Abstract: The objective of the paper is to develop the forecast
model for the HW flows. The methodology of the research included
6 modules: historical data, assumptions, choose of indicators, data
processing, and data analysis with STATGRAPHICS, and forecast
models. The proposed methodology was validated for the case study
for Latvia. Hypothesis on the changes in HW for time period of
2010-2020 have been developed and mathematically described with
confidence level of 95.0% and 50.0%. Sensitivity analysis for the
analyzed scenarios was done. The results show that the growth of
GDP affects the total amount of HW in the country. The total amount
of the HW is projected to be within the corridor of – 27.7% in the
optimistic scenario up to +87.8% in the pessimistic scenario with
confidence level of 50.0% for period of 2010-2020. The optimistic
scenario has shown to be the least flexible to the changes in the GDP
growth.
Abstract: This paper proposes an improved approach based on
conventional particle swarm optimization (PSO) for solving an
economic dispatch(ED) problem with considering the generator
constraints. The mutation operators of the differential evolution (DE)
are used for improving diversity exploration of PSO, which called
particle swarm optimization with mutation operators (PSOM). The
mutation operators are activated if velocity values of PSO nearly to
zero or violated from the boundaries. Four scenarios of mutation
operators are implemented for PSOM. The simulation results of all
scenarios of the PSOM outperform over the PSO and other existing
approaches which appeared in literatures.
Abstract: Mobile Ad hoc Network (MANET) is a wireless ad hoc self-configuring network of mobile routers (and associated hosts) connected by wireless links, the union of which forms an arbitrary topology, cause of the random mobility of the nodes. In this paper, an attempt has been made to compare these three protocols DSDV, AODV and DSR on the performance basis under different traffic protocols namely CBR and TCP in a large network. The simulation tool is NS2, the scenarios are made to see the effect of pause times. The results presented in this paper clearly indicate that the different protocols behave differently under different pause times. Also, the results show the main characteristics of different traffic protocols operating on MANETs and thus select the best protocol on each scenario.
Abstract: Many corporations are seriously concerned about
security of networks and therefore, their network supervisors are still
reluctant to install WLANs. In this regards, the IEEE802.11i standard
was developed to address the security problems, even though the
mistrust of the wireless LAN technology is still existing. The thought
was that the best security solutions could be found in open standards
based technologies that can be delivered by Virtual Private
Networking (VPN) being used for long time without addressing any
security holes for the past few years. This work, addresses this issue
and presents a simulated wireless LAN of IEEE802.11g protocol, and
analyzes impact of integrating Virtual Private Network technology to
secure the flow of traffic between the client and the server within the
LAN, using OPNET WLAN utility. Two Wireless LAN scenarios
have been introduced and simulated. These are based on normal
extension to a wired network and VPN over extension to a wired
network. The results of the two scenarios are compared and indicate
the impact of improving performance, measured by response time
and load, of Virtual Private Network over wireless LAN.
Abstract: A mobile Ad-hoc network consists of wireless nodes
communicating without the need for a centralized administration. A
user can move anytime in an ad hoc scenario and, as a result, such a
network needs to have routing protocols which can adopt
dynamically changing topology. To accomplish this, a number of ad
hoc routing protocols have been proposed and implemented, which
include DSR, OLSR and AODV. This paper presents a study on the
QoS parameters for MANET application traffics in large-scale
scenarios with 50 and 120 nodes. The application traffics analyzed in
this study is File Transfer Protocol (FTP). In large scale networks
(120 nodes) OLSR shows better performance and in smaller scale
networks (50 nodes)AODV shows less packet drop rate and OLSR
shows better throughput.
Abstract: Radio wave propagation on the road surface is a major
problem on wireless sensor network for traffic monitoring. In this
paper, we compare receiving signal strength on two scenarios 1) an
empty road and 2) a road with a vehicle. We investigate the effect of
antenna polarization and antenna height to the receiving signal
strength. The transmitting antenna is installed on the road surface.
