Abstract: The paper deals with a mathematical model for fluid dynamic flows on road networks which is based on conservation laws. This nonlinear framework is based on the conservation of cars. We focus on traffic circle, which is a finite number of roads that meet at some junctions. The traffic circle with junctions having either one incoming and two outgoing or two incoming and one outgoing roads. We describe the numerical schemes with the particular boundary conditions used to produce approximated solutions of the problem.
Abstract: In this paper after reviewing some previous studies, in
order to optimize the above knee prosthesis, beside the inertial
properties a new controlling parameter is informed. This controlling
parameter makes the prosthesis able to act as a multi behavior system
when the amputee is opposing to different environments. This active
prosthesis with the new controlling parameter can simplify the
control of prosthesis and reduce the rate of energy consumption in
comparison to recently presented similar prosthesis “Agonistantagonist
active knee prosthesis".
In this paper three models are generated, a passive, an active, and
an optimized active prosthesis. Second order Taylor series is the
numerical method in solution of the models equations and the
optimization procedure is genetic algorithm.
Modeling the prosthesis which comprises this new controlling
parameter (SEP) during the swing phase represents acceptable results
in comparison to natural behavior of shank. Reported results in this
paper represent 3.3 degrees as the maximum deviation of models
shank angle from the natural pattern. The natural gait pattern belongs
to walking at the speed of 81 m/min.
Abstract: Recent years have witnessed the rapid development of
the Internet and telecommunication techniques. Information security
is becoming more and more important. Applications such as covert
communication, copyright protection, etc, stimulate the research of
information hiding techniques. Traditionally, encryption is used to
realize the communication security. However, important information
is not protected once decoded. Steganography is the art and science
of communicating in a way which hides the existence of the communication.
Important information is firstly hidden in a host data, such
as digital image, video or audio, etc, and then transmitted secretly
to the receiver.In this paper a data hiding model with high security
features combining both cryptography using finite state sequential
machine and image based steganography technique for communicating
information more securely between two locations is proposed.
The authors incorporated the idea of secret key for authentication
at both ends in order to achieve high level of security. Before the
embedding operation the secret information has been encrypted with
the help of finite-state sequential machine and segmented in different
parts. The cover image is also segmented in different objects through
normalized cut.Each part of the encoded secret information has been
embedded with the help of a novel image steganographic method
(PMM) on different cuts of the cover image to form different stego
objects. Finally stego image is formed by combining different stego
objects and transmit to the receiver side. At the receiving end different
opposite processes should run to get the back the original secret
message.
Abstract: In this paper, the authors examine whether or not there Institute for Information and Communications Policy shows are differences of Japanese Internet users awareness to information security based on individual attributes by using analysis of variance based on non-parametric method. As a result, generally speaking, it is found that Japanese Internet users' awareness to information security is different by individual attributes. Especially, the authors verify that the users who received the information security education would have rather higher recognition concerning countermeasures than other users including self-educated users. It is suggested that the information security education should be enhanced so that the users may appropriately take the information security countermeasures. In addition, the information security policy such as carrying out "e- net caravan" and "information security seminars" are effective in improving the users' awareness on the information security in Japan.
Abstract: This paper proposes a direct power control for
doubly-fed induction machine for variable speed wind power
generation. It provides decoupled regulation of the primary side
active and reactive power and it is suitable for both electric energy
generation and drive applications. In order to control the power
flowing between the stator of the DFIG and the network, a decoupled
control of active and reactive power is synthesized using PI
controllers.The obtained simulation results show the feasibility
and the effectiveness of the suggested method
Abstract: In this paper, we investigate the problem of the existence, uniqueness and global asymptotic stability of the equilibrium point for a class of neural networks, the neutral system has mixed time delays and parameter uncertainties. Under the assumption that the activation functions are globally Lipschitz continuous, we drive a new criterion for the robust stability of a class of neural networks with time delays by utilizing the Lyapunov stability theorems and the Homomorphic mapping theorem. Numerical examples are given to illustrate the effectiveness and the advantage of the proposed main results.
Abstract: Fuller’s earth is a fine-grained, naturally occurring substance that has a substantial ability to adsorb impurities. In the present study Fuller’s earth has been characterized and used for the removal of Pb(II) from aqueous solution. The effect of various physicochemical parameters such as pH, adsorbent dosage and shaking time on adsorption were studied. The result of the equilibrium studies showed that the solution pH was the key factor affecting the adsorption. The optimum pH for adsorption was 5. Kinetics data for the adsorption of Pb(II) was best described by pseudo-second order model. The effective diffusion co-efficient for Pb(II) adsorption was of the order of 10-8 m2/s. The adsorption data for metal adsorption can be well described by Langmuir adsorption isotherm. The maximum uptake of metal was 103.3 mg/g of adsorbent. Mass transfer analysis was also carried out for the adsorption process. The values of mass transfer coefficients obtained from the study indicate that the velocity of the adsorbate transport from bulk to the solid phase was quite fast. The mean sorption energy calculated from Dubinin-Radushkevich isotherm indicated that the metal adsorption process was chemical in nature.
