Abstract: This paper discusses aspects of outages in the electric transmission network in the Kosovo Power System caused by the atmospheric discharges.
Frequency and location of the atmospheric discharges in Kosovo territory will be provided by a lightning location system ALARM (Automated Lightning Alert and Risk Management) and from the data from the Meteorological Department in Prishtina International Airport. These data will be used to make comparisons with the actual outages registered in the Kosovo Power System from the Kosovo Transmission, systems and market operator (KOSTT) during a specific time period.
The lines with the worst performance determined, regarding the atmospheric discharges, will be choose for further discussions in terms of over voltages caused by the direct or indirect lightning strokes.
Recommendations for protection in terms of insulator coordination and surge arresters will be given at the end and in this stage dynamic simulation will take part.
Abstract: In this paper various techniques in relation to large-scale systems are presented. At first, explanation of large-scale systems and differences from traditional systems are given. Next, possible specifications and requirements on hardware and software are listed. Finally, examples of large-scale systems are presented.
Abstract: Building a service-centric business model requires
new knowledge and capabilities in companies. This paper enlightens
the challenges small and medium sized firms (SMEs) face when
developing their service-centric business models. This paper
examines the premise for knowledge transfer and capability
development required. The objective of this paper is to increase
knowledge about SME-s transformation to service-centric business
models.This paper reports an action research based case study. The
paper provides empirical evidence from three case companies. The
empirical data was collected through multiple methods. The findings
of the paper are: First, the developed model to analyze the current
state in companies. Second, the process of building the service –
centric business models. Third, the selection of suitable service
development methods. The lack of a holistic understanding on
service logic suggests that SMEs need practical and easy to use
methods to improve their business
Abstract: Air pollution is still considered as one of the major
environmental and health issues. There is enough research evidence
to show a strong relationship between exposure to air contaminants
and respiratory illnesses among children and adults. In this paper we
used the Copula approach to study a potential relationship between
selected air pollutants (PM10 and NO2) and hospital admissions for
respiratory diseases. Kendall-s tau and Spearman-s rho rank
correlation coefficients are calculated and used in Copula method.
This paper demonstrates that copulas can be used to provide
additional information as a measure of an association when compared
to the standard correlation coefficients. The results find a significant
correlation between the selected air pollutants and hospital
admissions for most of the selected respiratory illnesses.
Abstract: Since Software testing becomes an important part of
Software development in order to improve the quality of software,
many automation tools are created to help testing functionality of
software. There are a few issues about usability of these tools, one is
that the result log which is generated from tools contains useless
information that the tester cannot use result log to communicate
efficiently, or the result log needs to use a specific application to open.
This paper introduces a new method, SBTAR that improves usability
of automated test tools in a part of a result log. The practice will use
the capability of tools named as IBM Rational Robot to create a
customized function, the function would generate new format of a
result log which contains useful information faster and easier to
understand than using the original result log which was generated
from the tools. This result log also increases flexibility by Microsoft
Word or WordPad to make them readable.
Abstract: Climate change causes severe effects on natural
habitats, especially wetlands. These challenges require the adaptation
of their management to probable effects of climate change. A
compilation of necessary changes in land management was collected
in a Hungarian area being both national park and Natura 2000 SAC
and SCI site in favor of increasing the resilience and reducing
vulnerability. Several factors, such as ecological aspects, nature
conservation and climatic adaptation should be combined with social
and economic factors during the process of developing climate
change adapted management on vulnerable wetlands. Planning
adaptive management should be determined by a priority order of
conservation aims and evaluation of factors at the determined
planning unit. Mowing techniques, frequency and exact date should
be observed as well as grazing species and their breed, due to
different grazing, group forming and trampling habits. Integrating
landscape history and historical land development into the planning
process is essential.
Abstract: The growth of open networks created the interest to
commercialise it. The establishment of an electronic business
mechanism must be accompanied by a digital – electronic payment
system to transfer the value of transactions. Financial organizations
are requested to offer a secure e-payment synthesis with equivalent
level of security served in conventional paper-based payment
transactions. PKI, which is functioning as a chain of trust in security
architecture, can enable security services of cryptography to epayments,
in order to take advantage of the wider base either of
customer or of trading partners and the reduction of cost transaction
achieved by the use of Internet channels. The paper addresses the
possibilities and the implementation suggestions of PKI in relevance
to electronic payments by suggesting a framework that should be
followed.
