Abstract: Clean air in subway station is important to passengers. The Platform Screen Doors (PSDs) can improve indoor air quality in the subway station; however the air quality in the subway tunnel is degraded. The subway tunnel has high CO2 concentration and indoor particulate matter (PM) value. The Indoor Air Quality (IAQ) level in subway environment degrades by increasing the frequency of the train operation and the number of the train. The ventilation systems of the subway tunnel need improvements to have better air-quality. Numerical analyses might be effective tools to analyze the performance of subway twin-track tunnel ventilation systems. An existing subway twin-track tunnel in the metropolitan Seoul subway system is chosen for the numerical simulations. The ANSYS CFX software is used for unsteady computations of the airflow inside the twin-track tunnel when the train moves. The airflow inside the tunnel is simulated when one train runs and two trains run at the same time in the tunnel. The piston-effect inside the tunnel is analyzed when all shafts function as the natural ventilation shaft. The supplied air through the shafts is mixed with the pollutant air in the tunnel. The pollutant air is exhausted by the mechanical ventilation shafts. The supplied and discharged airs are balanced when only one train runs in the twin-track tunnel. The pollutant air in the tunnel is high when two trains run simultaneously in opposite direction and all shafts functioned as the natural shaft cases when there are no electrical power supplies in the shafts. The remained pollutant air inside the tunnel enters into the station platform when the doors are opened.
Abstract: The major building block of most elliptic curve cryptosystems
are computation of multi-scalar multiplication. This paper
proposes a novel algorithm for simultaneous multi-scalar multiplication,
that is by employing addition chains. The previously known
methods utilizes double-and-add algorithm with binary representations.
In order to accomplish our purpose, an efficient empirical
method for finding addition chains for multi-exponents has been
proposed.
Abstract: Multiprocessor task scheduling is a NP-hard problem and Genetic Algorithm (GA) has been revealed as an excellent technique for finding an optimal solution. In the past, several methods have been considered for the solution of this problem based on GAs. But, all these methods consider single criteria and in the present work, minimization of the bi-criteria multiprocessor task scheduling problem has been considered which includes weighted sum of makespan & total completion time. Efficiency and effectiveness of genetic algorithm can be achieved by optimization of its different parameters such as crossover, mutation, crossover probability, selection function etc. The effects of GA parameters on minimization of bi-criteria fitness function and subsequent setting of parameters have been accomplished by central composite design (CCD) approach of response surface methodology (RSM) of Design of Experiments. The experiments have been performed with different levels of GA parameters and analysis of variance has been performed for significant parameters for minimisation of makespan and total completion time simultaneously.
Abstract: We consider the development of an eight order Adam-s
type method, with A-stability property discussed by expressing them
as a one-step method in higher dimension. This makes it suitable
for solving variety of initial-value problems. The main method and
additional methods are obtained from the same continuous scheme
derived via interpolation and collocation procedures. The methods
are then applied in block form as simultaneous numerical integrators
over non-overlapping intervals. Numerical results obtained using the
proposed block form reveals that it is highly competitive with existing
methods in the literature.
Abstract: Phase locked loops for data links operating at 10 Gb/s
or faster are low phase noise devices designed to operate with a low
jitter reference clock. Characterization of their jitter transfer function
is difficult because the intrinsic noise of the device is comparable to
the random noise level in the reference clock signal. A linear model
is proposed to account for the intrinsic noise of a PLL. The intrinsic
noise data of a PLL for 10 Gb/s links is presented. The jitter transfer
function of a PLL in a test chip for 12.8 Gb/s data links was
determined in experiments using the 400 MHz reference clock as the
source of simultaneous excitations over a wide range of frequency.
The result shows that the PLL jitter transfer function can be
approximated by a second order linear model.
