Abstract: In this paper, optimal generation expansion planning (GEP) is investigated considering purchase prices, profits of independent power producers (IPPs) and reliability criteria using a new method based on hybrid coded Genetic Algorithm (GA) and Particle Swarm Optimization (PSO). In this approach, optimal purchase price of each IPP is obtained by HCGA and reliability criteria are calculated by PSO technique. It should be noted that reliability criteria and the rate of carbon dioxide (CO2) emission have been considered as constraints of the GEP problem. Finally, the proposed method has been tested on the case study system. The results evaluation show that the proposed method can simply obtain optimal purchase prices of IPPs and is a fast method for calculation of reliability criteria in expansion planning. Also, considering the optimal purchase prices and profits of IPPs in generation expansion planning are caused that the expansion costs are decreased and the problem is solved more exactly.
Abstract: Present wireless communication demands compact and intelligent devices with multitasking capabilities at affordable cost. The focus in the presented paper is on a dual band antenna for wireless communication with the capability of operating at two frequency bands with same structure. Two resonance frequencies are observed with the second operation band at 4.2GHz approximately three times the first resonance frequency at 1.5GHz. Structure is simple loop of microstrip line with characteristic impedance 50 ohms. The proposed antenna is designed using defective ground structure (DGS) and shows the nearly one third reductions in size as compared to without DGS. This antenna was simulated on electromagnetic (EM) simulation software and fabricated using microwave integrated circuit technique on RT-Duroid dielectric substrate (εr= 2.22) of thickness (H=15 mils). The designed antenna was tested on automatic network analyzer and shows the good agreement with simulated results. The proposed structure is modeled into an equivalent electrical circuit and simulated on circuit simulator. Subsequently, theoretical analysis was carried out and simulated. The simulated, measured, equivalent circuit response, and theoretical results shows good resemblance. The bands of operation draw many potential applications in today’s wireless communication.
Abstract: A gene network gives the knowledge of the regulatory
relationships among the genes. Each gene has its activators and
inhibitors that regulate its expression positively and negatively
respectively. Genes themselves are believed to act as activators and
inhibitors of other genes. They can even activate one set of genes and
inhibit another set. Identifying gene networks is one of the most
crucial and challenging problems in Bioinformatics. Most work done
so far either assumes that there is no time delay in gene regulation or
there is a constant time delay. We here propose a Dynamic Time-
Lagged Correlation Based Method (DTCBM) to learn the gene
networks, which uses time-lagged correlation to find the potential
gene interactions, and then uses a post-processing stage to remove
false gene interactions to common parents, and finally uses dynamic
correlation thresholds for each gene to construct the gene network.
DTCBM finds correlation between gene expression signals shifted in
time, and therefore takes into consideration the multi time delay
relationships among the genes. The implementation of our method is
done in MATLAB and experimental results on Saccharomyces
cerevisiae gene expression data and comparison with other methods
indicate that it has a better performance.
Abstract: The modern queueing theory is one of the powerful
tools for a quantitative and qualitative analysis of communication systems, computer networks, transportation systems, and many other technical systems. The paper is designated to the analysis of queueing
systems, arising in the networks theory and communications theory
(called open queueing network). The authors of this research in the
sphere of queueing theory present the theorem about the law of the iterated logarithm (LIL) for the queue length of a customers in open
queueing network and its application to the mathematical model of
the open message switching system.
Abstract: The advances in multimedia and networking technologies
have created opportunities for Internet pirates, who can easily
copy multimedia contents and illegally distribute them on the Internet,
thus violating the legal rights of content owners. This paper describes
how a simple and well-known watermarking procedure based on a
spread spectrum method and a watermark recovery by correlation can
be improved to effectively and adaptively protect MPEG-2 videos
distributed on the Internet. In fact, the procedure, in its simplest
form, is vulnerable to a variety of attacks. However, its security
and robustness have been increased, and its behavior has been
made adaptive with respect to the video terminals used to open
the videos and the network transactions carried out to deliver them
to buyers. In fact, such an adaptive behavior enables the proposed
procedure to efficiently embed watermarks, and this characteristic
makes the procedure well suited to be exploited in web contexts,
where watermarks usually generated from fingerprinting codes have
to be inserted into the distributed videos “on the fly", i.e. during the
purchase web transactions.
Abstract: Network exchange is now widely used. However, it still
cannot avoid the problems evolving from network exchange. For
example. A buyer may not receive the order even if he/she makes the
payment. For another example, the seller possibly get nothing even
when the merchandise is sent. Some studies about the fair exchange
have proposed protocols for the design of efficiency and exploited the
signature property to specify that two parties agree on the exchange.