Abstract: Estimates of temperature values at a specific time of day, from daytime and daily profiles, are needed for a number of environmental, ecological, agricultural and technical applications, ranging from natural hazards assessments, crop growth forecasting to design of solar energy systems. The scope of this research is to investigate the efficiency of data mining techniques in estimating minimum, maximum and mean temperature values. For this reason, a number of experiments have been conducted with well-known regression algorithms using temperature data from the city of Patras in Greece. The performance of these algorithms has been evaluated using standard statistical indicators, such as Correlation Coefficient, Root Mean Squared Error, etc.
Abstract: The growth of open networks created the interest to commercialise it. The establishment of an electronic business mechanism must be accompanied by a digital-electronic payment system to transfer the value of transactions. Financial organizations are requested to offer a secure e-payment synthesis with equivalent levels of trust and security served in conventional paper-based payment transactions. The paper addresses the challenge of the first trade problem in e-commerce, provides a brief literature review on electronic payment and attempts to explain the underlying concept and method of trust in relevance to electronic payment.
Abstract: In this paper, the application of the Mode Matching
(MM) method in the case of photonic crystal waveguide
discontinuities is presented. The structure under consideration is
divided into a number of cells, which supports a number of guided
and evanescent modes. These modes can be calculated numerically
by an alternative formulation of the plane wave expansion method
for each frequency. A matrix equation is then formed relating the
modal amplitudes at the beginning and at the end of the structure.
The theory is highly efficient and accurate and can be applied to
study the transmission sensitivity of photonic crystal devices due to
fabrication tolerances. The accuracy of the MM method is compared
to the Finite Difference Frequency Domain (FDFD) and the Adjoint
Variable Method (AVM) and good agreement is observed.
Abstract: Social Business Process Management (SBPM)
promises to overcome limitations of traditional BPM by allowing
flexible process design and enactment through the involvement of
users from a social community. This paper proposes a meta-model
and architecture for socially driven business process management
systems. It discusses the main facets of the architecture such as goalbased
role assignment that combines social recommendations with
user profile, and process recommendation, through a real example of
a charity organization.
Abstract: In this study, the problem of discriminating between interictal epileptic and non- epileptic pathological EEG cases, which present episodic loss of consciousness, investigated. We verify the accuracy of the feature extraction method of autocross-correlated coefficients which extracted and studied in previous study. For this purpose we used in one hand a suitable constructed artificial supervised LVQ1 neural network and in other a cross-correlation technique. To enforce the above verification we used a statistical procedure which based on a chi- square control. The classification and the statistical results showed that the proposed feature extraction is a significant accurate method for diagnostic discrimination cases between interictal and non-interictal EEG events and specifically the classification procedure showed that the LVQ neural method is superior than the cross-correlation one.
Abstract: Electric impedance imaging is a method of
reconstructing spatial distribution of electrical conductivity inside a
subject. In this paper, a new method of electrical impedance imaging
using eddy current is proposed. The eddy current distribution in the
body depends on the conductivity distribution and the magnetic field
pattern. By changing the position of magnetic core, a set of voltage
differences is measured with a pair of electrodes. This set of voltage
differences is used in image reconstruction of conductivity
distribution. The least square error minimization method is used as a
reconstruction algorithm. The back projection algorithm is used to
get two dimensional images. Based on this principle, a measurement
system is developed and some model experiments were performed
with a saline filled phantom. The shape of each model in the
reconstructed image is similar to the corresponding model,
respectively. From the results of these experiments, it is confirmed
that the proposed method is applicable in the realization of electrical
imaging.
Abstract: Today, money laundering (ML) poses a serious threat
not only to financial institutions but also to the nation. This criminal
activity is becoming more and more sophisticated and seems to have
moved from the cliché of drug trafficking to financing terrorism and
surely not forgetting personal gain. Most international financial
institutions have been implementing anti-money laundering solutions
(AML) to fight investment fraud. However, traditional investigative
techniques consume numerous man-hours. Recently, data mining
approaches have been developed and are considered as well-suited
techniques for detecting ML activities. Within the scope of a
collaboration project for the purpose of developing a new solution for
the AML Units in an international investment bank, we proposed a
data mining-based solution for AML. In this paper, we present a
heuristics approach to improve the performance for this solution. We
also show some preliminary results associated with this method on
analysing transaction datasets.