Abstract: A self tuning PID control strategy using reinforcement
learning is proposed in this paper to deal with the control of wind
energy conversion systems (WECS). Actor-Critic learning is used to
tune PID parameters in an adaptive way by taking advantage of the
model-free and on-line learning properties of reinforcement learning
effectively. In order to reduce the demand of storage space and to
improve the learning efficiency, a single RBF neural network is used
to approximate the policy function of Actor and the value function of
Critic simultaneously. The inputs of RBF network are the system
error, as well as the first and the second-order differences of error.
The Actor can realize the mapping from the system state to PID
parameters, while the Critic evaluates the outputs of the Actor and
produces TD error. Based on TD error performance index and
gradient descent method, the updating rules of RBF kernel function
and network weights were given. Simulation results show that the
proposed controller is efficient for WECS and it is perfectly
adaptable and strongly robust, which is better than that of a
conventional PID controller.
Abstract: Economic dispatch (ED) has been considered to be one of the key functions in electric power system operation which can help to build up effective generating management plans. The practical ED problem has non-smooth cost function with nonlinear constraints which make it difficult to be effectively solved. This paper presents a novel heuristic and efficient optimization approach based on the new Bat algorithm (BA) to solve the practical non-smooth economic dispatch problem. The proposed algorithm easily takes care of different constraints. In addition, two newly introduced modifications method is developed to improve the variety of the bat population when increasing the convergence speed simultaneously. The simulation results obtained by the proposed algorithms are compared with the results obtained using other recently develop methods available in the literature.
Abstract: Power loss reduction is one of the main targets in power industry and so in this paper, the problem of finding the optimal configuration of a radial distribution system for loss reduction is considered. Optimal reconfiguration involves the selection of the best set of branches to be opened ,one each from each loop, for reducing resistive line losses , and reliving overloads on feeders by shifting the load to adjacent feeders. However ,since there are many candidate switching combinations in the system ,the feeder reconfiguration is a complicated problem. In this paper a new approach is proposed based on a simple optimum loss calculation by determining optimal trees of the given network. From graph theory a distribution network can be represented with a graph that consists a set of nodes and branches. In fact this problem can be viewed as a problem of determining an optimal tree of the graph which simultaneously ensure radial structure of each candidate topology .In this method the refined genetic algorithm is also set up and some improvements of algorithm are made on chromosome coding. In this paper an implementation of the algorithm presented by [7] is applied by modifying in load flow program and a comparison of this method with the proposed method is employed. In [7] an algorithm is proposed that the choice of the switches to be opened is based on simple heuristic rules. This algorithm reduce the number of load flow runs and also reduce the switching combinations to a fewer number and gives the optimum solution. To demonstrate the validity of these methods computer simulations with PSAT and MATLAB programs are carried out on 33-bus test system. The results show that the performance of the proposed method is better than [7] method and also other methods.
Abstract: The objective of this paper is to use the Pfaffian
technique to construct different classes of exact Pfaffian solutions and
N-soliton solutions to some of the generalized integrable nonlinear
partial differential equations in (3+1) dimensions. In this paper, I will
show that the Pfaffian solutions to the nonlinear PDEs are nothing but
Pfaffian identities. Solitons are among the most beneficial solutions
for science and technology, from ocean waves to transmission of
information through optical fibers or energy transport along protein
molecules. The existence of multi-solitons, especially three-soliton
solutions, is essential for information technology: it makes possible
undisturbed simultaneous propagation of many pulses in both directions.
Abstract: It is important problems to increase the detection rates
and reduce false positive rates in Intrusion Detection System (IDS).
Although preventative techniques such as access control and
authentication attempt to prevent intruders, these can fail, and as a
second line of defence, intrusion detection has been introduced. Rare
events are events that occur very infrequently, detection of rare
events is a common problem in many domains. In this paper we
propose an intrusion detection method that combines Rough set and
Fuzzy Clustering. Rough set has to decrease the amount of data and
get rid of redundancy. Fuzzy c-means clustering allow objects to
belong to several clusters simultaneously, with different degrees of
membership. Our approach allows us to recognize not only known
attacks but also to detect suspicious activity that may be the result of
a new, unknown attack. The experimental results on Knowledge
Discovery and Data Mining-(KDDCup 1999) Dataset show that the
method is efficient and practical for intrusion detection systems.