The receiving signal is measured 360 degrees around the transmitting
antenna with the radius of 2.5 meters. Measurement results show the
receiving signal fluctuation around the transmitting antenna in both
scenarios. Receiving signal with vertical polarization antenna results
in higher signal strength than horizontal polarization antenna. The
optimum antenna elevation is 1 meter for both horizon and vertical
polarizations with the vehicle on the road. In the empty road, the
receiving signal level is unvarying with the elevation when the
elevation is greater than 1.5 meters.
Abstract: For fire safety purposes, the fire resistance and the
structural behavior of reinforced concrete members are assessed to
satisfy specific fire performance criteria. The available prescribed
provisions are based on standard fire load. Under various fire
scenarios, engineers are in need of both heat transfer analysis and
structural analysis. For heat transfer analysis, the study proposed a
modified finite difference method to evaluate the temperature profile
within a cross section. The research conducted is limited to concrete
sections exposed to a fire on their one side. The method is based on
the energy conservation principle and a pre-determined power
function of the temperature profile. The power value of 2.7 is found
to be a suitable value for concrete sections. The temperature profiles
of the proposed method are only slightly deviate from those of the
experiment, the FEM and the FDM for various fire loads such as
ASTM E 119, ASTM 1529, BS EN 1991-1-2 and 550 oC. The
proposed method is useful to avoid incontinence of the large matrix
system of the typical finite difference method to solve the
temperature profile. Furthermore, design engineers can simply apply
the proposed method in regular spreadsheet software.
Abstract: This paper provides a framework in order to
incorporate reliability issue as a sign of disruption in distribution
systems and partial covering theory as a response to limitation in
coverage radios and economical preferences, simultaneously into the
traditional literatures of capacitated facility location problems. As a
result we develop a bi-objective model based on the discrete
scenarios for expected cost minimization and demands coverage
maximization through a three echelon supply chain network by
facilitating multi-capacity levels for provider side layers and
imposing gradual coverage function for distribution centers (DCs).
Additionally, in spite of objectives aggregation for solving the model
through LINGO software, a branch of LP-Metric method called Min-
Max approach is proposed and different aspects of corresponds
model will be explored.
Abstract: In a none-super-competitive environment the concepts
of closed system, management control remains to be the dominant
guiding concept to management. The merits of closed loop have been
the sources of most of the management literature and culture for
many decades. It is a useful exercise to investigate and poke into the
dynamics of the control loop phenomenon and draws some lessons to
use for refining the practice of management. This paper examines the
multitude of lessons abstracted from the behavior of the Input /output
/feedback control loop model, which is the core of control theory.
There are numerous lessons that can be learned from the insights this
model would provide and how it parallels the management dynamics
of the organization. It is assumed that an organization is basically a
living system that interacts with the internal and external variables. A
viable control loop is the one that reacts to the variation in the
environment and provide or exert a corrective action. In managing
organizations this is reflected in organizational structure and
management control practices. This paper will report findings that
were a result of examining several abstract scenarios that are
exhibited in the design, operation, and dynamics of the control loop
and how they are projected on the functioning of the organization.
Valuable lessons are drawn in trying to find parallels and new
paradigms, and how the control theory science is reflected in the
design of the organizational structure and management practices. The
paper is structured in a logical and perceptive format. Further
research is needed to extend these findings.
Abstract: Lately there has been a significant boost of interest in
music digital libraries, which constitute an attractive area of research
and development due to their inherent interesting issues and
challenging technical problems, solutions to which will be highly
appreciated by enthusiastic end-users. We present here a DL that we
have developed to support users in their quest for classical music
pieces within a particular collection of 18,000+ audio recordings.
To cope with the early DL model limitations, we have used a refined
socio-semantic and contextual model that allows rich bibliographic
content description, along with semantic annotations, reviewing,
rating, knowledge sharing etc. The multi-layered service model
allows incorporation of local and distributed information,
construction of rich hypermedia documents, expressing the complex
relationships between various objects and multi-dimensional spaces,
agents, actors, services, communities, scenarios etc., and facilitates
collaborative activities to offer to individual users the needed
collections and services.