Abstract: This paper discusses aspects of re-design of loadshedding
schemes with respect to actual developments in the Kosovo
power system. Load-shedding is a type of emergency control that is
designed to ensure system stability by reducing power system load to
match the power generation supply. This paper presents a new
adaptive load-shedding scheme that provides emergency protection
against excess frequency decline, in cases when the Kosovo power
system might be disconnected from the regional transmission
network. The proposed load-shedding scheme uses the local
frequency rate information to adapt the load-shedding pattern to suit
the size and location of the occurring disturbance. The proposed
scheme is tested in a software simulation on a large scale PSS/E
model which represents nine power system areas of Southeast Europe
including the Kosovo power system.
Abstract: The various applications of VLSI circuits in highperformance
computing, telecommunications, and consumer
electronics has been expanding progressively, and at a very hasty
pace. This paper describes a new model for partitioning a circuit
using DBSCAN and fuzzy ARTMAP neural network. The first step
is concerned with feature extraction, where we had make use
DBSCAN algorithm. The second step is the classification and is
composed of a fuzzy ARTMAP neural network. The performance of
both approaches is compared using benchmark data provided by
MCNC standard cell placement benchmark netlists. Analysis of the
investigational results proved that the fuzzy ARTMAP with
DBSCAN model achieves greater performance then only fuzzy
ARTMAP in recognizing sub-circuits with lowest amount of
interconnections between them The recognition rate using fuzzy
ARTMAP with DBSCAN is 97.7% compared to only fuzzy
ARTMAP.
Abstract: Ability of accurate and reliable location estimation in
indoor environment is the key issue in developing great number of
context aware applications and Location Based Services (LBS).
Today, the most viable solution for localization is the Received
Signal Strength (RSS) fingerprinting based approach using wireless
local area network (WLAN). This paper presents two RSS
fingerprinting based approaches – first we employ widely used
WLAN based positioning as a reference system and then investigate
the possibility of using GSM signals for positioning. To compare
them, we developed a positioning system in real world environment,
where realistic RSS measurements were collected. Multi-Layer
Perceptron (MLP) neural network was used as the approximation
function that maps RSS fingerprints and locations. Experimental
results indicate advantage of WLAN based approach in the sense of
lower localization error compared to GSM based approach, but GSM
signal coverage by far outreaches WLAN coverage and for some
LBS services requiring less precise accuracy our results indicate that
GSM positioning can also be a viable solution.
Abstract: In this note, a theoretical model for analyzing of
normal penetration of the ogive – nose projectile into metallic targets
is presented .The failure is assumed to be asymmetry petalling and
the analysis is performed by using the energy balance and work done
.The work done consist of the work required for plastic deformation
Wp, the work for transferring the matter to new position Wd and the
work for bending of the petals Wb. In several studies, it has been
shown that we can neglect the loss of energy by temperature.
In this present study, in first, by assuming the crater formation
after perforation, the value of work done is calculated during the
normal penetration of conical projectiles into thin metallic targets.
Then the value of residual velocity and ballistic limit of the projectile
is predicated by using the energy balance. In final, theoretical and
experimental results is compared.
Abstract: In this paper, a simple heuristic genetic algorithm is
used for Multistage Multiuser detection in fast fading environments.
Multipath channels, multiple access interference (MAI) and near far
effect cause the performance of the conventional detector to degrade.
Heuristic Genetic algorithms, a rapidly growing area of artificial
intelligence, uses evolutionary programming for initial search, which
not only helps to converge the solution towards near optimal
performance efficiently but also at a very low complexity as
compared with optimal detector. This holds true for Additive White
Gaussian Noise (AWGN) and multipath fading channels.
Experimental results are presented to show the superior performance
of the proposed techque over the existing methods.
Abstract: Sensor Network are emerging as a new tool for
important application in diverse fields like military surveillance,
habitat monitoring, weather, home electrical appliances and others.
Technically, sensor network nodes are limited in respect to energy
supply, computational capacity and communication bandwidth. In
order to prolong the lifetime of the sensor nodes, designing efficient
routing protocol is very critical. In this paper, we illustrate the
existing routing protocol for wireless sensor network using data
centric approach and present performance analysis of these protocols.
The paper focuses in the performance analysis of specific protocol
namely Directed Diffusion and SPIN. This analysis reveals that the
energy usage is important features which need to be taken into
consideration while designing routing protocol for wireless sensor
network.
Abstract: In this paper, a comparative study of application of
supervised and unsupervised learning algorithms on illumination
invariant face recognition has been carried out. The supervised
learning has been carried out with the help of using a bi-layered
artificial neural network having one input, two hidden and one output
layer. The gradient descent with momentum and adaptive learning
rate back propagation learning algorithm has been used to implement
the supervised learning in a way that both the inputs and
corresponding outputs are provided at the time of training the
network, thus here is an inherent clustering and optimized learning of
weights which provide us with efficient results.. The unsupervised
learning has been implemented with the help of a modified
Counterpropagation network. The Counterpropagation network
involves the process of clustering followed by application of Outstar
rule to obtain the recognized face. The face recognition system has
been developed for recognizing faces which have varying
illumination intensities, where the database images vary in lighting
with respect to angle of illumination with horizontal and vertical
planes. The supervised and unsupervised learning algorithms have
been implemented and have been tested exhaustively, with and
without application of histogram equalization to get efficient results.