Abstract: Response surface methodology (RSM) is a very
efficient tool to provide a good practical insight into developing new
process and optimizing them. This methodology could help
engineers to raise a mathematical model to represent the behavior of
system as a convincing function of process parameters.
Through this paper the sequential nature of the RSM surveyed for process
engineers and its relationship to design of experiments (DOE), regression
analysis and robust design reviewed. The proposed four-step procedure in
two different phases could help system analyst to resolve the parameter
design problem involving responses. In order to check accuracy of the
designed model, residual analysis and prediction error sum of squares
(PRESS) described.
It is believed that the proposed procedure in this study can resolve a
complex parameter design problem with one or more responses. It can be
applied to those areas where there are large data sets and a number of
responses are to be optimized simultaneously. In addition, the proposed
procedure is relatively simple and can be implemented easily by using
ready-made standard statistical packages.
Abstract: Nowadays, HPC, Grid and Cloud systems are evolving
very rapidly. However, the development of infrastructure solutions
related to HPC is lagging behind. While the existing infrastructure is
sufficient for simple cases, many computational problems have more
complex requirements.Such computational experiments use different
resources simultaneously to start a large number of computational
jobs.These resources are heterogeneous. They have different
purposes, architectures, performance and used software.Users need a
convenient tool that allows to describe and to run complex
computational experiments under conditions of HPC environment.
This paper introduces a modularworkflow system called SEGL
which makes it possible to run complex computational experiments
under conditions of a real HPC organization. The system can be used
in a great number of organizations, which provide HPC power.
Significant requirements to this system are high efficiency and
interoperability with the existing HPC infrastructure of the
organization without any changes.
Abstract: This paper focuses on PSS/E modeling of wind farms
of Doubly-fed Induction Generator (DFIG) type and their impact on
issues of power system operation. Since Wind Turbine Generators
(WTG) don-t have the same characteristics as synchronous
generators, the appropriate modeling of wind farms is essential for
transmission system operators to analyze the best options of
transmission grid reinforcements as well as to evaluate the wind
power impact on reliability and security of supply. With the high
excepted penetration of wind power into the power system a
simultaneous loss of Wind Farm generation will put at risk power
system security and reliability. Therefore, the main wind grid code
requirements concern the fault ride through capability and frequency
operation range of wind turbines. In case of grid faults wind turbines
have to supply a definite reactive power depending on the
instantaneous voltage and to return quickly to normal operation.
Abstract: The solvated electron is self-trapped (polaron) owing
to strong interaction with the quantum polarization field. If the
electron and quantum field are strongly coupled then the collective
localized state of the field and quasi-particle is formed. In such a
formation the electron motion is rather intricate. On the one hand the
electron oscillated within a rather deep polarization potential well
and undergoes the optical transitions, and on the other, it moves
together with the center of inertia of the system and participates in
the thermal random walk. The problem is to separate these motions
correctly, rigorously taking into account the conservation laws. This
can be conveniently done using Bogolyubov-Tyablikov method of
canonical transformation to the collective coordinates. This
transformation removes the translational degeneracy and allows one
to develop the successive approximation algorithm for the energy and
wave function while simultaneously fulfilling the law of conservation
of total momentum of the system. The resulting equations determine
the electron transitions and depend explicitly on the translational
velocity of the quasi-particle as whole. The frequency of optical
transition is calculated for the solvated electron in ammonia, and an
estimate is made for the thermal-induced spectral bandwidth.