The information about purchased item and price are disclosed in
this way. This paper proposes a new fair network payment protocol
with off-line trusted third party. The proposed protocol can protect
the buyers- purchase message from being traced. In addition, the
proposed protocol can meet the proposed requirements. The most
significant feature is Non-transfer property we achieved.
Abstract: This preliminary study attempts to see if a learning
environment influences instructor’s teaching strategies and learners’
in-class activities in a foreign language class at a university in Japan.
The class under study was conducted in a computer room, while the
majority of classes of the same course were offered in traditional
classrooms without computers. The study also sees if the unplanned
blended learning environment, enhanced, or worked against, in
achieving course goals, by paying close attention to in-class artefacts,
such as computers. In the macro-level analysis, the course syllabus
and weekly itinerary of the course were looked at; and in the microlevel
analysis, nonhuman actors in their environments were named
and analyzed to see how they influenced the learners’ task processes.
The result indicated that students were heavily influenced by the
presence of computers, which lead them to disregard some aspects of
intended learning objectives.
Abstract: In this paper by using the port-controlled Hamiltonian
(PCH) systems theory, a full-order nonlinear controlled model is first
developed. Then a nonlinear passivity-based robust adaptive control
(PBRAC) of switched reluctance motor in the presence of external
disturbances for the purpose of torque ripple reduction and
characteristic improvement is presented. The proposed controller
design is separated into the inner loop and the outer loop controller.
In the inner loop, passivity-based control is employed by using
energy shaping techniques to produce the proper switching function.
The outer loop control is employed by robust adaptive controller to
determine the appropriate Torque command. It can also overcome the
inherent nonlinear characteristics of the system and make the whole
system robust to uncertainties and bounded disturbances. A 4KW 8/6
SRM with experimental characteristics that takes magnetic saturation
into account is modeled, simulation results show that the proposed
scheme has good performance and practical application prospects.
Abstract: In this paper the Differential Quadrature Method (DQM) is employed to study the coupled lateral-torsional free vibration behavior of the laminated composite beams. In such structures due to the fiber orientations in various layers, the lateral displacement leads to a twisting moment. The coupling of lateral and torsional vibrations is modeled by the bending-twisting material coupling rigidity. In the present study, in addition to the material coupling, the effects of shear deformation and rotary inertia are taken into account in the definition of the potential and kinetic energies of the beam. The governing differential equations of motion which form a system of three coupled PDEs are solved numerically using DQ procedure under different boundary conditions consist of the combinations of simply, clamped, free and other end conditions. The resulting natural frequencies and mode shapes for cantilever beam are compared with similar results in the literature and good agreement is achieved.
Abstract: Misalignment and unbalance are the major concerns
in rotating machinery. When the power supply to any rotating system
is cutoff, the system begins to lose the momentum gained during
sustained operation and finally comes to rest. The exact time period
from when the power is cutoff until the rotor comes to rest is called
Coast Down Time. The CDTs for different shaft cutoff speeds were
recorded at various misalignment and unbalance conditions. The
CDT reduction percentages were calculated for each fault and there
is a specific correlation between the CDT reduction percentage and
the severity of the fault. In this paper, radial basis network, a new
generation of artificial neural networks, has been successfully
incorporated for the prediction of CDT for misalignment and
unbalance conditions. Radial basis network has been found to be
successful in the prediction of CDT for mechanical faults in rotating
machinery.
Abstract: To support user mobility for a wireless network new mechanisms are needed and are fundamental, such as paging, location updating, routing, and handover. Also an important key feature is mobile QoS offered by the WATM. Several ATM network protocols should be updated to implement mobility management and to maintain the already ATM QoS over wireless ATM networks. A survey of the various schemes and types of handover is provided. Handover procedure allows guarantee the terminal connection reestablishment when it moves between areas covered by different base stations. It is useful to satisfy user radio link transfer without interrupting a connection. However, failure to offer efficient solutions will result in handover important packet loss, severe delays and degradation of QoS offered to the applications. This paper reviews the requirements, characteristics and open issues of wireless ATM, particularly with regard to handover. It introduces key aspects of WATM and mobility extensions, which are added in the fixed ATM network. We propose a flexible approach for handover management that will minimize the QoS deterioration. Functional entities of this flexible approach are discussed in order to achieve minimum impact on the connection quality when a MT crosses the BS.