Abstract: The increasing number of senior population gradually
causes to demand the use of information and communication
technology for their satisfactory lives. This paper presents the
development of an integrated TV based system which offers an
opportunity to provide value added services to a large number of
elderly citizens, and thus helps improve their quality of life. The
design philosophy underlying this paper is to fulfill both technological
and human aspects. The balance between these two dimensions has
been currently stressed as a crucial element for the design of usable
systems in real use, particularly to the elderly who have physical and
mental decline. As the first step to achieve it, we have identified
human and social factors that affect the elder-s quality of life by a
literature review, and based on them, build four fundamental services:
information, healthcare, learning and social network services.
Secondly, the system architecture, employed technologies and the
elderly-friendly system design considerations are presented. This
reflects technological and human perspectives in terms of the system
design. Finally, we describe some scenarios that illustrate the
potentiality of the proposed system to improve elderly people-s quality
of life.
Abstract: In this paper an analytical crack propagation scenario
is proposed which assumes that a crack propagates in the tooth root in
both the crack depth direction and the tooth width direction, and
which is more reasonable and realistic for non-uniform load
distribution cases than the other presented scenarios. An analytical
approach is used for quantifying the loss of time-varying gear mesh
stiffness with the presence of crack propagation in the gear tooth root.
The proposed crack propagation scenario can be applied for crack
propagation modelling and monitoring simulation, but further
research is required for comparison and evaluation of all the
presented crack propagation scenarios from the condition monitoring
point of view.
Abstract: This study examined a habitat-suitability assessment method namely the Ecological Niche Factor Analysis (ENFA). A virtual species was created and then dispatched in a geographic information system model of a real landscape in three historic scenarios: (1) spreading, (2) equilibrium, and (3) overabundance. In each scenario, the virtual species was sampled and these simulated data sets were used as inputs for the ENFA to reconstruct the habitat suitability model. The 'equilibrium' scenario gives the highest quantity and quality among three scenarios. ENFA was sensitive to the distribution scenarios but not sensitive to sample sizes. The use of a virtual species proved to be a very efficient method, allowing one to fully control the quality of the input data as well as to accurately evaluate the predictive power of the analyses.
Abstract: Lack of resources for road infrastructure financing is a
problem that currently affects not only eastern European economies
but also many other countries especially in relation to the impact of
global financial crisis. In this context, we are talking about the socalled
short-investment problem as a result of long-term lack of
investment resources. Based on an analysis of road infrastructure
financing in the Czech Republic this article points out at weaknesses
of current system and proposes a long-term planning methodology
supported by system approach. Within this methodology and using
created system dynamic model the article predicts the development of
short-investment problem in the Country and in reaction on the
downward trend of certain sources the article presents various
scenarios resulting from the change of the structure of financial
sources. In the discussion the article focuses more closely on the
possibility of introduction of tax on vehicles instead of taxes with
declining revenue streams and estimates its approximate price in
relation to reaching various solutions of short-investment in time.
Abstract: This work presents a multiple objective linear programming (MOLP) model based on the desirability function approach for solving the aggregate production planning (APP) decision problem upon Masud and Hwang-s model. The proposed model minimises total production costs, carrying or backordering costs and rates of change in labor levels. An industrial case demonstrates the feasibility of applying the proposed model to the APP problems with three scenarios of inventory levels. The proposed model yields an efficient compromise solution and the overall levels of DM satisfaction with the multiple combined response levels. There has been a trend to solve complex planning problems using various metaheuristics. Therefore, in this paper, the multi-objective APP problem is solved by hybrid metaheuristics of the hunting search (HuSIHSA) and firefly (FAIHSA) mechanisms on the improved harmony search algorithm. Results obtained from the solution of are then compared. It is observed that the FAIHSA can be used as a successful alternative solution mechanism for solving APP problems over three scenarios. Furthermore, the FAIHSA provides a systematic framework for facilitating the decision-making process, enabling a decision maker interactively to modify the desirability function approach and related model parameters until a good optimal solution is obtained with proper selection of control parameters when compared.
