abstract: This work presents the highly accurate numerical calculation
of the natural frequencies for functionally graded beams with
simply supported boundary conditions. The Timoshenko first order
shear deformation beam theory and the higher order shear deformation
beam theory of Reddy have been applied to the functionally
graded beams analysis. The material property gradient is assumed
to be in the thickness direction. The Hamilton-s principle is utilized
to obtain the dynamic equations of functionally graded beams. The
influences of the volume fraction index and thickness-to-length ratio
on the fundamental frequencies are discussed. Comparison of the
numerical results for the homogeneous beam with Euler-Bernoulli
beam theory results show that the derived model is satisfactory.
Abstract: In this paper, investigation of subsynchronous
resonance (SSR) characteristics of a hybrid series compensated
system and the design of voltage controller for three level 24-pulse
Voltage Source Converter based Static Synchronous Series
Compensator (SSSC) is presented. Hybrid compensation consists of
series fixed capacitor and SSSC which is a active series FACTS
controller. The design of voltage controller for SSSC is based on
damping torque analysis, and Genetic Algorithm (GA) is adopted for
tuning the controller parameters. The SSR Characteristics of SSSC
with constant reactive voltage control modes has been investigated.
The results show that the constant reactive voltage control of SSSC
has the effect of reducing the electrical resonance frequency, which
detunes the SSR.The analysis of SSR with SSSC is carried out based
on frequency domain method, eigenvalue analysis and transient
simulation. While the eigenvalue and damping torque analysis are
based on D-Q model of SSSC, the transient simulation considers both
D-Q and detailed three phase nonlinear system model using
switching functions.
Abstract: In this paper presented initial design of Low Speed
Axial Flux Permanent Magnet (AFPM) Machine with Non-Slotted
TORUS topology type by use of certain algorithm (Appendix).
Validation of design algorithm studied by means of selected data of
an initial prototype machine. Analytically design calculation carried
out by means of design algorithm and obtained results compared with
results of Finite Element Method (FEM).
Abstract: Soccer simulation is an effort to motivate researchers and practitioners to do artificial and robotic intelligence research; and at the same time put into practice and test the results. Many researchers and practitioners throughout the world are continuously working to polish their ideas and improve their implemented systems. At the same time, new groups are forming and they bring bright new thoughts to the field. The research includes designing and executing robotic soccer simulation algorithms. In our research, a soccer simulation player is considered to be an intelligent agent that is capable of receiving information from the environment, analyze it and to choose the best action from a set of possible ones, for its next move. We concentrate on developing a two-phase method for the soccer player agent to choose its best next move. The method is then implemented into our software system called Nexus simulation team of Ferdowsi University. This system is based on TsinghuAeolus[1] team that was the champion of the world RoboCup soccer simulation contest in 2001 and 2002.
Abstract: An ethnobotanical study was conducted to document
local knowledge and potentials of wild edible tubers that has been
reported and sighted and to investigate and record their distribution in
Pulau Redang and nearby islands of Terengganu, Malaysia.
Information was gathered from 42 villagers by using semi-structured
questionnaire. These respondents were selected randomly and no
appointment was made prior to the visits. For distribution, the
locations of wild edible tubers were recorded by using the Global
Positioning System (GPS). The wild edible tubers recorded were ubi
gadung, ubi toyo, ubi kasu, ubi jaga, ubi seratus and ubi kertas.
Dioscorea or commonly known as yam is reported to be one of the
major food sources worldwide. The majority of villagers used
Dioscorea hispida Dennst. or ubi gadung in many ways in their life
such as for food, medicinal purposes and fish poison. The villagers
have identified this ubi gadung by looking at the morphological
characteristics; that include leaf shape, stem and the color of the
tuber-s flesh.
Abstract: Business process management (BPM) has become
widely accepted within business community as a means for
improving business performance. However, it is of the highest
importance to incorporate BPM as part of the curriculum at the
university level education in order to achieve the appropriate
acceptance of the method. Goal of the paper is to determine the
current state of education in business process management (BPM) at
the Croatian universities and abroad. It investigates the applied forms
of instruction and teaching methods and gives several proposals for
BPM courses improvement. Since majority of undergraduate and
postgraduate students have limited understanding of business
processes and lack of any practical experience, there is a need for
introducing new teaching approaches. Therefore, we offer some
suggestions for further improvement, among which the introduction
of simulation games environment in BPM education is strongly
recommended.
Abstract: Liquidity risk management ranks to key concepts
applied in finance. Liquidity is defined as a capacity to obtain
funding when needed, while liquidity risk means as a threat to this
capacity to generate cash at fair costs. In the paper we present
challenges of liquidity risk management resulting from the 2007-
2009 global financial upheaval. We see five main regulatory
liquidity risk management issues requiring revision in coming
years: liquidity measurement, intra-day and intra-group liquidity
management, contingency planning and liquidity buffers, liquidity
systems, controls and governance, and finally models testing the
viability of business liquidity models.
Abstract: Advent enhancements in the field of computing have
increased massive use of web based electronic documents. Current
Copyright protection laws are inadequate to prove the ownership for
electronic documents and do not provide strong features against
copying and manipulating information from the web. This has
opened many channels for securing information and significant
evolutions have been made in the area of information security.
Digital Watermarking has developed into a very dynamic area of
research and has addressed challenging issues for digital content.
Watermarking can be visible (logos or signatures) and invisible
(encoding and decoding). Many visible watermarking techniques
have been studied for text documents but there are very few for web
based text. XML files are used to trade information on the internet
and contain important information. In this paper, two invisible
watermarking techniques using Synonyms and Acronyms are
proposed for XML files to prove the intellectual ownership and to
achieve the security. Analysis is made for different attacks and
amount of capacity to be embedded in the XML file is also noticed.
A comparative analysis for capacity is also made for both methods.
The system has been implemented using C# language and all tests are
made practically to get the results.
Abstract: Prestressing in structure increases ratio of load-bearing capacity to weight. Suspendomes are single-layer braced domes reinforced with cable and strut. Prestressing of cables alter value and distribution of stress in structure. In this study two configuration, diamatic and lamella domes is selected. Investigated domes have span of 100m with rise-to-span ratios of 0.1, 0.2, and 0.3. Single layer domes loaded under service load combinations according to ISO code. After geometric nonlinear analysis, models are designed with tubular and I-shaped sections then reinforced with cable and strut and converted to suspendomes. Displacements and stresses of some groups of nodes and elements in all of single-layer domes and suspendomes for three load combinations, symmetric snow, asymmetric snow and wind are compared. Variation due to suspending system is investigated. Suspendomes are redesigned and minimum possible weight after addition of cable and strut is obtained.
Abstract: In the management of industrial waste, conversion from the use of paper invoices to electronic forms is currently under way in developed countries. Difficulties in such computerization include the lack of synchronization between the actual goods and the corresponding data managed by the server. Consequently, a system which utilizes the incorporation of a QR code in connection with the waste material has been developed. The code is read at each stage, from discharge until disposal, and progress at each stage can be easily reported. This system can be linked with Japanese public digital authentication service of waste, taking advantage of its good points, and can be used to submit reports to the regulatory authorities. Its usefulness was confirmed by a verification test, and put into actual practice.