Abstract: This paper compares the search engine marketing
strategies adopted in China and the Western countries through two illustrative cases, namely, Google and Baidu. Marketers in the West
use search engine optimization (SEO) to rank their sites higher for
queries in Google. Baidu, however, offers paid search placement, or the selling of engine results for particular keywords to the higher
bidders. Whereas Google has been providing innovative services ranging from Google Map to Google Blog, Baidu remains focused on
search services – the one that it does best. The challenges and
opportunities of the Chinese Internet market offered to global entrepreneurs are also discussed in the paper
Abstract: The robot is a repeated task plant. The control of such
a plant under parameter variations and load disturbances is one of the
important problems. The aim of this work is to design Geno-Fuzzy
controller suitable for online applications to control single link rigid
robot arm plant. The genetic-fuzzy online controller (indirect
controller) has two genetic-fuzzy blocks, the first as controller, the
second as identifier. The identification method is based on inverse
identification technique. The proposed controller it tested in normal
and load disturbance conditions.
Abstract: QoS Routing aims to find paths between senders and
receivers satisfying the QoS requirements of the application which
efficiently using the network resources and underlying routing
algorithm to be able to find low-cost paths that satisfy given QoS
constraints. The problem of finding least-cost routing is known to be
NP hard or complete and some algorithms have been proposed to
find a near optimal solution. But these heuristics or algorithms either
impose relationships among the link metrics to reduce the complexity
of the problem which may limit the general applicability of the
heuristic, or are too costly in terms of execution time to be applicable
to large networks. In this paper, we analyzed two algorithms namely
Characterized Delay Constrained Routing (CDCR) and Optimized
Delay Constrained Routing (ODCR). The CDCR algorithm dealt an
approach for delay constrained routing that captures the trade-off
between cost minimization and risk level regarding the delay
constraint. The ODCR which uses an adaptive path weight function
together with an additional constraint imposed on the path cost, to
restrict search space and hence ODCR finds near optimal solution in
much quicker time.
Abstract: Small signal stability causes small perturbations in the
generator that can cause instability in the power network. It is
generally known that small signal stability are directly related to the
generator and load properties. This paper examines the effects of
generator input variations on power system oscillations for a small
signal stability study. Eigenvaules and eigenvectors are used to
examine the stability of the power system. The dynamic power
system's mathematical model is constructed and thus calculated using
load flow and small signal stability toolbox on MATLAB. The power
system model is based on a 3-machine 9-bus system that was
modified to suit this study. In this paper, Participation Factors are a
means to gauge the effects of variation in generation with other
parameters on the network are also incorporated.
Abstract: In this paper optimization of routing in ad-hoc
networks is surveyed and a new method for reducing the complexity
of routing algorithms is suggested. Using binary matrices for each
node in the network and updating it once the routing is done, helps
nodes to stop repeating the routing protocols in each data transfer.
The algorithm suggested can reduce the complexity of routing to the
least amount possible.
Abstract: Bacterial magnetic nanoparticles have great useful potential in biotechnological and biomedical applications. In this study, a liquid growth medium was modified for cultivation a fastidious magnetotactic bacterium that has been isolated from Anzali
lagoon, Iran in our previous research. These modifications include
change in vitamin, mineral, carbon sources and etcetera. In our
experience, the serum bottles and designed air-tight laboratory bottles
were used to create microaerobic conditions in order to development
of a method for scale-up experiment. This information may serve as a
guide to green chemistry based biological protocols for the synthesis
of magnetic nanoparticles with control over the chemical
composition, morphology and size.
Abstract: Internet is largely composed of textual contents and a
huge volume of digital contents gets floated over the Internet daily.
The ease of information sharing and re-production has made it
difficult to preserve author-s copyright. Digital watermarking came
up as a solution for copyright protection of plain text problem after
1993. In this paper, we propose a zero text watermarking algorithm
based on occurrence frequency of non-vowel ASCII characters and
words for copyright protection of plain text. The embedding
algorithm makes use of frequency non-vowel ASCII characters and
words to generate a specialized author key. The extraction algorithm
uses this key to extract watermark, hence identify the original
copyright owner. Experimental results illustrate the effectiveness of
the proposed algorithm on text encountering meaning preserving
attacks performed by five independent attackers.
Abstract: This paper presents a studyof the impact of reference
node locations on the accuracy of the indoor positioning systems. In
particular, we analyze the localization accuracy of the RSSI database
mapping techniques, deploying on the IEEE 802.15.4 wireless
networks. The results show that the locations of the reference nodes
used in the positioning systems affect the signal propagation
characteristics in the service area. Thisin turn affects the accuracy of the wireless indoor positioning system. We found that suitable
location of reference nodes could reduce the positioning error upto 35 %.
Abstract: The goal of admission control is to support the Quality
of Service demands of real-time applications via resource reservation
in IP networks. In this paper we introduce a novel Dynamic
Admission Control (DAC) mechanism for IP networks. The DAC
dynamically allocates network resources using the previous network
pattern for each path and uses the dynamic admission algorithm to
improve bandwidth utilization using bandwidth brokers. We evaluate
the performance of the proposed mechanism through trace-driven
simulation experiments in view point of blocking probability,
throughput and normalized utilization.