Abstract: In the visual servoing systems, the data obtained by
Visionary is used for controlling robots. In this project, at first the
simulator which was proposed for simulating the performance of a
6R robot before, was examined in terms of software and test, and in
the proposed simulator, existing defects were obviated. In the first
version of simulation, the robot was directed toward the target object only in a Position-based method using two cameras in the
environment. In the new version of the software, three cameras were used simultaneously. The camera which is installed as eye-inhand on the end-effector of the robot is used for visual servoing in a
Feature-based method. The target object is recognized according to
its characteristics and the robot is directed toward the object in compliance with an algorithm similar to the function of human-s
eyes. Then, the function and accuracy of the operation of the robot are examined through Position-based visual servoing method using
two cameras installed as eye-to-hand in the environment. Finally, the obtained results are tested under ANSI-RIA R15.05-2 standard.
Abstract: Decision making preferences to certain criteria
usually focus on positive degrees without considering the negative
degrees. However, in real life situation, evaluation becomes more
comprehensive if negative degrees are considered concurrently.
Preference is expected to be more effective when considering both
positive and negative degrees of preference to evaluate the best
selection. Therefore, the aim of this paper is to propose the
conflicting bifuzzy preference relations in group decision making by
utilization of a novel score function. The conflicting bifuzzy
preference relation is obtained by introducing some modifications on
intuitionistic fuzzy preference relations. Releasing the intuitionistic
condition by taking into account positive and negative degrees
simultaneously and utilizing the novel score function are the main
modifications to establish the proposed preference model. The
proposed model is tested with a numerical example and proved to be
simple and practical. The four-step decision model shows the
efficiency of obtaining preference in group decision making.
Abstract: In DMVC, we have more than one options of sources available for construction of side information. The newer techniques make use of both the techniques simultaneously by constructing a bitmask that determines the source of every block or pixel of the side information. A lot of computation is done to determine each bit in the bitmask. In this paper, we have tried to define areas that can only be well predicted by temporal interpolation and not by multiview interpolation or synthesis. We predict that all such areas that are not covered by two cameras cannot be appropriately predicted by multiview synthesis and if we can identify such areas in the first place, we don-t need to go through the script of computations for all the pixels that lie in those areas. Moreover, this paper also defines a technique based on KLT to mark the above mentioned areas before any other processing is done on the side view.
Abstract: In this paper, an analysis is presented, which
demonstrates the effect pre-logic factoring could have on an
automated combinational logic synthesis process succeeding it. The
impact of pre-logic factoring for some arbitrary combinatorial
circuits synthesized within a FPGA based logic design environment
has been analyzed previously. This paper explores a similar effect,
but with the non-regenerative logic synthesized using elements of a
commercial standard cell library. On an overall basis, the results
obtained pertaining to the analysis on a variety of MCNC/IWLS
combinational logic benchmark circuits indicate that pre-logic
factoring has the potential to facilitate simultaneous power, delay and
area optimized synthesis solutions in many cases.
Abstract: A self-evolution algorithm for optimizing neural networks using a combination of PSO and JPSO is proposed. The algorithm optimizes both the network topology and parameters simultaneously with the aim of achieving desired accuracy with less complicated networks. The performance of the proposed approach is compared with conventional back-propagation networks using several synthetic functions, with better results in the case of the former. The proposed algorithm is also implemented on slope stability problem to estimate the critical factor of safety. Based on the results obtained, the proposed self evolving network produced a better estimate of critical safety factor in comparison to conventional BPN network.
Abstract: Until recently, energy security and climate change
were considered separate issues to be dealt with by policymakers.
The two issues are now converging, challenging the security and
climate communities to develop a better understanding of how to deal
with both issues simultaneously. Although Egypt is not a major
contributor to the world's total GHG emissions, it is particularly
vulnerable to the potential effects of global climate change such as
rising sea levels and changed patterns of rainfall in the Nile Basin.
Climate change is a major threat to sustainable growth and
development in Egypt, and the achievement of the Millennium
Development Goals. Egypt-s capacity to respond to the challenges of
climate instability will be expanded by improving overall resilience,
integrating climate change goals into sustainable development
strategies, increasing the use of modern energy systems with reduced
carbon intensity, and strengthening international initiatives. This
study seeks to establish a framework for considering the complex and
evolving links between energy security and climate change,
applicable to Egypt.