Abstract: The success of an e-learning system is highly
dependent on the quality of its educational content and how effective,
complete, and simple the design tool can be for teachers. Educational
modeling languages (EMLs) are proposed as design languages
intended to teachers for modeling diverse teaching-learning
experiences, independently of the pedagogical approach and in
different contexts. However, most existing EMLs are criticized for
being too abstract and too complex to be understood and manipulated
by teachers. In this paper, we present a visual EML that simplifies the
process of designing learning scenarios for teachers with no
programming background. Based on the conceptual framework of the
activity theory, our resulting visual EML focuses on using Domainspecific
modeling techniques to provide a pedagogical level of
abstraction in the design process.
Abstract: Recently, wireless sensor networks have been paid
more interest, are widely used in a lot of commercial and military
applications, and may be deployed in critical scenarios (e.g. when a
malfunctioning network results in danger to human life or great
financial loss). Such networks must be protected against human
intrusion by using the secret keys to encrypt the exchange messages
between communicating nodes. Both the symmetric and asymmetric
methods have their own drawbacks for use in key management. Thus,
we avoid the weakness of these two cryptosystems and make use of
their advantages to establish a secure environment by developing the
new method for encryption depending on the idea of code
conversion. The code conversion-s equations are used as the key for
designing the proposed system based on the basics of logic gate-s
principals. Using our security architecture, we show how to reduce
significant attacks on wireless sensor networks.
Abstract: In this paper variation of spot price and total profits of
the generating companies- through wholesale electricity trading are
discussed with and without Central Generating Stations (CGS) share
and seasonal variations are also considered. It demonstrates how
proper analysis of generators- efficiencies and capabilities, types of
generators owned, fuel costs, transmission losses and settling price
variation using the solutions of Optimal Power Flow (OPF), can
allow companies to maximize overall revenue. It illustrates how
solutions of OPF can be used to maximize companies- revenue under
different scenarios. And is also extended to computation of Available
Transfer Capability (ATC) is very important to the transmission
system security and market forecasting. From these results it is
observed that how crucial it is for companies to plan their daily
operations and is certainly useful in an online environment of
deregulated power system. In this paper above tasks are demonstrated
on 124 bus real-life Indian utility power system of Andhra Pradesh
State Grid and results have been presented and analyzed.
Abstract: The correct design of the regulators structure requires complete prediction of the ultimate dimensions of the scour hole profile formed downstream the solid apron. The study of scour downstream regulator is studied either on solid aprons by means of velocity distribution or on movable bed by studying the topography of the scour hole formed in the downstream. In this paper, a new technique was developed to study the scour hole downstream regulators on movable beds. The study was divided into two categories; the first is to find out the sum of the lengths of rigid apron behind the gates in addition to the length of scour hole formed downstream, while the second is to find the minimum length of rigid apron behind the gates to prevent erosion downstream it. The study covers free and submerged hydraulic jump conditions in both symmetrical and asymmetrical under-gated regulations. From the comparison between the studied categories, we found that the minimum length of rigid apron to prevent scour (Ls) is greater than the sum of the lengths of rigid apron and that of scour hole formed behind it (L+Xs). On the other hand, the scour hole dimensions in case of submerged hydraulic jump is always greater than free one, also the scour hole dimensions in asymmetrical operation is greater than symmetrical one.
Abstract: The Mobile Ad-hoc Network (MANET) is a collection of self-configuring and rapidly deployed mobile nodes (routers) without any central infrastructure. Routing is one of the potential issues. Many routing protocols are reported but it is difficult to decide which one is best in all scenarios. In this paper on demand routing protocols DSR and DYMO based on IEEE 802.11 DCF MAC protocol are examined and characteristic summary of these routing protocols is presented. Their performance is analyzed and compared on performance measuring metrics throughput, dropped packets due to non availability of routes, duplicate RREQ generated for route discovery and normalized routing load by varying CBR data traffic load using QualNet 5.0.2 network simulator.