Abstract: Complex assemblies of interacting proteins carry out
most of the interesting jobs in a cell, such as metabolism, DNA
synthesis, mitosis and cell division. These physiological properties
play out as a subtle molecular dance, choreographed by underlying
regulatory networks that control the activities of cyclin-dependent
kinases (CDK). The network can be modeled by a set of nonlinear
differential equations and its behavior predicted by numerical
simulation. In this paper, an innovative approach has been proposed
that uses genetic algorithms to mine a set of behavior data output by
a biological system in order to determine the kinetic parameters of
the system. In our approach, the machine learning method is
integrated with the framework of existent biological information in a
wiring diagram so that its findings are expressed in a form of system
dynamic behavior. By numerical simulations it has been illustrated
that the model is consistent with experiments and successfully shown
that such application of genetic algorithms will highly improve the
performance of mathematical model of the cell division cycle to
simulate such a complicated bio-system.
Abstract: The issue of real-time and reliable report delivery is extremely important for taking effective decision in a real world mission critical Wireless Sensor Network (WSN) based application. The sensor data behaves differently in many ways from the data in traditional databases. WSNs need a mechanism to register, process queries, and disseminate data. In this paper we propose an architectural framework for data placement and management. We propose a reliable and real time approach for data placement and achieving data integrity using self organized sensor clusters. Instead of storing information in individual cluster heads as suggested in some protocols, in our architecture we suggest storing of information of all clusters within a cell in the corresponding base station. For data dissemination and action in the wireless sensor network we propose to use Action and Relay Stations (ARS). To reduce average energy dissipation of sensor nodes, the data is sent to the nearest ARS rather than base station. We have designed our architecture in such a way so as to achieve greater energy savings, enhanced availability and reliability.
Abstract: A fundamental model consisting of charged particles
moving in free space exposed to alternating and direct current (ACDC)
electromagnetic fields is analyzed. Effects of charged particles
initial position and initial velocity to cyclotron resonance frequency
are observed. Strong effects are observed revealing that effects of
electric and magnetic fields on a charged particle in free space
varies with the initial conditions. This indicates the frequency where
maximum displacement occur can be changed. At this frequency
the amplitude of oscillation of the particle displacement becomes
unbounded.
Abstract: Selecting the routes and the assignment of link flow in a computer communication networks are extremely complex combinatorial optimization problems. Metaheuristics, such as genetic or simulated annealing algorithms, are widely applicable heuristic optimization strategies that have shown encouraging results for a large number of difficult combinatorial optimization problems. This paper considers the route selection and hence the flow assignment problem. A genetic algorithm and simulated annealing algorithm are used to solve this problem. A new hybrid algorithm combining the genetic with the simulated annealing algorithm is introduced. A modification of the genetic algorithm is also introduced. Computational experiments with sample networks are reported. The results show that the proposed modified genetic algorithm is efficient in finding good solutions of the flow assignment problem compared with other techniques.
Abstract: When an assignable cause(s) manifests itself to a multivariate process and the process shifts to an out-of-control condition, a root-cause analysis should be initiated by quality engineers to identify and eliminate the assignable cause(s) affected the process. A root-cause analysis in a multivariate process is more complex compared to a univariate process. In the case of a process involved several correlated variables an effective root-cause analysis can be only experienced when it is possible to identify the required knowledge including the out-of-control condition, the change point, and the variable(s) responsible to the out-of-control condition, all simultaneously. Although literature addresses different schemes to monitor multivariate processes, one can find few scientific reports focused on all the required knowledge. To the best of the author’s knowledge this is the first time that a multi task model based on artificial neural network (ANN) is reported to monitor all the required knowledge at the same time for a multivariate process with more than two correlated quality characteristics. The performance of the proposed scheme is evaluated numerically when different step shifts affect the mean vector. Average run length is used to investigate the performance of the proposed multi task model. The simulated results indicate the multi task scheme performs all the required knowledge effectively.
Abstract: In this paper, the energy performance of a selected
UHDE Ammonia plant is optimized by conducting heat integration through waste heat recovery and the synthesis of a heat exchange
network (HEN). Minimum hot and cold utility requirements were estimated through IChemE spreadsheet. Supporting simulation was
carried out using HYSYS software. The results showed that there is
no need for heating utility while the required cold utility was found to
be around 268,714 kW. Hence a threshold pinch case was faced. Then, the hot and cold streams were matched appropriately. Also,
waste heat recovered resulted with savings in HP and LP steams of
approximately 51.0% and 99.6%, respectively. An economic analysis
on proposed HEN showed very attractive overall payback period not
exceeding 3 years. In general, a net saving approaching 35% was
achieved in implementing heat optimization of current studied UHDE Ammonia process.