Abstract: A pilot project was carried out in 2007 by the senior
students of Cyprus International University, aiming to minimize the
total cost of waste collection in Northern Cyprus. Many developed
and developing countries have cut their transportation costs – which
lies between 30-40% – down at a rate of 40% percent, by
implementing network models for their route assignments.
Accordingly, a network model was implemented at Göçmenköy
district, to optimize and standardize waste collection works. The
work environment of the employees were also redesigned to provide
maximum ergonomy and to increase productivity, efficiency and
safety. Following the collection of the required data including waste
densities, lengths of roads and population, a model was constructed
to allocate the optimal route assignment for the waste collection
trucks at Göçmenköy district.
Abstract: Domain-specific languages describe specific solutions to problems in the application domain. Traditionally they form a solution composing black-box abstractions together. This, usually, involves non-deep transformations over the target model. In this paper we argue that it is potentially powerful to operate with grey-box abstractions to build a domain-specific software system. We present parametric code templates as grey-box abstractions and conceptual tools to encapsulate and manipulate these templates. Manipulations introduce template-s merging routines and can be defined in a generic way. This involves reasoning mechanisms at the code templates level. We introduce the concept of Neurath Modelling Language (NML) that operates with parametric code templates and specifies a visualisation mapping mechanism for target models. Finally we provide an example of calculating a domain-specific software system with predefined NML elements.
Abstract: The current trend of increasing quality and demands
of the final product is affected by time analysis of the entire
manufacturing process. The primary requirement of manufacturing is
to produce as many products as soon as possible, at the lowest
possible cost, but of course with the highest quality. Such
requirements may be satisfied only if all the elements entering and
affecting the production cycle are in a fully functional condition.
These elements consist of sensory equipment and intelligent control
elements that are essential for building intelligent manufacturing
systems. The intelligent manufacturing paradigm includes a new
approach to production system structure design. Intelligent behaviors
are based on the monitoring of important parameters of system and
its environment. The flexible reaction to changes. The realization and
utilization of this design paradigm as an "intelligent manufacturing
system" enables the flexible system reaction to production
requirement as soon as environmental changes too. Results of these
flexible reactions are a smaller layout space, be decreasing of
production and investment costs and be increasing of productivity.
Intelligent manufacturing system itself should be a system that can
flexibly respond to changes in entering and exiting the process in
interaction with the surroundings.
Abstract: A study of the H-beam's nanosize structure phase
states after thermomechanical strengthening was carried out by TEM.
The following processes were analyzed. 1. The dispersing of the
cementite plates by cutting them by moving dislocations. 2. The
dissolution of cementite plates and repeated precipitation of the
cementite particles on the dislocations, the boundaries, subgrains and
grains. 3. The decay of solid solution of carbon in the α-iron after
"self-tempering" of martensite. 4. The final transformation of the
retained austenite in beinite with α-iron particles and cementite
formation. 5. The implementation of the diffusion mechanism of γ ⇒
α transformation.
Abstract: This paper discusses aspects of re-design of loadshedding
schemes with respect to actual developments in the Kosovo
power system. Load-shedding is a type of emergency control that is
designed to ensure system stability by reducing power system load to
match the power generation supply. This paper presents a new
adaptive load-shedding scheme that provides emergency protection
against excess frequency decline, in cases when the Kosovo power
system might be disconnected from the regional transmission
network. The proposed load-shedding scheme uses the local
frequency rate information to adapt the load-shedding pattern to suit
the size and location of the occurring disturbance. The proposed
scheme is tested in a software simulation on a large scale PSS/E
model which represents nine power system areas of Southeast Europe
including the Kosovo power system.
Abstract: Paper is dealing with vulnerability concerning elements of hydrological structures and elements of technological equipments which are acceptable for groundwater resources. The vulnerability assessment stems from the application of the register of hazards and a potential threat to individual water source elements within each type of hazard. The proposed procedure is pattern for assessing the risks of disturbance, damage, or destruction of water source by the identified natural or technological hazards and consequently for classification of these risks in relation to emergency water supply. Using of this procedure was verified on selected groundwater resource in particular region, which seems to be as potentially useful for crisis planning system.